Hybrid intrusion detection system using machine learning

被引:31
|
作者
Meryem A. [1 ]
Ouahidi B.E. [1 ]
机构
[1] Mohammed V University, Rabat
关键词
Recent technologies and innovations have encouraged users to adopt cloud-based architectures.1,2 This has reduced IT barriers and provided new capabilities of dynamic provisioning, monitoring and managing resources by providing immediate access to resources, enabling easy scaling up of services and implementation of new classes of existing applications. However, sharing the same pool when requesting services involves the risk of data breaches, account compromises, injection vulnerabilities, abusive use of features such as the use of trial periods and distributed denial of service (DDoS) attacks.3,4 As a result, many customers rank cloud security as a major challenge that threatens their work and reduces their trust in cloud service providers. Cloud-based architectures have reduced IT barriers and provided new capabilities of dynamic provisioning, monitoring and managing resources by providing immediate access to resources, enabling the easy scaling up of services. However, sharing the same pool when requesting services involves the risk of data breaches, account compromises, injection vulnerabilities and distributed denial of service (DDoS) attacks. As a result, many customers rank cloud security as a major challenge that threatens their work and reduces their trust in cloud service providers. Amar Meryem and Bouabid EL Ouahidi propose an architecture that eradicates malicious behaviours by detecting known attacks using log files; blocks suspicious behaviours in real time; secures sensitive data; and establishes better adaptations of security measures by dynamically updating security rules. © 2020 Elsevier Ltd;
D O I
10.1016/S1353-4858(20)30056-8
中图分类号
学科分类号
摘要
Recent technologies and innovations have encouraged users to adopt cloud-based architectures.1,2 This has reduced IT barriers and provided new capabilities of dynamic provisioning, monitoring and managing resources by providing immediate access to resources, enabling easy scaling up of services and implementation of new classes of existing applications. However, sharing the same pool when requesting services involves the risk of data breaches, account compromises, injection vulnerabilities, abusive use of features such as the use of trial periods and distributed denial of service (DDoS) attacks.3,4 As a result, many customers rank cloud security as a major challenge that threatens their work and reduces their trust in cloud service providers. Cloud-based architectures have reduced IT barriers and provided new capabilities of dynamic provisioning, monitoring and managing resources by providing immediate access to resources, enabling the easy scaling up of services. However, sharing the same pool when requesting services involves the risk of data breaches, account compromises, injection vulnerabilities and distributed denial of service (DDoS) attacks. As a result, many customers rank cloud security as a major challenge that threatens their work and reduces their trust in cloud service providers. Amar Meryem and Bouabid EL Ouahidi propose an architecture that eradicates malicious behaviours by detecting known attacks using log files; blocks suspicious behaviours in real time; secures sensitive data; and establishes better adaptations of security measures by dynamically updating security rules. © 2020 Elsevier Ltd
引用
收藏
页码:8 / 19
页数:11
相关论文
共 50 条
  • [1] HYBRID MACHINE LEARNING TECHNIQUE FOR INTRUSION DETECTION SYSTEM
    Tahir, Hatim Mohamad
    Hasan, Wael
    Said, Abas Md
    Zakaria, Nur Haryani
    Katuk, Norliza
    Kabir, Nur Farzana
    Omar, Mohd Hasbullah
    Ghazali, Osman
    Yahya, Noor Izzah
    PROCEEDINGS OF THE 5TH INTERNATIONAL CONFERENCE ON COMPUTING & INFORMATICS, 2015, : 464 - 472
  • [2] Network Intrusion Detection using Hybrid Machine Learning
    Chuang, Po-Jen
    Li, Si-Han
    2019 INTERNATIONAL CONFERENCE ON FUZZY THEORY AND ITS APPLICATIONS (IFUZZY), 2019, : 289 - 293
  • [3] An intrusion detection system based on hybrid machine learning classifier
    Reji, M.
    Joseph, Christeena
    Nancy, P.
    Mary, A. Lourdes
    JOURNAL OF INTELLIGENT & FUZZY SYSTEMS, 2023, 44 (03) : 4245 - 4255
  • [4] Hybrid Intrusion Detection System for RPL IoT Networks Using Machine Learning and Deep Learning
    Shahid, Usama
    Hussain, Muhammad Zunnurain
    Hasan, Muhammad Zulkifl
    Haider, Ali
    Ali, Jibran
    Altaf, Jawad
    IEEE ACCESS, 2024, 12 : 113099 - 113112
  • [5] Hybrid Intrusion Detection System Using Machine Learning Techniques in Cloud Computing Environments
    Aljamal, Ibraheem
    Tekeoglu, Ali
    Bekiroglu, Korkut
    Sengupta, Saumendra
    2019 IEEE/ACIS 17TH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING RESEARCH, MANAGEMENT AND APPLICATIONS (SERA), 2019, : 84 - 89
  • [6] Real-Time Hybrid Intrusion Detection System Using Machine Learning Techniques
    Dutt, Inadyuti
    Borah, Samarjeet
    Maitra, Indra Kanta
    Bhowmik, Kuharan
    Maity, Ayindrilla
    Das, Suvosmita
    ADVANCES IN COMMUNICATION, DEVICES AND NETWORKING, 2018, 462 : 885 - 894
  • [7] IoBT Intrusion Detection System using Machine Learning
    Alkanjr, Basmh
    Alshammari, Thamer
    2023 IEEE 13TH ANNUAL COMPUTING AND COMMUNICATION WORKSHOP AND CONFERENCE, CCWC, 2023, : 886 - 892
  • [8] An Intrusion Detection System for SDN Using Machine Learning
    Logeswari, G.
    Bose, S.
    Anitha, T.
    INTELLIGENT AUTOMATION AND SOFT COMPUTING, 2023, 35 (01): : 867 - 880
  • [9] An Investigation on Intrusion Detection System Using Machine Learning
    Patgiri, Ripon
    Varshney, Udit
    Akutota, Tanya
    Kunde, Rakesh
    2018 IEEE SYMPOSIUM SERIES ON COMPUTATIONAL INTELLIGENCE (IEEE SSCI), 2018, : 1684 - 1691
  • [10] Cascaded intrusion detection system using machine learning
    Ahamed, Md. Khabir Uddin
    Karim, Abdul
    SYSTEMS AND SOFT COMPUTING, 2025, 7