Privilege Escalation Attack Detection and Mitigation in Cloud Using Machine Learning

被引:5
|
作者
Mehmood, Muhammad [1 ]
Amin, Rashid [1 ,2 ]
Muslam, Muhana Magboul Ali [3 ]
Xie, Jiang [4 ]
Aldabbas, Hamza [5 ]
机构
[1] Univ Engn & Technol Taxila, Dept Comp Sci, Taxila 47050, Pakistan
[2] Univ Chakwal, Dept Comp Sci, Chakwal 48800, Pakistan
[3] Imam Mohammad Ibn Saud Islamic Univ, Dept Informat Technol, Riyadh 11432, Saudi Arabia
[4] Univ North Carolina Charlotte UNC Charlotte, Dept Elect & Comp Engn, Charlotte, NC 28223 USA
[5] Al Balqa Appl Univ, Prince Abdullah bin Ghazi Fac Informat & Commun Te, Al Salt 1705, Jordan
关键词
Security; Machine learning algorithms; Cloud computing; Classification algorithms; Random forests; Machine learning; Data models; Privilege escalation; insider attack; machine learning; random forest; adaboost; XGBoost; LightGBM; classification; INSIDER THREAT DETECTION; SYSTEM;
D O I
10.1109/ACCESS.2023.3273895
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Because of the recent exponential rise in attack frequency and sophistication, the proliferation of smart things has created significant cybersecurity challenges. Even though the tremendous changes cloud computing has brought to the business world, its centralization makes it challenging to use distributed services like security systems. Valuable data breaches might occur due to the high volume of data that moves between businesses and cloud service suppliers, both accidental and malicious. The malicious insider becomes a crucial threat to the organization since they have more access and opportunity to produce significant damage. Unlike outsiders, insiders possess privileged and proper access to information and resources. In this work, a machine learning-based system for insider threat detection and classification is proposed and developed a systematic approach to identify various anomalous occurrences that may point to anomalies and security problems associated with privilege escalation. By combining many models, ensemble learning enhances machine learning outcomes and enables greater prediction performance. Multiple studies have been presented regarding detecting irregularities and vulnerabilities in network systems to find security flaws or threats involving privilege escalation. But these studies lack the proper identification of the attacks. This study proposes and evaluates ensembles of Machine learning (ML) techniques in this context. This paper implements machine learning algorithms for the classification of insider attacks. A customized dataset from multiple files of the CERT dataset is used. Four machine learning algorithms, i.e., Random Forest (RF), Adaboost, XGBoost, and LightGBM, are applied to that dataset and analyzed results. Overall, LightGBM performed best. However, some other algorithms, such as RF or AdaBoost, may perform better on some internal attacks (Behavioral Biometrics attacks) or other internal attacks. Therefore, there is room for incorporating more than one machine learning algorithm to obtain a stronger classification in multiple internal attacks. Among the proposed algorithms, the LightGBM algorithm provides the highest accuracy of 97%; the other accuracy values are RF at 86%, AdaBoost at 88%, and XGBoost at 88.27%.
引用
下载
收藏
页码:46561 / 46576
页数:16
相关论文
共 50 条
  • [1] Detection and mitigation of DDoS attack in cloud computing using machine learning algorithm
    Amjad, Aroosh
    Alyas, Tahir
    Farooq, Umer
    Tariq, Muhammad Arsian
    EAI ENDORSED TRANSACTIONS ON SCALABLE INFORMATION SYSTEMS, 2019, 6 (23) : 1 - 8
  • [2] Mitigation of privilege escalation attack using kernel data relocation mechanism
    Kuzuno, Hiroki
    Yamauchi, Toshihiro
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2024, 23 (05) : 3351 - 3367
  • [3] Cloud Insider Attack Detection Using Machine Learning
    Nathezhtha, T.
    Vaidehi, V.
    PROCEEDINGS OF THE 2018 INTERNATIONAL CONFERENCE ON RECENT TRENDS IN ADVANCED COMPUTING (ICRTAC-CPS 2018), 2018, : 60 - 65
  • [4] DDoS Attack Detection and Mitigation in SDN using Machine Learning
    Khashab, Fatima
    Moubarak, Joanna
    Feghali, Antoine
    Bassil, Carole
    PROCEEDINGS OF THE 2021 IEEE 7TH INTERNATIONAL CONFERENCE ON NETWORK SOFTWARIZATION (NETSOFT 2021): ACCELERATING NETWORK SOFTWARIZATION IN THE COGNITIVE AGE, 2021, : 395 - 401
  • [5] Email bombing attack detection and mitigation using machine learning
    Shukla, Sanjeev
    Misra, Manoj
    Varshney, Gaurav
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2024, 23 (04) : 2939 - 2949
  • [6] A machine learning based attack detection and mitigation using a secure SaaS framework
    SaiSindhuTheja, Reddy
    Shyam, Gopal K.
    JOURNAL OF KING SAUD UNIVERSITY-COMPUTER AND INFORMATION SCIENCES, 2022, 34 (07) : 4047 - 4061
  • [7] Malicious attack detection approach in cloud computing using machine learning techniques
    Arunkumar, M.
    Kumar, K. Ashok
    SOFT COMPUTING, 2022, 26 (23) : 13097 - 13107
  • [8] DDoS Attack Detection using Machine Learning Techniques in Cloud Computing Environments
    Zekri, Marwane
    El Kafhali, Said
    Aboutabit, Noureddine
    Saadi, Youssef
    PROCEEDINGS OF 2017 3RD INTERNATIONAL CONFERENCE OF CLOUD COMPUTING TECHNOLOGIES AND APPLICATIONS (CLOUDTECH), 2017, : 236 - 242
  • [9] Malicious attack detection approach in cloud computing using machine learning techniques
    M. Arunkumar
    K. Ashok Kumar
    Soft Computing, 2022, 26 : 13097 - 13107
  • [10] Wormhole attack detection and mitigation model for Internet of Things and WSN using machine learning
    Alshehri, Asma Hassan
    PEERJ COMPUTER SCIENCE, 2024, 10