Cloud computing security assurance modelling through risk analysis using machine learning

被引:0
作者
Sharma, Abhishek [1 ]
Singh, Umesh Kumar [2 ]
机构
[1] Shri Vaishnav Vidyapeeth Vishwavidyalaya, Indore, India
[2] Vikram Univ, Ujjain, India
关键词
Cloud computing (CC); Cloud attacks; Cloud security; Machine learning; Intrusion detection system (IDS); Cyber attacks; Cloud security assurance; INTRUSION DETECTION; DDOS ATTACKS; QUALITY; ISSUES; SYSTEM;
D O I
10.1007/s13198-025-02705-8
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
The concept of Cloud Computing has exploded in popularity, and the reason for this is the cost-effective transmission, storage, and powerful computation it offers. The objective is to provide end-users with remote storage and data analysis capabilities using shared computing resources, lowering an individual's total cost. Consumers, on the other hand, are still hesitant to use this technology due to security and privacy concerns. In this work a thorough overview of the various Cloud attacks and security challenges is presented and security assurance modelling is done through risk analysis using machine learning. In order to analyze the security risk in terms of threats and attacks for cloud computing environments, the most recent dataset (ISOT Cloud Intrusion Dataset) is used for intrusion detection under cloud computing environments. The methodology involves the implementation of multiple supervised machine learning algorithms like support vector machine (SVM), random forest (RF), logistic regression (LR), Na & iuml;ve Bayes (NB), Artificial Neural Network (ANN), K-nearest Neighbor (kNN) to identify & classify intrusions for cloud environment. As a result, accuracy of the proposed SVM model is evaluated as 99.2%. The performance metrics of various machine learning implementation models are also compared & investigated using parameters like accuracy, AUC, F1, precision, and recall. The results are represented as confusion matrices. The outcome of this work will further help the network security administrator to mitigate the real time attacks under cloud computing environments.
引用
收藏
页码:1287 / 1300
页数:14
相关论文
共 76 条
[41]   Cloud computing architecture [J].
Kim, Won .
INTERNATIONAL JOURNAL OF WEB AND GRID SERVICES, 2013, 9 (03) :287-303
[42]   A Self-protection Mechanism against Stepping-stone Attacks for IaaS Clouds [J].
Kourai, Kenichi ;
Azumi, Takeshi ;
Chiba, Shigeru .
2012 9TH INTERNATIONAL CONFERENCE ON UBIQUITOUS INTELLIGENCE & COMPUTING AND 9TH INTERNATIONAL CONFERENCE ON AUTONOMIC & TRUSTED COMPUTING (UIC/ATC), 2012, :539-546
[43]  
Ku C-Y, 2013, DIVERSITY TECHNOLOGY, pS325
[44]  
Kumar S.N., 2016, AM J SYSTEMS SOFTWAR, V4, P14
[45]  
Liu A., 2009, P 2009 ACM S APPL CO, P2054, DOI 10.1145/1529282.1529737
[46]   Secure virtualization for cloud computing [J].
Lombardi, Flavio ;
Di Pietro, Roberto .
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2011, 34 (04) :1113-1122
[47]   Mitigating DDoS Attacks with Transparent and Intelligent Fast-Flux Swarm Network [J].
Lua, Ruiping ;
Yow, Kin Choong .
IEEE NETWORK, 2011, 25 (04) :28-33
[48]  
Mather T., 2009, CLOUD SECURITY PRIVA
[49]  
Mell P, 2010, COMMUN ACM, V53, P50
[50]  
Mishra B, Studies in Big Data, V39, P333