{"title":"Detection of Cyberattacks in Cloud Computing Service Delivery Models using Correlation based Feature Selection","authors":"F. Abdullayeva","doi":"10.1109/AICT52784.2021.9620347","DOIUrl":null,"url":null,"abstract":"The paper investigates the security issues of cloud computing, analyses cyberattacks on its service delivery models. For the detection of cyberattacks in Cloud Computing Service Delivery Models a method based on feature selection using correlations among features is proposed. Using the Pearson method, a correlation was found among the features and removing of these features from the dataset provided. Various classification algorithms have been applied to the newly formed dataset. Compared to the test process performed on the original dataset, the classification algorithms gave better results on the dataset where the feature selection procedure was applied.","PeriodicalId":150606,"journal":{"name":"2021 IEEE 15th International Conference on Application of Information and Communication Technologies (AICT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2021-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2021 IEEE 15th International Conference on Application of Information and Communication Technologies (AICT)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/AICT52784.2021.9620347","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 2
Abstract
The paper investigates the security issues of cloud computing, analyses cyberattacks on its service delivery models. For the detection of cyberattacks in Cloud Computing Service Delivery Models a method based on feature selection using correlations among features is proposed. Using the Pearson method, a correlation was found among the features and removing of these features from the dataset provided. Various classification algorithms have been applied to the newly formed dataset. Compared to the test process performed on the original dataset, the classification algorithms gave better results on the dataset where the feature selection procedure was applied.