Apply machine learning techniques to detect malicious network traffic in cloud computing

被引:0
作者
Amirah Alshammari
Abdulaziz Aldribi
机构
[1] Jouf University,Department of Computer Science, College of Computer
[2] Qassim University,Department of Computer Science, College of Computer
来源
Journal of Big Data | / 8卷
关键词
IDS; Network traffic; Feature extraction; Dataset; Machine learning;
D O I
暂无
中图分类号
学科分类号
摘要
Computer networks target several kinds of attacks every hour and day; they evolved to make significant risks. They pass new attacks and trends; these attacks target every open port available on the network. Several tools are designed for this purpose, such as mapping networks and vulnerabilities scanning. Recently, machine learning (ML) is a widespread technique offered to feed the Intrusion Detection System (IDS) to detect malicious network traffic. The core of ML models’ detection efficiency relies on the dataset’s quality to train the model. This research proposes a detection framework with an ML model for feeding IDS to detect network traffic anomalies. This detection model uses a dataset constructed from malicious and normal traffic. This research’s significant challenges are the extracted features used to train the ML model about various attacks to distinguish whether it is an anomaly or regular traffic. The dataset ISOT-CID network traffic part uses for the training ML model. We added some significant column features, and we approved that feature supports the ML model in the training phase. The ISOT-CID dataset traffic part contains two types of features, the first extracted from network traffic flow, and the others computed in specific interval time. We also presented a novel column feature added to the dataset and approved that it increases the detection quality. This feature is depending on the rambling packet payload length in the traffic flow. Our presented results and experiment produced by this research are significant and encourage other researchers and us to expand the work as future work.
引用
收藏
相关论文
共 41 条
  • [1] Aldribi A(2020)Hypervisor-based cloud intrusion detection through online multivariate statistical change tracking Comput Secur 88 101646-101646
  • [2] Traoré I(2012)SYN flooding attack detection by TCP handshake anomalies Secur Commun Netw 5 709-724
  • [3] Moa B(2019)A hybrid deep learning-based model for anomaly detection in cloud datacenter networks IEEE Trans Netw Serv Manage 16 924-935
  • [4] Nwamuo O(2014)Aluminum–air battery based on an ionic liquid electrolyte J Mater Chem A 2 20237-20242
  • [5] Bellaïche M(2018)From intrusion detection to attacker attribution: a comprehensive survey of unsupervised methods IEEE Commun Surv Tutor 20 3369-3388
  • [6] Grégoire JC(2016)Dlodlo M (2016) Ensemble-based multi-filter feature selection method for DDoS detection in cloud computing EURASIP J Wirel Commun Netw 1 130-130
  • [7] Garg S(2018)Intrusion detection system based on decision tree over big data in fog environment Wirel Commun Mob Comput 2018 1-10
  • [8] Kaur K(2017)Flow-based intrusion detection: Techniques and challenges Comput Secur 70 238-254
  • [9] Kumar N(2019)Anomaly detecting and ranking of the cloud computing platform by multi-view learning Multimedia Tools Appl 78 30923-30942
  • [10] Kaddoum G(2013)Botnet detection based on traffic behavior analysis and flow intervals Comput Secur 39 2-16