Machine Learning Based Cloud Computing Anomalies Detection

被引:15
作者
Chkirbene, Zina [1 ]
Erbad, Aiman [1 ]
Hamila, Ridha [2 ]
Gouissem, Ala [1 ,4 ]
Mohamed, Amr [3 ]
Hamdi, Mounir [4 ]
机构
[1] Qatar Univ, Doha, Qatar
[2] Qatar Univ, Dept Elect Engn, Doha, Qatar
[3] Qatar Univ, Coll Engn, Doha, Qatar
[4] Hamad Bin Khalif Univ, Ar Rayyan, Qatar
来源
IEEE NETWORK | 2020年 / 34卷 / 06期
关键词
Machine learning; Machine learning algorithms; Data models; Security; Predictive models; Training; Cloud computing;
D O I
10.1109/MNET.011.2000097
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Recently, machine learning algorithms have been proposed to design new security systems for anomalies detection as they exhibit fast processing with real-time predictions. However, one of the major challenges in machine learning-based intrusion detection methods is how to include enough training examples for all the possible classes in the model to avoid the class imbalance problem and accurately detect the intrusions and their types. in this article, we propose a novel weighted classes classification scheme to secure the network against malicious nodes while alleviating the problem of imbalanced data. in the proposed system, we combine a supervised machine learning algorithm with the network node past information and a specific designed best effort iterative algorithm to enhance the accuracy of rarely detectable attacks. The machine learning algorithm is used to generate a classifier that differentiates between the investigated attacks. The system stores these decisions in a private database. Then, we design a new weight optimization algorithm that exploits these decisions to generate a weights vector that includes the best weight for each class. The proposed model enhances the overall detection accuracy and maximizes the number of correctly detectable classes even for the classes with a relatively low number of training entries. The UNSW dataset has been used to evaluate the performance of the proposed model and compare it with state of the art techniques.
引用
收藏
页码:178 / 183
页数:6
相关论文
共 14 条
  • [1] Abu Shanab A, 2012, 2012 IEEE 13TH INTERNATIONAL CONFERENCE ON INFORMATION REUSE AND INTEGRATION (IRI), P415, DOI 10.1109/IRI.2012.6303039
  • [2] A survey on fog computing for the Internet of Things
    Bellavista, Paolo
    Berrocal, Javier
    Corradi, Antonio
    Das, Sajal K.
    Foschini, Luca
    Zanni, Alessandro
    [J]. PERVASIVE AND MOBILE COMPUTING, 2019, 52 : 71 - 99
  • [3] Chkirbene Z, 2019, IEEE WCNC
  • [4] Dumais S., 2000, SIGIR Forum, V34, P256
  • [5] Variance Ranking Attributes Selection Techniques for Binary Classification Problem in Imbalance Data
    Ebenuwa, Solomon H.
    Sharif, Mhd Saeed
    Alazab, Mamoun
    Al-Nemrat, Ameer
    [J]. IEEE ACCESS, 2019, 7 : 24649 - 24666
  • [6] Gumus F, 2014, 2014 PROCEEDINGS OF THE IEEE/ACM INTERNATIONAL CONFERENCE ON ADVANCES IN SOCIAL NETWORKS ANALYSIS AND MINING (ASONAM 2014), P670, DOI 10.1109/ASONAM.2014.6921657
  • [7] Nawir M., 2005, J THEORETICAL APPL I, V96
  • [8] A hybrid machine learning approach for malicious behaviour detection and recognition in cloud computing
    Rabbani, Mahdi
    Wang, Yong Li
    Khoshkangini, Reza
    Jelodar, Hamed
    Zhao, Ruxin
    Hu, Peng
    [J]. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2020, 151
  • [9] Swift Imbalance Data Classification using SMOTE and Extreme Learning Machine
    Rustogi, Rishabh
    Prasad, Ayush
    [J]. 2019 SECOND INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE IN DATA SCIENCE (ICCIDS 2019), 2019,
  • [10] Tanash RM, 2019, 2019 42ND INTERNATIONAL CONVENTION ON INFORMATION AND COMMUNICATION TECHNOLOGY, ELECTRONICS AND MICROELECTRONICS (MIPRO), P496, DOI [10.23919/MIPRO.2019.8756926, 10.23919/mipro.2019.8756926]