Proactive Detection of Attacks on Cloud-based Applications using Machine Learning

Authors

  • S. Rekha Garikamukkala, V. Ravi Sankar

Keywords:

Machine Learning, Cloud-Based Applications, Proactive Detection, Cybersecurity, Anomaly Detection, Intrusion Detection

Abstract

This study thoroughly examines how machine learning techniques may be used to proactively detect assaults on cloud-based services. The security of cloud-based systems has become crucial due to the growing dependence on cloud computing for a wide range of applications in many industries. Conventional security methods frequently fail to identify advanced threats that take use of weaknesses in cloud infrastructures and apps. Therefore, there is a critical requirement for security measures that are proactive and adaptable, able to detect and address new threats as they develop instantly. This study focuses on incorporating machine learning methods to enhance the security of cloud-based systems. Our platform utilizes past data on system behaviors, network traffic patterns, and application interactions to use machine learning in distinguishing regular operations from abnormal activity that may signal possible assaults. Our method creates strong detection systems that can adjust to changing threat environments by utilizing feature extraction, dimensionality reduction, and model training. Our technique focuses on creating a comprehensive detection system that includes anomaly detection, intrusion detection, and behavior analysis. Our system is versatile in identifying various assaults such as DDoS attacks, SQL injection, cross-site scripting, and data exfiltration attempts by combining supervised, unsupervised, and semi-supervised learning approaches. Our technique aims to reduce false positives and negatives by detecting discriminative features and reducing noise, thereby enhancing detection accuracy and reliability. The scalability and efficiency of the proposed framework are crucial due to the dynamic and resource-limited nature of cloud infrastructures. We investigate lightweight machine learning techniques and distributed computing architectures that can easily integrate with cloud settings while reducing computational overhead. This study showcases the effectiveness and durability of our proactive detection architecture in protecting cloud-based apps from various cyber threats, through thorough testing and assessment using real-world datasets and simulated attack scenarios. Organizations may reduce the risks of cyber-attacks and protect vital assets, data integrity, and user trust in cloud computing ecosystems by adopting a proactive security approach based on machine learning insights.

Downloads

Download data is not yet available.

References

Janitza Nicole Punto Gutierrez, & Kilhung Lee (2020). An Attack-based Filtering Scheme for Slow Rate Denial-of-Service Attack Detection in Cloud Environment. Journal of Multimedia Information System, 7.

Nagarathna Ravi, & S. Mercy Shalinie (2020). Learning-Driven Detection and Mitigation of DDoS Attack in IoT via SDN-Cloud Architecture. IEEE Internet of Things Journal, 7.

Gopal Singh Kushwah, & Virender Ranga (2020). Voting extreme learning machine based distributed denial of service attack detection in cloud computing. Journal of Information Security and Applications, 53.

Shweta Gumaste, D. G. Narayan, Sumedha Shinde, & K. Amit (2020). Detection of DDoS attacks in openstack-based private cloud using apache spark. Journal of Telecommunications and Information Technology, 2020.

Omar Abdel Wahab, Jamal Bentahar, Hadi Otrok, & Azzam Mourad (2020). Optimal Load Distribution for the Detection of VM-Based DDoS Attacks in the Cloud. IEEE Transactions on Services Computing, 13.

Aanshi Bhardwaj, Veenu Mangat, & Renu Vig (2020). Hyperband tuned deep neural network with well posed stacked sparse autoencoder for detection of ddos attacks in cloud. IEEE Access, 8.

Abhishek Agarwal, Ayush Prasad, Rishabh Rustogi, & Sweta Mishra (2021). Detection and mitigation of fraudulent resource consumption attacks in cloud using deep learning approach. Journal of Information Security and Applications, 56.

Prasanna Balaji Narasingapuram, & M. Ponnavaikko (2021). A novel attack detection and encryption framework for distributed cloud computing. Indian Journal of Computer Science and Engineering, 12.

Meghana G. Raj, & Santosh Kumar Pani (2021). A Meta-analytic Review of Intelligent Intrusion Detection Techniques in Cloud Computing Environment. International Journal of Advanced Computer Science and Applications, 12.

Parul Singh, & Virender Ranga (2021). Attack and intrusion detection in cloud computing using an ensemble learning approach. International Journal of Information Technology (Singapore), 13.

S. Velliangiri, P. Karthikeyan, & V. Vinoth Kumar (2021). Detection of distributed denial of service attack in cloud computing using the optimization-based deep networks. Journal of Experimental and Theoretical Artificial Intelligence, 33.

Reddy SaiSindhuTheja, & Gopal K. Shyam (2021). An efficient metaheuristic algorithm based feature selection and recurrent neural network for DoS attack detection in cloud computing environment. Applied Soft Computing, 100.

Isaac Odun-Ayo, Williams Toro-Abasi, Marion Adebiyi, & Oladapo Alagbe (2021). An implementation of real-time detection of cross-site scripting attacks on cloud-based web applications using deep learning. Bulletin of Electrical Engineering and Informatics, 10.

Fargana J. Abdullayeva (2021). Advanced Persistent Threat attack detection method in cloud computing based on autoencoder and softmax regression algorithm. Array, 10.

Sandeep Kautish, A. Reyana, & Ankit Vidyarthi (2022). SDMTA: Attack Detection and Mitigation Mechanism for DDoS Vulnerabilities in Hybrid Cloud Environment. IEEE Transactions on Industrial Informatics, 18.

Ahmed Abdullah Alqarni (2022). Majority Vote-Based Ensemble Approach for Distributed Denial of Service Attack Detection in Cloud Computing. Journal of Cyber Security and Mobility, 11.

M. Arunkumar, & K. Ashok Kumar (2022). Malicious attack detection approach in cloud computing using machine learning techniques. Soft Computing, 26.

Omaimah Bamasag, Alaa Alsaeedi, Asmaa Munshi, Daniyal Alghazzawi, Suhair Alshehri, & Arwa Jamjoom (2022). Real-time DDoS flood attack monitoring and detection (RT-AMD) model for cloud computing. PeerJ Computer Science, 7.

Fargana J. Abdullayeva (2022). Distributed denial of service attack detection in E-government cloud via data clustering. Array, 15.

Theyazn H.H. Aldhyani, & Hasan Alkahtani (2022). Artificial Intelligence Algorithm-Based Economic Denial of Sustainability Attack Detection Systems: Cloud Computing Environments. Sensors, 22.

Vasily Desnitsky, Andrey Chechulin, & Igor Kotenko (2022). Multi-Aspect Based Approach to Attack Detection in IoT Clouds. Sensors, 22.

Ryuga Kaneko, & Taiichi Saito (2023). Detection of Cookie Bomb Attacks in Cloud Computing Environment Monitored by SIEM. Journal of Advances in Information Technology, 14.

Yousef Sanjalawe, & Turke Althobaiti (2023). DDoS Attack Detection in Cloud Computing Based on Ensemble Feature Selection and Deep Learning. Computers, Materials and Continua, 75.

S. Balasubramaniam, C. Vijesh Joe, T. A. Sivakumar, A. Prasanth, K. Satheesh Kumar, V. Kavitha, & Rajesh Kumar Dhanaraj (2023). Optimization Enabled Deep Learning-Based DDoS Attack Detection in Cloud Computing. International Journal of Intelligent Systems, 2023.

B. Dhiyanesh, K. Karthick, R. Radha, & Anita Venaik (2023). Iterative Dichotomiser Posteriori Method Based Service Attack Detection in Cloud Computing. Computer Systems Science and Engineering, 44.

Muhammad Mehmood, Rashid Amin, Muhana Magboul Ali Muslam, Jiang Xie, & Hamza Aldabbas (2023). Privilege Escalation Attack Detection and Mitigation in Cloud Using Machine Learning. IEEE Access, 11.

Animesh Kumar, Sandip Dutta, & Prashant Pranav (2023). Supervised learning for Attack Detection in Cloud. International Journal of Experimental Research and Review, 31.

Sasha Mahdavi Hezavehi, & Rouhollah Rahmani (2023). Interactive anomaly-based DDoS attack detection method in cloud computing environments using a third party auditor. Journal of Parallel and Distributed Computing, 178.

M. Arunkumar, & K. Ashok Kumar (2023). GOSVM: Gannet optimization based support vector machine for malicious attack detection in cloud environment. International Journal of Information Technology (Singapore), 15.

Adel Binbusayyis (2024). Hybrid VGG19 and 2D-CNN for intrusion detection in the FOG-cloud environment. Expert Systems with Applications, 238.

Choudhary, S., & Kesswani, N. (2020). Analysis of KDD-Cup’99, NSL-KDD and UNSW-NB15 Datasets using Deep Learning in IoT. In Procedia Computer Science (Vol. 167, pp. 1561–1573). Elsevier BV. https://doi.org/10.1016/j.procs.2020.03.367.

Downloads

Published

12.06.2024

How to Cite

S. Rekha Garikamukkala. (2024). Proactive Detection of Attacks on Cloud-based Applications using Machine Learning. International Journal of Intelligent Systems and Applications in Engineering, 12(4), 1541–1561. Retrieved from https://www.ijisae.org/index.php/IJISAE/article/view/6450

Issue

Section

Research Article