Privilege Escalation Attack Detection and Mitigation in Cloud Using Machine Learning

被引:5
|
作者
Mehmood, Muhammad [1 ]
Amin, Rashid [1 ,2 ]
Muslam, Muhana Magboul Ali [3 ]
Xie, Jiang [4 ]
Aldabbas, Hamza [5 ]
机构
[1] Univ Engn & Technol Taxila, Dept Comp Sci, Taxila 47050, Pakistan
[2] Univ Chakwal, Dept Comp Sci, Chakwal 48800, Pakistan
[3] Imam Mohammad Ibn Saud Islamic Univ, Dept Informat Technol, Riyadh 11432, Saudi Arabia
[4] Univ North Carolina Charlotte UNC Charlotte, Dept Elect & Comp Engn, Charlotte, NC 28223 USA
[5] Al Balqa Appl Univ, Prince Abdullah bin Ghazi Fac Informat & Commun Te, Al Salt 1705, Jordan
关键词
Security; Machine learning algorithms; Cloud computing; Classification algorithms; Random forests; Machine learning; Data models; Privilege escalation; insider attack; machine learning; random forest; adaboost; XGBoost; LightGBM; classification; INSIDER THREAT DETECTION; SYSTEM;
D O I
10.1109/ACCESS.2023.3273895
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Because of the recent exponential rise in attack frequency and sophistication, the proliferation of smart things has created significant cybersecurity challenges. Even though the tremendous changes cloud computing has brought to the business world, its centralization makes it challenging to use distributed services like security systems. Valuable data breaches might occur due to the high volume of data that moves between businesses and cloud service suppliers, both accidental and malicious. The malicious insider becomes a crucial threat to the organization since they have more access and opportunity to produce significant damage. Unlike outsiders, insiders possess privileged and proper access to information and resources. In this work, a machine learning-based system for insider threat detection and classification is proposed and developed a systematic approach to identify various anomalous occurrences that may point to anomalies and security problems associated with privilege escalation. By combining many models, ensemble learning enhances machine learning outcomes and enables greater prediction performance. Multiple studies have been presented regarding detecting irregularities and vulnerabilities in network systems to find security flaws or threats involving privilege escalation. But these studies lack the proper identification of the attacks. This study proposes and evaluates ensembles of Machine learning (ML) techniques in this context. This paper implements machine learning algorithms for the classification of insider attacks. A customized dataset from multiple files of the CERT dataset is used. Four machine learning algorithms, i.e., Random Forest (RF), Adaboost, XGBoost, and LightGBM, are applied to that dataset and analyzed results. Overall, LightGBM performed best. However, some other algorithms, such as RF or AdaBoost, may perform better on some internal attacks (Behavioral Biometrics attacks) or other internal attacks. Therefore, there is room for incorporating more than one machine learning algorithm to obtain a stronger classification in multiple internal attacks. Among the proposed algorithms, the LightGBM algorithm provides the highest accuracy of 97%; the other accuracy values are RF at 86%, AdaBoost at 88%, and XGBoost at 88.27%.
引用
收藏
页码:46561 / 46576
页数:16
相关论文
共 50 条
  • [21] Classification Based Machine Learning for Detection of DDoS attack in Cloud Computing
    Mishra, Anupama
    Gupta, B. B.
    Perakovic, Dragan
    Garcia Penalvo, Francisco Jose
    Hsu, Ching-Hsien
    2021 IEEE INTERNATIONAL CONFERENCE ON CONSUMER ELECTRONICS (ICCE), 2021,
  • [22] Detection of DDoS Attack in IoT Using Machine Learning
    Kumar, Naveen
    Aleem, Abdul
    Kumar, Sachin
    ADVANCED NETWORK TECHNOLOGIES AND INTELLIGENT COMPUTING, ANTIC 2021, 2022, 1534 : 190 - 199
  • [23] Botnet Attack Detection in IoT Using Machine Learning
    Alissa, Khalid
    Alyas, Tahir
    Zafar, Kashif
    Abbas, Qaiser
    Tabassum, Nadia
    Sakib, Shadman
    COMPUTATIONAL INTELLIGENCE AND NEUROSCIENCE, 2022, 2022
  • [24] Attack detection and mitigation using optimal deep maxout network in cloud computing
    Patil, Shubangini
    Patil, Rekha
    INTERNATIONAL JOURNAL OF ADAPTIVE CONTROL AND SIGNAL PROCESSING, 2022, 36 (09) : 2217 - 2237
  • [25] NIMBUS: Cloud-scale Attack Detection and Mitigation
    Miao, Rui
    Yu, Minlan
    Jain, Navendu
    ACM SIGCOMM COMPUTER COMMUNICATION REVIEW, 2014, 44 (04) : 121 - 122
  • [26] NIMBUS: Cloud-scale Attack Detection and Mitigation
    Miao, Rui
    Yu, Minlan
    Jain, Navendu
    SIGCOMM'14: PROCEEDINGS OF THE 2014 ACM CONFERENCE ON SPECIAL INTEREST GROUP ON DATA COMMUNICATION, 2014, : 121 - 122
  • [27] A Survey on Attack Detection on Cloud using Supervised Learning Techniques
    Nenvani, Geetanjali
    Gupta, Huma
    2016 SYMPOSIUM ON COLOSSAL DATA ANALYSIS AND NETWORKING (CDAN), 2016,
  • [28] Cloud DDoS Attack Detection Model with Data Fusion & Machine Learning Classifiers
    Pattnaik, Lal Mohan
    Swain, Pratik Kumar
    Satpathy, Suneeta
    Panda, Aditya N.
    EAI ENDORSED TRANSACTIONS ON SCALABLE INFORMATION SYSTEMS, 2023, 10 (06)
  • [29] SYN Flood Attack Detection and Mitigation using Machine Learning Traffic Classification and Programmable Data Plane Filtering
    Dimolianis, Marinos
    Pavlidis, Adam
    Maglaris, Vasilis
    2021 24TH CONFERENCE ON INNOVATION IN CLOUDS, INTERNET AND NETWORKS AND WORKSHOPS (ICIN), 2021,
  • [30] Mitigation of a poisoning attack in federated learning by using historical distance detection
    Zhaosen Shi
    Xuyang Ding
    Fagen Li
    Yingni Chen
    Canran Li
    Annals of Telecommunications, 2023, 78 : 135 - 147