Hybrid intrusion detection system using machine learning

被引:31
|
作者
Meryem A. [1 ]
Ouahidi B.E. [1 ]
机构
[1] Mohammed V University, Rabat
关键词
Recent technologies and innovations have encouraged users to adopt cloud-based architectures.1,2 This has reduced IT barriers and provided new capabilities of dynamic provisioning, monitoring and managing resources by providing immediate access to resources, enabling easy scaling up of services and implementation of new classes of existing applications. However, sharing the same pool when requesting services involves the risk of data breaches, account compromises, injection vulnerabilities, abusive use of features such as the use of trial periods and distributed denial of service (DDoS) attacks.3,4 As a result, many customers rank cloud security as a major challenge that threatens their work and reduces their trust in cloud service providers. Cloud-based architectures have reduced IT barriers and provided new capabilities of dynamic provisioning, monitoring and managing resources by providing immediate access to resources, enabling the easy scaling up of services. However, sharing the same pool when requesting services involves the risk of data breaches, account compromises, injection vulnerabilities and distributed denial of service (DDoS) attacks. As a result, many customers rank cloud security as a major challenge that threatens their work and reduces their trust in cloud service providers. Amar Meryem and Bouabid EL Ouahidi propose an architecture that eradicates malicious behaviours by detecting known attacks using log files; blocks suspicious behaviours in real time; secures sensitive data; and establishes better adaptations of security measures by dynamically updating security rules. © 2020 Elsevier Ltd;
D O I
10.1016/S1353-4858(20)30056-8
中图分类号
学科分类号
摘要
Recent technologies and innovations have encouraged users to adopt cloud-based architectures.1,2 This has reduced IT barriers and provided new capabilities of dynamic provisioning, monitoring and managing resources by providing immediate access to resources, enabling easy scaling up of services and implementation of new classes of existing applications. However, sharing the same pool when requesting services involves the risk of data breaches, account compromises, injection vulnerabilities, abusive use of features such as the use of trial periods and distributed denial of service (DDoS) attacks.3,4 As a result, many customers rank cloud security as a major challenge that threatens their work and reduces their trust in cloud service providers. Cloud-based architectures have reduced IT barriers and provided new capabilities of dynamic provisioning, monitoring and managing resources by providing immediate access to resources, enabling the easy scaling up of services. However, sharing the same pool when requesting services involves the risk of data breaches, account compromises, injection vulnerabilities and distributed denial of service (DDoS) attacks. As a result, many customers rank cloud security as a major challenge that threatens their work and reduces their trust in cloud service providers. Amar Meryem and Bouabid EL Ouahidi propose an architecture that eradicates malicious behaviours by detecting known attacks using log files; blocks suspicious behaviours in real time; secures sensitive data; and establishes better adaptations of security measures by dynamically updating security rules. © 2020 Elsevier Ltd
引用
收藏
页码:8 / 19
页数:11
相关论文
共 50 条
  • [21] SOME/IP Intrusion Detection System Using Machine Learning
    Heo, Jaewoong
    Kim, Hyunghoon
    Jo, Hyo Jin
    IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2022, E105D (11) : 1923 - 1924
  • [22] Database Intrusion Detection System Using Octraplet and Machine Learning
    Jayaprakash, Souparnika
    Kandasamy, Kamalanathan
    PROCEEDINGS OF THE 2018 SECOND INTERNATIONAL CONFERENCE ON INVENTIVE COMMUNICATION AND COMPUTATIONAL TECHNOLOGIES (ICICCT), 2018, : 1413 - 1416
  • [23] Intrusion Detection System Using Machine Learning Approach: A Review
    Sharma, Kapil
    Chawla, Meenu
    Tiwari, Namita
    INTERNATIONAL CONFERENCE ON INNOVATIVE COMPUTING AND COMMUNICATIONS, ICICC 2022, VOL 1, 2023, 473 : 727 - 734
  • [24] A Robust Intrusion Detection System using Ensemble Machine Learning
    Divakar, Subham
    Priyadarshini, Rojalina
    Mishra, Brojo Kishore
    PROCEEDINGS OF 2020 6TH IEEE INTERNATIONAL WOMEN IN ENGINEERING (WIE) CONFERENCE ON ELECTRICAL AND COMPUTER ENGINEERING (WIECON-ECE 2020), 2020, : 348 - 351
  • [25] A Survey on Intrusion Detection System Using Machine Learning Algorithms
    Gulghane, Shital
    Shingate, Vishal
    Bondgulwar, Shivani
    Awari, Gaurav
    Sagar, Parth
    INNOVATIVE DATA COMMUNICATION TECHNOLOGIES AND APPLICATION, 2020, 46 : 670 - 675
  • [26] Intrusion Detection System using Aggregation of Machine Learning Algorithms
    Arivarasan, K.
    Obaidat, Mohammad S.
    2022 INTERNATIONAL CONFERENCE ON COMPUTER, INFORMATION AND TELECOMMUNICATION SYSTEMS, CITS, 2022, : 123 - 130
  • [27] A Network Intrusion Detection System Using Ensemble Machine Learning
    Kiflay, Aklil Zenebe
    Tsokanos, Athanasios
    Kirner, Raimund
    2021 INTERNATIONAL CARNAHAN CONFERENCE ON SECURITY TECHNOLOGY (ICCST), 2021,
  • [28] A Review on Intrusion Detection System using Machine Learning Techniques
    Musa, Usman Shuaibu
    Chakraborty, Sudeshna
    Abdullahi, Muhammad M.
    Maini, Tarun
    2021 IEEE INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION, AND INTELLIGENT SYSTEMS (ICCCIS), 2021, : 541 - 549
  • [29] IMPLEMENTATION OF HYBRID MACHINE LEARNING TECHNIQUE FOR INTRUSION DETECTION SYSTEM IN CLOUD COMPUTING
    Poornima, E.
    Sasikala, C.
    INTERNATIONAL JOURNAL OF EARLY CHILDHOOD SPECIAL EDUCATION, 2022, 14 (02) : 1436 - 1442
  • [30] A Hybrid Approach for Intrusion Detection Based on Machine Learning
    Singh, Rohit
    Kalra, Mala
    Solanki, Shano
    PROCEEDINGS OF THE 2019 INTERNATIONAL CONFERENCE ON INTELLIGENT SUSTAINABLE SYSTEMS (ICISS 2019), 2019, : 187 - 192