MACHINE LEARNING BASED CLOUD COMPUTING INTRUSION DETECTION

Main Article Content

Akwaeno Isong
Bliss Utibe-Abasi Stephen
Philip Asuquo
Chijioke Ihemereze
Imoh Enang

Abstract

Based on today’s technologically networked world, a sophisticated networking technology known as Software-Defined Networking (SDN) is utilized in cloud computing environments to improve the effectiveness of network management. However, SDN’s centralized nature makes it vulnerable to DDoS attacks. This study introduces a technique for detecting DDoS attacks within a cloud computing setting. The research seeks to apply an ensemble machine learning approach for statistically identifying DDoS attacks in cloud network traffic, categorizing them as either harmful or harmless. Various machine learning algorithms, including K-Nearest Neighbors, Random Forest (RF), and Decision Tree, were utilized as foundational classifiers in the suggested ensemble machine learning model. A dataset of SDN–DDoS attacks was utilized to assess the efficacy of the base classifiers. The classifiers were trained using 80% of the dataset and evaluated on 20%. The results of the experiment indicated that the Random Forest and Random Forest classifiers attained 100% accuracy, whereas the K-Nearest Neighbor classifier achieved an accuracy of 98.21%. The ensemble machine learning model employed a majority voting technique for final prediction and achieved an accuracy of 100% on the test set, ranking as the best compared to benchmark models.

Article Details

How to Cite
Isong , A. ., Stephen , B. U.-A., Asuquo , P. ., Ihemereze , C. ., & Enang , I. . (2026). MACHINE LEARNING BASED CLOUD COMPUTING INTRUSION DETECTION. Advanced Information Systems, 10(1), 115–125. https://doi.org/10.20998/2522-9052.2026.1.13
Section
Methods of information systems protection
Author Biographies

Akwaeno Isong , University of Uyo, Uyo, Nigeria

PhD student of Computer Engineering Department

Bliss Utibe-Abasi Stephen , University of Uyo, Uyo, Nigeria

PhD, Associate Professor, Associate Professor of Computer Engineering Department

Philip Asuquo , University of Uyo, Uyo, Nigeria

PhD, Professor, Professor of Computer Engineering Department

Chijioke Ihemereze , Federal Polytechnic Nekede, Owerri, Nigeria

Principal Lecturer, Principal Lecturer in Computer Engineering Department

Imoh Enang , Federal Polytechnic Nekede, Owerri, Nigeria

Lecturer II, Lecturer II in Computer Engineering Department

References

Mhamdi, L. and Isa, M.M. (2024), “Securing SDN: Hybrid auto encoder random forest for intrusion detection and attack mitigation”, Journal of Network and Computer Applications., vol. 225, article number 103868, doi: https://doi.org/10.1016/j.jnca.2024.103868

Rajadurai, H. and Gandhi, U.D. (2022), “A stacked ensemble learning model for intrusion detection in wireless network”, Neural computing and applications, vol. 34, pp. 15387–15395, doi: https://doi.org/10.1007/s00521-020-04986-5

Amaran, S. and Mohan, R.M. (2021), “Intrusion detection system using optimal support vector machine for wireless sensor networks”, 2021 International Conference on Artificial Intelligence and Smart Systems (ICAIS), IEEE, pp. 1100–1104, doi: https://doi.org/10.1109/ICAIS50930.2021.9395919

Sharma, S., Zavarsky, P. and Butakov, S. (2020), “Machine learning based intrusion detection system for web-based attacks”, 2020 IEEE 6th Intl Conference on Big Data Security on Cloud (Big Data Security), IEEE, pp. 227–230, doi: https://doi.org/10.1109/BigDataSecurity-HPSC-IDS49724.2020.00048

Elmrabit, N., Zhou, F., Li, F. and Zhou, H. (2020), “Evaluation of machine learning algorithms for anomaly detection”, 2020 international conference on cyber security and protection of digital services (cybersecurity), IEEE. pp. 1–8, doi: https://doi.org/10.1109/CyberSecurity49315.2020.9138871

Gao, X., Shan, C., Hu, C., Niu, Z. and Liu, Z. (2019), “An adaptive ensemble machine learning model for intrusion detection”, Ieee Access 7, pp. 82512– 82521, doi: https://doi.org/10.1109/ACCESS.2019.2923640

Venkatesan, S. (2023), “Design an intrusion detection system based on feature selection using ml algorithms”, Mathematical Statistician and Engineering Applications, vol. 72(1), pp. 702–710, available at: https://www.philstat.org/index.php/MSEA/article/view/2000

Alduailij, M., Khan, Q.W., Tahir, M., Sardaraz, M., Alduailij, M. and Malik, F. (2022), “Machine-learning-based DDoS attack detection using mutual information and random forest feature importance method, Symmetry, vol. 14, 1095, doi: https://doi.org/10.3390/sym14061095

Jaber, A.N. and Rehman, S.U. (2020), “FCM–SVM based intrusion detection system for cloud computing environment”, Cluster Computing, vol. 23, pp. 3221– 3231, doi: https://doi.org/10.1007/s10586-020-03082-6

Aldallal, A. and Alisa, F. (2021), “Effective intrusion detection system to secure data in cloud using machine learning”, Symmetry, vol. 13, 2306, doi: https://doi.org/10.3390/sym13122306

Singh, P. and Ranga, V. (2021), “Attack and intrusion detection in cloud computing using an ensemble learning approach”, International Journal of Information Technology, vol. 13, pp. 565–571, doi: https://doi.org/10.1007/s41870-020-00583-w

Wei, J., Long, C., Li, J. and Zhao, J. (2020), “An intrusion detection algorithm based on bag representation with ensemble support vector machine in cloud computing”, Concurrency and Computation: Practice and Experience, vol. 32, e5922, doi: https://doi.org/10.1002/cpe.5922

Mohmand, M.I., Hussain, H., Khan, A.A., Ullah, U., Zakarya, M., Ahmed, A., Raza, M., Rahman, I.U. and Haleem, M. (2022), “A machine learning based classification and prediction technique for DDoS attacks, IEEE Access, vol. 10, pp. 21443–21454, doi: https://doi.org/10.1109/ACCESS.2022.3152577

Firdaus, D., Munadi, R. and Purwanto, Y. (2020, “DDoS attack detection in software defined network using ensemble k-means++ and random forest”, 2020 3rd International Seminar on Research of Information Technology and Intelligent Systems (ISRITI), IEEE, pp. 164–169, doi: https://doi.org/10.1109/ISRITI51436.2020.9315521

Nadeem, M.W., Goh, H.G., Ponnusamy, V. and Aun, Y. (2022), “DDoS detection in SDN using machine learning techniques”, Computers, Materials & Continua, vol. 71(1), pp. 771–789, doi: https://doi.org/10.32604/cmc.2022.021669

Ahuja, N., Singal, G., Mukhopadhyay, D. and Kumar, N. (2021), “Automated DDoS attack detection in software defined networking”, Journal of Network and Computer Applications, vol. 187, doi: https://doi.org/10.1016/j.jnca.2021.103108

Janabi, A.H., Kanakis, T. and Johnson, M. (2022), “Convolutional neural network based algorithm for early warning proactive system security in software defined networks”, IEEE Access, vol. 10, pp. 14301–14310, doi: https://doi.org/10.1109/ACCESS.2022.3148134

Akinwumi, A., Akingbesote, A., Ajayi, O. and Aranuwa, F. (2022), “Detection of distributed denial of service (DDoS) attacks using convolutional neural networks”, Nigerian Journal of Technology, vol. 41, pp. 1017–1024, doi: https://doi.org/10.4314/njt.v41i6.12

Gadallah, W.G., Omar, N.M. and Ibrahim, H.M. (2021), “Machine learning - based distributed denial of service attacks detection technique using new features in software-defined networks”, International Journal of Computer Network & Information Security, vol. 13, pp. 15–27, doi: https://doi.org/10.5815/ijcnis.2021.03.02

Babaei, A., Kebria, P.M., Dalvand, M.M. and Nahavandi, S.( 2023), “A review of machine learning-based security in cloud computing”, arXiv preprint, arXiv:2309.04911, doi: https://doi.org/10.48550/arXiv.2309.04911

Housman, O.G., Isnaini, H. and Sumadi, F.D.S. (2020), “SDN-DDoS (ICMP,TCP,UDP)”, Mendeley Data, Version 1, doi: https://doi.org/10.17632/hkjbp67rsc.1

Peterson, L.E. (2009), “K-nearest neighbor”, Scholarpedia, vol. 4(2), doi: http://dx.doi.org/10.4249/scholarpedia.1883

Batista, G. and Silva, D.F (2009), “How K-nearest neighbor parameters affect its performance”, Semantic Scholar, Corpus ID: 16606615, pp. 1–12, available at: https://api.semanticscholar.org/CorpusID:16606615

Okandeji, A., Odeyinka, O., Sogbesan, A. and Ogunye, N. (2022), “A comparative analysis of haemoglobin variants using machine learning algorithms”, Nigerian Journal of Technology, vol. 41, pp. 789–796, doi: https://doi.org/10.4314/njt.v41i4.16

Vemulapalli, S., Sushma Sri, M., Varshitha, P., Kumar, P., Vinay, T. (2024), “An experimental analysis of machine learning techniques crop for recom- mendation”, Nigerian Journal of Technology, vol. 43(2), pp. 301–308, doi: https://doi.org/10.4314/njt.v43i2.13

Nkiama, H., Said, S.Z.M. and Saidu, M. (2016), “A subset feature elimination mechanism for intrusion detection system”, International Journal of Advanced Computer Science and Applications, vol. 7, doi:

https://dx.doi.org/10.14569/IJACSA.2016.070419

Xin, Y., Kong, L., Liu, Z., Chen, Y., Li, Y., Zhu, H., Gao, M., Hou, H. and Wang, C. (2018), “Machine learning and deep learning methods for cybersecurity”, IEEE access, vol. 6, pp. 35365–35381, doi: https://doi.org/10.1109/ACCESS.2018.2836950

Shen, Z., Zhang, Y. and Chen, W. (2019), “A bayesian classification intrusion detection method based on the fusion of PCA and LDA”, Security and Communication Networks, vol. 2019, pp. 1–11, doi: https://doi.org/10.1155/2019/6346708