Hybrid Intrusion Detection System Using Machine Learning Techniques in Cloud Computing Environments

Ibraheem Aljamal, Ali Tekeoglu, Korkut Bekiroglu, Saumendra Sengupta
{"title":"Hybrid Intrusion Detection System Using Machine Learning Techniques in Cloud Computing Environments","authors":"Ibraheem Aljamal, Ali Tekeoglu, Korkut Bekiroglu, Saumendra Sengupta","doi":"10.1109/SERA.2019.8886794","DOIUrl":null,"url":null,"abstract":"Intrusion detection is one essential tool towards building secure and trustworthy Cloud computing environment, given the ubiquitous presence of cyber attacks that proliferate rapidly and morph dynamically. In our current working paradigm of resource, platform and service consolidations, Cloud Computing provides a significant improvement in the cost metrics via dynamic provisioning of IT services. Since almost all cloud computing networks lean on providing their services through Internet, they are prone to experience variety of security issues. Therefore, in cloud environments, it is necessary to deploy an Intrusion Detection System (IDS) to detect new and unknown attacks in addition to signature based known attacks, with high accuracy. In our deliberation we assume that a system or a network “anomalous” event is synonymous to an “intrusion” event when there is a significant departure in one or more underlying system or network activities. There are couple of recently proposed ideas that aim to develop a hybrid detection mechanism, combining advantages of signature-based detection schemes with the ability to detect unknown attacks based on anomalies. In this work, we propose a network based anomaly detection system at the Cloud Hypervisor level that utilizes a hybrid algorithm: a combination of K-means clustering algorithm and SVM classification algorithm, to improve the accuracy of the anomaly detection system. Dataset from UNSW-NB15 study is used to evaluate the proposed approach and results are compared with previous studies. The accuracy for our proposed K-means clustering model is slightly higher than others. However, the accuracy we obtained from the SVM model is still low for supervised techniques.","PeriodicalId":438947,"journal":{"name":"2019 IEEE 17th International Conference on Software Engineering Research, Management and Applications (SERA)","volume":"49 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2019-05-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"27","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2019 IEEE 17th International Conference on Software Engineering Research, Management and Applications (SERA)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/SERA.2019.8886794","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 27

Abstract

Intrusion detection is one essential tool towards building secure and trustworthy Cloud computing environment, given the ubiquitous presence of cyber attacks that proliferate rapidly and morph dynamically. In our current working paradigm of resource, platform and service consolidations, Cloud Computing provides a significant improvement in the cost metrics via dynamic provisioning of IT services. Since almost all cloud computing networks lean on providing their services through Internet, they are prone to experience variety of security issues. Therefore, in cloud environments, it is necessary to deploy an Intrusion Detection System (IDS) to detect new and unknown attacks in addition to signature based known attacks, with high accuracy. In our deliberation we assume that a system or a network “anomalous” event is synonymous to an “intrusion” event when there is a significant departure in one or more underlying system or network activities. There are couple of recently proposed ideas that aim to develop a hybrid detection mechanism, combining advantages of signature-based detection schemes with the ability to detect unknown attacks based on anomalies. In this work, we propose a network based anomaly detection system at the Cloud Hypervisor level that utilizes a hybrid algorithm: a combination of K-means clustering algorithm and SVM classification algorithm, to improve the accuracy of the anomaly detection system. Dataset from UNSW-NB15 study is used to evaluate the proposed approach and results are compared with previous studies. The accuracy for our proposed K-means clustering model is slightly higher than others. However, the accuracy we obtained from the SVM model is still low for supervised techniques.
云计算环境下基于机器学习技术的混合入侵检测系统
入侵检测是构建安全可靠的云计算环境的重要工具,因为网络攻击无处不在,并且迅速扩散和动态变化。在我们当前的资源、平台和服务整合的工作范式中,云计算通过动态提供IT服务,显著改善了成本指标。由于几乎所有的云计算网络都依赖于通过Internet提供服务,因此它们容易遇到各种安全问题。因此,在云环境中,除了基于签名的已知攻击外,还需要部署入侵检测系统(IDS)来检测新的和未知的攻击,并且检测精度要高。在我们的审议中,我们假设当一个或多个底层系统或网络活动发生重大偏离时,系统或网络“异常”事件与“入侵”事件是同义词。最近提出了一些想法,旨在开发一种混合检测机制,将基于签名的检测方案的优点与基于异常检测未知攻击的能力相结合。在这项工作中,我们提出了一个基于云Hypervisor级别的网络异常检测系统,该系统利用混合算法:K-means聚类算法和SVM分类算法的结合,以提高异常检测系统的准确性。利用UNSW-NB15研究的数据集对所提出的方法进行了评估,并将结果与前人的研究结果进行了比较。我们提出的K-means聚类模型的精度略高于其他模型。然而,我们从SVM模型中获得的精度对于监督技术来说仍然很低。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信