MACHINE LEARNING BASED CLOUD COMPUTING INTRUSION DETECTION
Main Article Content
Abstract
Based on today’s technologically networked world, a sophisticated networking technology known as Software-Defined Networking (SDN) is utilized in cloud computing environments to improve the effectiveness of network management. However, SDN’s centralized nature makes it vulnerable to DDoS attacks. This study introduces a technique for detecting DDoS attacks within a cloud computing setting. The research seeks to apply an ensemble machine learning approach for statistically identifying DDoS attacks in cloud network traffic, categorizing them as either harmful or harmless. Various machine learning algorithms, including K-Nearest Neighbors, Random Forest (RF), and Decision Tree, were utilized as foundational classifiers in the suggested ensemble machine learning model. A dataset of SDN–DDoS attacks was utilized to assess the efficacy of the base classifiers. The classifiers were trained using 80% of the dataset and evaluated on 20%. The results of the experiment indicated that the Random Forest and Random Forest classifiers attained 100% accuracy, whereas the K-Nearest Neighbor classifier achieved an accuracy of 98.21%. The ensemble machine learning model employed a majority voting technique for final prediction and achieved an accuracy of 100% on the test set, ranking as the best compared to benchmark models.
Article Details
References
Mhamdi, L. and Isa, M.M. (2024), “Securing SDN: Hybrid auto encoder random forest for intrusion detection and attack mitigation”, Journal of Network and Computer Applications., vol. 225, article number 103868, doi: https://doi.org/10.1016/j.jnca.2024.103868
Rajadurai, H. and Gandhi, U.D. (2022), “A stacked ensemble learning model for intrusion detection in wireless network”, Neural computing and applications, vol. 34, pp. 15387–15395, doi: https://doi.org/10.1007/s00521-020-04986-5
Amaran, S. and Mohan, R.M. (2021), “Intrusion detection system using optimal support vector machine for wireless sensor networks”, 2021 International Conference on Artificial Intelligence and Smart Systems (ICAIS), IEEE, pp. 1100–1104, doi: https://doi.org/10.1109/ICAIS50930.2021.9395919
Sharma, S., Zavarsky, P. and Butakov, S. (2020), “Machine learning based intrusion detection system for web-based attacks”, 2020 IEEE 6th Intl Conference on Big Data Security on Cloud (Big Data Security), IEEE, pp. 227–230, doi: https://doi.org/10.1109/BigDataSecurity-HPSC-IDS49724.2020.00048
Elmrabit, N., Zhou, F., Li, F. and Zhou, H. (2020), “Evaluation of machine learning algorithms for anomaly detection”, 2020 international conference on cyber security and protection of digital services (cybersecurity), IEEE. pp. 1–8, doi: https://doi.org/10.1109/CyberSecurity49315.2020.9138871
Gao, X., Shan, C., Hu, C., Niu, Z. and Liu, Z. (2019), “An adaptive ensemble machine learning model for intrusion detection”, Ieee Access 7, pp. 82512– 82521, doi: https://doi.org/10.1109/ACCESS.2019.2923640
Venkatesan, S. (2023), “Design an intrusion detection system based on feature selection using ml algorithms”, Mathematical Statistician and Engineering Applications, vol. 72(1), pp. 702–710, available at: https://www.philstat.org/index.php/MSEA/article/view/2000
Alduailij, M., Khan, Q.W., Tahir, M., Sardaraz, M., Alduailij, M. and Malik, F. (2022), “Machine-learning-based DDoS attack detection using mutual information and random forest feature importance method, Symmetry, vol. 14, 1095, doi: https://doi.org/10.3390/sym14061095
Jaber, A.N. and Rehman, S.U. (2020), “FCM–SVM based intrusion detection system for cloud computing environment”, Cluster Computing, vol. 23, pp. 3221– 3231, doi: https://doi.org/10.1007/s10586-020-03082-6
Aldallal, A. and Alisa, F. (2021), “Effective intrusion detection system to secure data in cloud using machine learning”, Symmetry, vol. 13, 2306, doi: https://doi.org/10.3390/sym13122306
Singh, P. and Ranga, V. (2021), “Attack and intrusion detection in cloud computing using an ensemble learning approach”, International Journal of Information Technology, vol. 13, pp. 565–571, doi: https://doi.org/10.1007/s41870-020-00583-w
Wei, J., Long, C., Li, J. and Zhao, J. (2020), “An intrusion detection algorithm based on bag representation with ensemble support vector machine in cloud computing”, Concurrency and Computation: Practice and Experience, vol. 32, e5922, doi: https://doi.org/10.1002/cpe.5922
Mohmand, M.I., Hussain, H., Khan, A.A., Ullah, U., Zakarya, M., Ahmed, A., Raza, M., Rahman, I.U. and Haleem, M. (2022), “A machine learning based classification and prediction technique for DDoS attacks, IEEE Access, vol. 10, pp. 21443–21454, doi: https://doi.org/10.1109/ACCESS.2022.3152577
Firdaus, D., Munadi, R. and Purwanto, Y. (2020, “DDoS attack detection in software defined network using ensemble k-means++ and random forest”, 2020 3rd International Seminar on Research of Information Technology and Intelligent Systems (ISRITI), IEEE, pp. 164–169, doi: https://doi.org/10.1109/ISRITI51436.2020.9315521
Nadeem, M.W., Goh, H.G., Ponnusamy, V. and Aun, Y. (2022), “DDoS detection in SDN using machine learning techniques”, Computers, Materials & Continua, vol. 71(1), pp. 771–789, doi: https://doi.org/10.32604/cmc.2022.021669
Ahuja, N., Singal, G., Mukhopadhyay, D. and Kumar, N. (2021), “Automated DDoS attack detection in software defined networking”, Journal of Network and Computer Applications, vol. 187, doi: https://doi.org/10.1016/j.jnca.2021.103108
Janabi, A.H., Kanakis, T. and Johnson, M. (2022), “Convolutional neural network based algorithm for early warning proactive system security in software defined networks”, IEEE Access, vol. 10, pp. 14301–14310, doi: https://doi.org/10.1109/ACCESS.2022.3148134
Akinwumi, A., Akingbesote, A., Ajayi, O. and Aranuwa, F. (2022), “Detection of distributed denial of service (DDoS) attacks using convolutional neural networks”, Nigerian Journal of Technology, vol. 41, pp. 1017–1024, doi: https://doi.org/10.4314/njt.v41i6.12
Gadallah, W.G., Omar, N.M. and Ibrahim, H.M. (2021), “Machine learning - based distributed denial of service attacks detection technique using new features in software-defined networks”, International Journal of Computer Network & Information Security, vol. 13, pp. 15–27, doi: https://doi.org/10.5815/ijcnis.2021.03.02
Babaei, A., Kebria, P.M., Dalvand, M.M. and Nahavandi, S.( 2023), “A review of machine learning-based security in cloud computing”, arXiv preprint, arXiv:2309.04911, doi: https://doi.org/10.48550/arXiv.2309.04911
Housman, O.G., Isnaini, H. and Sumadi, F.D.S. (2020), “SDN-DDoS (ICMP,TCP,UDP)”, Mendeley Data, Version 1, doi: https://doi.org/10.17632/hkjbp67rsc.1
Peterson, L.E. (2009), “K-nearest neighbor”, Scholarpedia, vol. 4(2), doi: http://dx.doi.org/10.4249/scholarpedia.1883
Batista, G. and Silva, D.F (2009), “How K-nearest neighbor parameters affect its performance”, Semantic Scholar, Corpus ID: 16606615, pp. 1–12, available at: https://api.semanticscholar.org/CorpusID:16606615
Okandeji, A., Odeyinka, O., Sogbesan, A. and Ogunye, N. (2022), “A comparative analysis of haemoglobin variants using machine learning algorithms”, Nigerian Journal of Technology, vol. 41, pp. 789–796, doi: https://doi.org/10.4314/njt.v41i4.16
Vemulapalli, S., Sushma Sri, M., Varshitha, P., Kumar, P., Vinay, T. (2024), “An experimental analysis of machine learning techniques crop for recom- mendation”, Nigerian Journal of Technology, vol. 43(2), pp. 301–308, doi: https://doi.org/10.4314/njt.v43i2.13
Nkiama, H., Said, S.Z.M. and Saidu, M. (2016), “A subset feature elimination mechanism for intrusion detection system”, International Journal of Advanced Computer Science and Applications, vol. 7, doi:
https://dx.doi.org/10.14569/IJACSA.2016.070419
Xin, Y., Kong, L., Liu, Z., Chen, Y., Li, Y., Zhu, H., Gao, M., Hou, H. and Wang, C. (2018), “Machine learning and deep learning methods for cybersecurity”, IEEE access, vol. 6, pp. 35365–35381, doi: https://doi.org/10.1109/ACCESS.2018.2836950
Shen, Z., Zhang, Y. and Chen, W. (2019), “A bayesian classification intrusion detection method based on the fusion of PCA and LDA”, Security and Communication Networks, vol. 2019, pp. 1–11, doi: https://doi.org/10.1155/2019/6346708