Modeling Cloud Computing Risk Assessment Using Ensemble Methods

被引:2
作者
Ahmed, Nada [1 ]
Abraham, Ajith [2 ,3 ]
机构
[1] Sudan Univ Sci, Fac Comp Sci & Informat Technol, Technol, Khartoum, Sudan
[2] Machine Intelligence Res Labs MIR Labs, Sci Network Innovat & Res Excellence, Auburn, WA USA
[3] VSB Tech Univ Ostrava, IT4Innovat, Ostrava, Czech Republic
来源
PATTERN ANALYSIS, INTELLIGENT SECURITY AND THE INTERNET OF THINGS | 2015年 / 355卷
关键词
Cloud computing; Risk factor; Ensemble method; Data mining; Meta-scheme; SECURITY; CLASSIFICATION; SELECTION; ISSUES;
D O I
10.1007/978-3-319-17398-6_24
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Risk Assessment is a common practice in the information system security domain, besides that it is a useful tool to assess risk exposure and drive management decisions. Cloud computing has been an emerging computing model in the IT field. It provides computing resources as general utilities that can be leased and released by users in an on-demand fashion. It is about growing interest in many companies around the globe, but adopting cloud computing comes with greater risks, which need to be assessed. The main target of risk assessment is to define appropriate controls for reducing or eliminating those risks. The goal of this paper was to use an ensemble technique to increase the predictive performance. The main idea of using ensembles is that the combination of predictors can lead to an improvement of a risk assessment model in terms of better generalization and/or in terms of increased efficiency. We conducted a survey and formulated different associated risk factors to simulate the data from the experiments. We applied different feature selection algorithms such as best-first and random search algorithms and ranking methods to reduce the attributes to 4, 5, and 10 attributes, which enabled us to achieve better accuracy. Six function approximation algorithms, namely Isotonic Regression, Randomizable Filter Classifier, Kstar, Extra tree, IBK, and the multilayered perceptron, were selected after experimenting with more than thirty different algorithms. Further, the meta-schemes algorithm named voting is adopted to improve the generalization performance of best individual classifier and to build highly accurate risk assessment model.
引用
收藏
页码:261 / 274
页数:14
相关论文
共 25 条
[1]   On learning algorithm selection for classification [J].
Ali, S ;
Smith, KA .
APPLIED SOFT COMPUTING, 2006, 6 (02) :119-138
[2]  
[Anonymous], COMPUTATIONAL LEARNI
[3]  
[Anonymous], 2009, PROC INT MULTICONF E
[4]   Advantages and challenges of adopting cloud computing from an enterprise perspective [J].
Avram , Maricela-Georgiana .
7TH INTERNATIONAL CONFERENCE INTERDISCIPLINARITY IN ENGINEERING (INTER-ENG 2013), 2014, 12 :529-534
[5]   Risk perception and risk management in cloud computing: Results from a case study of Swiss companies [J].
Brender, Nathalie ;
Markov, Iliya .
INTERNATIONAL JOURNAL OF INFORMATION MANAGEMENT, 2013, 33 (05) :726-733
[6]   Investigating the influence of the choice of the ensemble members in accuracy and diversity of selection-based and fusion-based methods for ensembles [J].
Canuto, Anne M. P. ;
Abreu, Marjory C. C. ;
Oliveira, Lucas de Melo ;
Xavier, Joao C., Jr. ;
Santos, Araken de M. .
PATTERN RECOGNITION LETTERS, 2007, 28 (04) :472-486
[7]  
Carroll M., 2011, P INF SEC S AFR ISSA, DOI [DOI 10.1109/ISSA.2011.6027519, 10.1109/ISSA.2011.6027519]
[8]  
Chandran S.P., 2010, Proceedings of Natural Sciences and Engineering, P2
[9]   A Comparative Study of Classification Techniques for Intrusion Detection [J].
Chauhan, Himadri ;
Kumar, Vipin ;
Pundir, Sumit ;
Pilli, Emmanuel S. .
2013 INTERNATIONAL SYMPOSIUM ON COMPUTATIONAL AND BUSINESS INTELLIGENCE (ISCBI), 2013, :40-43
[10]   Predictive Ensemble Pruning by Expectation Propagation [J].
Chen, Huanhuan ;
Tino, Peter ;
Yao, Xin .
IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2009, 21 (07) :999-1013