Cloud-Based Intrusion Detection Approach Using Machine Learning Techniques

被引:36
作者
Attou, Hanaa [1 ]
Guezzaz, Azidine [1 ]
Benkirane, Said [1 ]
Azrour, Mourade [2 ]
Farhaoui, Yousef [2 ]
机构
[1] Cadi Ayyad Univ, Technol Higher Sch Essaouira, Marrakech 44000, Morocco
[2] Moulay Ismail Univ Meknes, Fac Sci & Tech, STI Lab, IDMS Team, Errachidia 25003, Morocco
关键词
cloud security; anomaly detection; features engineering; random forest; SECURITY ISSUES; CHALLENGES; ENSEMBLE;
D O I
10.26599/BDMA.2022.9020038
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Cloud computing (CC) is a novel technology that has made it easier to access network and computer resources on demand such as storage and data management services. In addition, it aims to strengthen systems and make them useful. Regardless of these advantages, cloud providers suffer from many security limits. Particularly, the security of resources and services represents a real challenge for cloud technologies. For this reason, a set of solutions have been implemented to improve cloud security by monitoring resources, services, and networks, then detect attacks. Actually, intrusion detection system (IDS) is an enhanced mechanism used to control traffic within networks and detect abnormal activities. This paper presents a cloud-based intrusion detection model based on random forest (RF) and feature engineering. Specifically, the RF classifier is obtained and integrated to enhance accuracy (ACC) of the proposed detection model. The proposed model approach has been evaluated and validated on two datasets and gives 98.3% ACC and 99.99% ACC using Bot-IoT and NSL-KDD datasets, respectively. Consequently, the obtained results present good performances in terms of ACC, precision, and recall when compared to the recent related works.
引用
收藏
页码:311 / 320
页数:10
相关论文
共 50 条
[1]  
Abdulkareem Nasiba Mahdi., 2021, International Journal of Science and Business, V5, P128
[2]  
Ahmad F. B., 2022, SECURING CLOUD DATA, DOI [10.21203/rs.3.rs-1315357/v1, DOI 10.21203/RS.3.RS-1315357/V1]
[3]  
Ali J., 2012, INT J COMPUT SCI ISS, V9, P272
[4]   Security in cloud computing: Opportunities and challenges [J].
Ali, Mazhar ;
Khan, Samee U. ;
Vasilakos, Athanasios V. .
INFORMATION SCIENCES, 2015, 305 :357-383
[5]  
Alloussi H., 2012, WORKSH INN NEW TREND
[6]   Apply machine learning techniques to detect malicious network traffic in cloud computing [J].
Alshammari, Amirah ;
Aldribi, Abdulaziz .
JOURNAL OF BIG DATA, 2021, 8 (01)
[7]   Internet of Things Security: Challenges and Key Issues [J].
Azrour, Mourade ;
Mabrouki, Jamal ;
Guezzaz, Azidine ;
Kanwal, Ambrina .
SECURITY AND COMMUNICATION NETWORKS, 2021, 2021
[8]   Machine learning algorithms for efficient water quality prediction [J].
Azrour, Mourade ;
Mabrouki, Jamal ;
Fattah, Ghizlane ;
Guezzaz, Azedine ;
Aziz, Faissal .
MODELING EARTH SYSTEMS AND ENVIRONMENT, 2022, 8 (02) :2793-2801
[9]  
Azrour M, 2019, STUD BIG DATA, V53, P67, DOI 10.1007/978-3-030-12048-1_9
[10]   SPIT Detection in Telephony over IP Using K-Means Algorithm [J].
Azrour, Mourade ;
Farhaoui, Yousef ;
Ouanan, Mohammed ;
Guezzaz, Azidine .
SECOND INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTING IN DATA SCIENCES (ICDS2018), 2019, 148 :542-551