Privilege Escalation Attack Detection and Mitigation in Cloud Using Machine Learning

被引:14
|
作者
Mehmood, Muhammad [1 ]
Amin, Rashid [1 ,2 ]
Muslam, Muhana Magboul Ali [3 ]
Xie, Jiang [4 ]
Aldabbas, Hamza [5 ]
机构
[1] Univ Engn & Technol Taxila, Dept Comp Sci, Taxila 47050, Pakistan
[2] Univ Chakwal, Dept Comp Sci, Chakwal 48800, Pakistan
[3] Imam Mohammad Ibn Saud Islamic Univ, Dept Informat Technol, Riyadh 11432, Saudi Arabia
[4] Univ North Carolina Charlotte UNC Charlotte, Dept Elect & Comp Engn, Charlotte, NC 28223 USA
[5] Al Balqa Appl Univ, Prince Abdullah bin Ghazi Fac Informat & Commun Te, Al Salt 1705, Jordan
关键词
Security; Machine learning algorithms; Cloud computing; Classification algorithms; Random forests; Machine learning; Data models; Privilege escalation; insider attack; machine learning; random forest; adaboost; XGBoost; LightGBM; classification; INSIDER THREAT DETECTION; SYSTEM;
D O I
10.1109/ACCESS.2023.3273895
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Because of the recent exponential rise in attack frequency and sophistication, the proliferation of smart things has created significant cybersecurity challenges. Even though the tremendous changes cloud computing has brought to the business world, its centralization makes it challenging to use distributed services like security systems. Valuable data breaches might occur due to the high volume of data that moves between businesses and cloud service suppliers, both accidental and malicious. The malicious insider becomes a crucial threat to the organization since they have more access and opportunity to produce significant damage. Unlike outsiders, insiders possess privileged and proper access to information and resources. In this work, a machine learning-based system for insider threat detection and classification is proposed and developed a systematic approach to identify various anomalous occurrences that may point to anomalies and security problems associated with privilege escalation. By combining many models, ensemble learning enhances machine learning outcomes and enables greater prediction performance. Multiple studies have been presented regarding detecting irregularities and vulnerabilities in network systems to find security flaws or threats involving privilege escalation. But these studies lack the proper identification of the attacks. This study proposes and evaluates ensembles of Machine learning (ML) techniques in this context. This paper implements machine learning algorithms for the classification of insider attacks. A customized dataset from multiple files of the CERT dataset is used. Four machine learning algorithms, i.e., Random Forest (RF), Adaboost, XGBoost, and LightGBM, are applied to that dataset and analyzed results. Overall, LightGBM performed best. However, some other algorithms, such as RF or AdaBoost, may perform better on some internal attacks (Behavioral Biometrics attacks) or other internal attacks. Therefore, there is room for incorporating more than one machine learning algorithm to obtain a stronger classification in multiple internal attacks. Among the proposed algorithms, the LightGBM algorithm provides the highest accuracy of 97%; the other accuracy values are RF at 86%, AdaBoost at 88%, and XGBoost at 88.27%.
引用
收藏
页码:46561 / 46576
页数:16
相关论文
共 50 条
  • [31] Malicious attack detection approach in cloud computing using machine learning techniques
    Arunkumar, M.
    Kumar, K. Ashok
    SOFT COMPUTING, 2022, 26 (23) : 13097 - 13107
  • [32] Analysis and Detection of DDoS Attacks on Cloud Computing Environment using Machine Learning Techniques
    Wani, Abdul Raoof
    Rana, Q. P.
    Saxena, U.
    Pandey, Nitin
    PROCEEDINGS 2019 AMITY INTERNATIONAL CONFERENCE ON ARTIFICIAL INTELLIGENCE (AICAI), 2019, : 870 - 875
  • [33] Predicting Future Malware Attacks on Cloud Systems using Machine Learning
    Patel, Vrushang
    Choe, Seungho
    Halabi, Talal
    2020 IEEE 6TH INT CONFERENCE ON BIG DATA SECURITY ON CLOUD (BIGDATASECURITY) / 6TH IEEE INT CONFERENCE ON HIGH PERFORMANCE AND SMART COMPUTING, (HPSC) / 5TH IEEE INT CONFERENCE ON INTELLIGENT DATA AND SECURITY (IDS), 2020, : 151 - 156
  • [34] Machine Learning Based DDoS Attack Detection
    Ajeetha, G.
    Priya, Madhu G.
    2019 INNOVATIONS IN POWER AND ADVANCED COMPUTING TECHNOLOGIES (I-PACT), 2019,
  • [35] Cloud DDoS Attack Detection Model with Data Fusion & Machine Learning Classifiers
    Pattnaik, Lal Mohan
    Swain, Pratik Kumar
    Satpathy, Suneeta
    Panda, Aditya N.
    EAI ENDORSED TRANSACTIONS ON SCALABLE INFORMATION SYSTEMS, 2023, 10 (06)
  • [36] A survey on cognitive radio network attack mitigation using machine learning and blockchain
    I. Evelyn Ezhilarasi
    J. Christopher Clement
    Joseph M. Arul
    EURASIP Journal on Wireless Communications and Networking, 2023
  • [37] Optimizing fraud detection in financial transactions with machine learning and imbalance mitigation
    Al-dahasi, Ezaz Mohammed
    Alsheikh, Rama Khaled
    Khan, Fakhri Alam
    Jeon, Gwanggil
    EXPERT SYSTEMS, 2025, 42 (02)
  • [38] Detection of Username Enumeration Attack on SSH Protocol: Machine Learning Approach
    Agghey, Abel Z.
    Mwinuka, Lunodzo J.
    Pandhare, Sanket M.
    Dida, Mussa A.
    Ndibwile, Jema D.
    SYMMETRY-BASEL, 2021, 13 (11):
  • [39] Modelling of intrusion detection using sea horse optimization with machine learning model on cloud environment
    Jansi Sophia Mary C.
    Mahalakshmi K.
    International Journal of Information Technology, 2024, 16 (3) : 1981 - 1988
  • [40] IDERES: Intrusion detection and response system using machine learning and attack graphs
    Rose, Joseph R.
    Swann, Matthew
    Grammatikakis, Konstantinos P.
    Koufos, Ioannis
    Bendiab, Gueltoum
    Shiaeles, Stavros
    Kolokotronis, Nicholas
    JOURNAL OF SYSTEMS ARCHITECTURE, 2022, 131