CFP last date
22 April 2024
Reseach Article

A Survey on Cloud Attack Detection using Machine Learning Techniques

by Gavini Sreelatha, A. Vinaya Babu, Divya Midhunchakkarvarthy
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 175 - Number 34
Year of Publication: 2020
Authors: Gavini Sreelatha, A. Vinaya Babu, Divya Midhunchakkarvarthy
10.5120/ijca2020920887

Gavini Sreelatha, A. Vinaya Babu, Divya Midhunchakkarvarthy . A Survey on Cloud Attack Detection using Machine Learning Techniques. International Journal of Computer Applications. 175, 34 ( Dec 2020), 21-27. DOI=10.5120/ijca2020920887

@article{ 10.5120/ijca2020920887,
author = { Gavini Sreelatha, A. Vinaya Babu, Divya Midhunchakkarvarthy },
title = { A Survey on Cloud Attack Detection using Machine Learning Techniques },
journal = { International Journal of Computer Applications },
issue_date = { Dec 2020 },
volume = { 175 },
number = { 34 },
month = { Dec },
year = { 2020 },
issn = { 0975-8887 },
pages = { 21-27 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume175/number34/31669-2020920887/ },
doi = { 10.5120/ijca2020920887 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T00:40:15.094704+05:30
%A Gavini Sreelatha
%A A. Vinaya Babu
%A Divya Midhunchakkarvarthy
%T A Survey on Cloud Attack Detection using Machine Learning Techniques
%J International Journal of Computer Applications
%@ 0975-8887
%V 175
%N 34
%P 21-27
%D 2020
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Cloud concepts such as resource sharing, outsourcing, and multi-tenancy create significant challenges to the security community. Also, trusted third party and web technologies based cloud service provisioning arises new security threats in the cloud environment. Cloud security has become a vital research area with new security models, protocols, and policies in recent years. Despite the fact, the existing cloud security research still faces the shortcomings in improving the detection accuracy and detecting the new or unknown attacks in the cloud. To address the constraints above, many security researchers have focused on developing cloud security models with the assistance of the machine learning methods. Machine learning techniques play a significant role in automatically discovering the potential difference between legitimate and malicious data with high accuracy. The deep learning is a branch of machine learning that provides remarkable performance in cloud security issues. This survey provides a comprehensive study of cloud security concerns, traditional security measures, and machine learning-based security solutions in the cloud environment. Initially, it identifies cloud vulnerabilities and presents state-of-the-art methods to control security threats, weaknesses, and attacks. This work also reviews the security solutions developed by machine learning and deep learning techniques for the cloud environment.

References
  1. Varghese, B. and Buyya, R., “Next generation cloud computing: New trends and research directions”, Future Generation Computer Systems, Vol.79, pp.849-861, 2018
  2. Almorsy, M., Grundy, J. and Müller, I., “An analysis of the cloud computing security problem”, arXiv preprint arXiv:1609.01107, 2016
  3. Singh, S., Jeong, Y.S. and Park, J.H., “A survey on cloud computing security: Issues, threats, and solutions”, Journal of Network and Computer Applications, Vol.75, pp.200-222, 2016
  4. Mishra, P., Pilli, E.S., Varadharajan, V. and Tupakula, U., “Intrusion detection techniques in cloud environment: A survey”, Journal of Network and Computer Applications, Vol.77, pp.18-47, 2017
  5. Liu, H. and Lang, B., “Machine Learning and Deep Learning Methods for Intrusion Detection Systems: A Survey”, Applied Sciences, Vol.9, No.20, p.4396, 2019
  6. Kumar, R.S.S., Wicker, A. and Swann, M., “Practical machine learning for cloud intrusion detection: challenges and the way forward”, In Proceedings of the 10th ACM Workshop on Artificial Intelligence and Security, pp.81-90, 2017
  7. Zekri, M., El Kafhali, S., Aboutabit, N. and Saadi, Y., “DDoS attack detection using machine learning techniques in cloud computing environments”, IEEE 3rd International Conference of Cloud Computing Technologies and Applications (CloudTech), pp.1-7, 2017
  8. Xin, Y., Kong, L., Liu, Z., Chen, Y., Li, Y., Zhu, H., Gao, M., Hou, H. and Wang, C., “Machine learning and deep learning methods for cybersecurity”, IEEE Access, Vol.6, pp.35365-35381, 2018
  9. Khorshed, M.T., Ali, A.S. and Wasimi, S.A., “A survey on gaps, threat remediation challenges and some thoughts for proactive attack detection in cloud computing”, Future Generation computer systems, Vol.28, No.6, pp.833-851, 2012
  10. Wani, A.R., Rana, Q.P., Saxena, U. and Pandey, N., “Analysis and Detection of DDoS Attacks on Cloud Computing Environment using Machine Learning Techniques”, IEEE Amity International Conference on Artificial Intelligence (AICAI), pp.870-875, 2019
  11. Pitropakis, N., Panaousis, E., Giannetsos, T., Anastasiadis, E. and Loukas, G., “A taxonomy and survey of attacks against machine learning”, Computer Science Review, Vol.34, p.100199, 2019
  12. Papernot, N., McDaniel, P., Sinha, A. and Wellman, M., “Towards the science of security and privacy in machine learning”, arXiv preprint arXiv:1611.03814, 2016
  13. Khan, M.A., “A survey of security issues for cloud computing”, Journal of network and computer applications, Vol.71, pp.11-29, 2016
  14. Dahbur, K., Mohammad, B. and Tarakji, A.B., “A survey of risks, threats and vulnerabilities in cloud computing”, In Proceedings of the 2011 International conference on intelligent semantic Web-services and applications, pp.1-6, 2011
  15. Singh, A. and Chatterjee, K., “Cloud security issues and challenges: A survey”, Journal of Network and Computer Applications, Vol.79, pp.88-115, 2017
  16. Zeadally, S., Yu, B., Jeong, D.H. and Liang, L., “Detecting insider threats: Solutions and trends” Information security journal: A global perspective, Vol.21, No.4, pp.183-192, 2012
  17. Hong, J.B., Nhlabatsi, A., Kim, D.S., Hussein, A., Fetais, N. and Khan, K.M., “Systematic identification of threats in the cloud: A survey”, Computer Networks, Vol.150, pp.46-69, 2019
  18. Kumar, R. and Goyal, R., “On cloud security requirements, threats, vulnerabilities and countermeasures: A survey”, Computer Science Review, Vol.33, pp.1-48, 2019
  19. Juliadotter, N.V. and Choo, K.K.R., “Cloud attack and risk assessment taxonomy”, IEEE Cloud Computing, Vol.2, No.1, pp.14-20, 2015
  20. Alarqan, M.A., Zaaba, Z.F. and Almomani, A., “Detection Mechanisms of DDoS Attack in Cloud Computing Environment: A Survey”, In International Conference on Advances in Cyber Security, Springer, pp.138-152, 2019
  21. Lin, W.C., Ke, S.W. and Tsai, C.F., “CANN: An intrusion detection system based on combining cluster centers and nearest neighbors”, Knowledge-based systems, Vol.78, pp.13-21, 2015
  22. Elhag, S., Fernández, A., Bawakid, A., Alshomrani, S. and Herrera, F., “On the combination of genetic fuzzy systems and pairwise learning for improving detection rates on intrusion detection systems”, Expert Systems with Applications, Vol.42, No.1, pp.193-202, 2015
  23. Buczak, A.L. and Guven, E., “A survey of data mining and machine learning methods for cyber security intrusion detection”, IEEE Communications surveys & tutorials, Vol.18, No.2, pp.1153-1176, 2016
  24. Kwon, D., Kim, H., Kim, J., Suh, S.C., Kim, I. and Kim, K.J., “A survey of deep learning-based network anomaly detection”, Cluster Computing, pp.1-13, 2017
  25. Hochenbaum, J., Vallis, O.S. and Kejariwal, A., “Automatic anomaly detection in the cloud via statistical learning”, arXiv preprint arXiv:1704.07706, 2017
  26. Gulenko, A., Wallschläger, M., Schmidt, F., Kao, O. and Liu, F., “Evaluating machine learning algorithms for anomaly detection in clouds”, IEEE International Conference on Big Data (Big Data), pp.2716-2721, 2016
  27. Habeeb, R.A.A., Nasaruddin, F., Gani, A., Hashem, I.A.T., Ahmed, E. and Imran, M., “Real-time big data processing for anomaly detection: A Survey. International Journal of Information Management, Vol.45, pp.289-307, 2019
  28. Jia, W., Shukla, R.M. and Sengupta, S., “Anomaly Detection using Supervised Learning and Multiple Statistical Methods”, 18th IEEE International Conference On Machine Learning And Applications (ICMLA), pp.1291-1297, 2019
  29. Salman, T., Bhamare, D., Erbad, A., Jain, R. and Samaka, M., “Machine learning for anomaly detection and categorization in multi-cloud environments”, IEEE 4th International Conference on Cyber Security and Cloud Computing (CSCloud), pp.97-103, 2017
  30. Wang, G., Yang, J. and Li, R., “Imbalanced SVM‐Based Anomaly Detection Algorithm for Imbalanced Training Datasets”, Etri Journal, Vol.39, No.5, pp.621-631, 2017
  31. Alguliyev, R.M., Aliguliyev, R.M. and Abdullayeva, F.J., “Hybridisation of classifiers for anomaly detection in big data”, International Journal of Big Data Intelligence, Vol.6, No.1, pp.11-19, 2019
  32. Watson, M.R., Marnerides, A.K., Mauthe, A. and Hutchison, D., “Malware detection in cloud computing infrastructures”, IEEE Transactions on Dependable and Secure Computing, Vol.13, No.2, pp.192-205, 2015
  33. Wang, G., Yang, J. and Li, R., “An anomaly detection framework based on ICA and Bayesian classification for IaaS platforms”, KSII Transactions on Internet and Information Systems (TIIS), Vol.10, No.8, pp.3865-3883, 2016
  34. Hosseini, S. and Azizi, M., “The hybrid technique for DDoS detection with supervised learning algorithms”, Computer Networks, Vol.158, pp.35-45, 2019
  35. Gai, K., Qiu, M. and Elnagdy, S.A., “Security-aware information classifications using supervised learning for cloud-based cyber risk management in financial big data”, IEEE 2nd International Conference on Big Data Security on Cloud (BigDataSecurity), IEEE International Conference on High Performance and Smart Computing (HPSC), and IEEE International Conference on Intelligent Data and Security (IDS), pp.197-202, 2016
  36. Ariyaluran Habeeb, R.A., Nasaruddin, F., Gani, A., Amanullah, M.A., Abaker Targio Hashem, I., Ahmed, E. and Imran, M., “Clustering‐based real‐time anomaly detection—A breakthrough in big data technologies”, Transactions on Emerging Telecommunications Technologies, p.e3647, 2019
  37. Elsner, D., Aleatrati Khosroshahi, P., MacCormack, A.D. and Lagerström, R., “Multivariate Unsupervised Machine Learning for Anomaly Detection in Enterprise Applications”, In Proceedings of the 52nd Hawaii International Conference on System Sciences, 2019
  38. Gander, M., Felderer, M., Katt, B., Tolbaru, A., Breu, R. and Moschitti, A., “Anomaly detection in the cloud: Detecting security incidents via machine learning”, InInternational Workshop on Eternal Systems, Springer, pp.103-116, 2012
  39. Abdelsalam, M., Krishnan, R. and Sandhu, R., “Clustering-based IaaS cloud monitoring”, IEEE 10th International Conference on Cloud Computing (CLOUD), pp.672-679, 2017
  40. Zhang, X., Meng, F. and Xu, J., “Perfinsight: A robust clustering-based abnormal behavior detection system for large-scale cloud”, IEEE 11th International Conference on Cloud Computing (CLOUD), pp.896-899, 2018
  41. Sauvanaud, C., Silvestre, G., Kaâniche, M. and Kanoun, K., “Data stream clustering for online anomaly detection in cloud applications”, IEEE 11th European Dependable Computing Conference (EDCC), pp.120-131, 2015
  42. Kim, H., Kim, J., Kim, Y., Kim, I. and Kim, K.J., “Design of network threat detection and classification based on machine learning on cloud computing”, Cluster Computing, Vol.22, No.1, pp.2341-2350, 2019
  43. Nedelkoski, S., Cardoso, J. and Kao, O., “Anomaly Detection and Classification using Distributed Tracing and Deep Learning”, 2018
  44. Garg, S., Kaur, K., Kumar, N., Kaddoum, G., Zomaya, A.Y. and Ranjan, R., “A hybrid deep learning-based model for anomaly detection in cloud datacenter networks”, IEEE Transactions on Network and Service Management, Vol.16, No.3, pp.924-935, 2019
  45. Garg, S., Kaur, K., Batra, S., Aujla, G.S., Morgan, G., Kumar, N., Zomaya, A.Y. and Ranjan, R., “En-ABC: An ensemble artificial bee colony based anomaly detection scheme for cloud environment”, Journal of Parallel and Distributed Computing, Vol.135, pp.219-233, 2020
  46. Alrawashdeh, K. and Purdy, C., “Toward an online anomaly intrusion detection system based on deep learning”, 15th IEEE International Conference on Machine Learning and Applications (ICMLA), pp.195-200, 2016
  47. Yang, Z.X., Qin, X.L., Li, W.R. and Yang, Y.J., “A DDoS detection approach based on CNN in cloud computing”, In Applied Mechanics and Materials, Vol.513, pp.579-584, 2014
  48. Wang, M., Lu, Y. and Qin, J., “A dynamic MLP-based DDoS attack detection method using feature selection and feedback”, Computers & Security, Vol.88, p.101645, 2020
  49. Wen, T. and Keyes, R., “Time Series Anomaly Detection Using Convolutional Neural Networks and Transfer Learning”, arXiv preprint arXiv:1905.13628, 2019
  50. Vercruyssen, V., Meert, W. and Davis, J., “Transfer learning for time series anomaly detection”, In CEUR Workshop Proceedings, Vol.1924, pp.27-37, 2017
  51. Zhao, J., Shetty, S. and Pan, J.W., “Feature-based transfer learning for network security”, In MILCOM 2017-2017 IEEE Military Communications Conference (MILCOM), pp.17-22, 2017
  52. Zhao, J., Shetty, S., Pan, J.W., Kamhoua, C. and Kwiat, K., “Transfer learning for detecting unknown network attacks”, EURASIP Journal on Information Security, Vol.2019, No.1, p.1, 2019
  53. Zhang, X., Kim, J., Lin, Q., Lim, K., Kanaujia, S.O., Xu, Y., Jamieson, K., Albarghouthi, A., Qin, S., Freedman, M.J. and Xiong, Y., “Cross-dataset time series anomaly detection for cloud systems”, In 2019 {USENIX} Annual Technical Conference ({USENIX}{ATC} 19), pp.1063-1076, 2019.
  54. Samreen, F., Blair, G.S. and Elkhatib, Y., “Transferable Knowledge for Low-cost Decision Making in Cloud Environments”, arXiv preprint arXiv:1905.02448, 2019
Index Terms

Computer Science
Information Sciences

Keywords

Cloud Computing Cloud Security Security Threats Vulnerabilities Attacks Machine Learning and Deep Learning.