Privilege Escalation Attack Detection and Mitigation in Cloud Using Machine Learning

被引:5
|
作者
Mehmood, Muhammad [1 ]
Amin, Rashid [1 ,2 ]
Muslam, Muhana Magboul Ali [3 ]
Xie, Jiang [4 ]
Aldabbas, Hamza [5 ]
机构
[1] Univ Engn & Technol Taxila, Dept Comp Sci, Taxila 47050, Pakistan
[2] Univ Chakwal, Dept Comp Sci, Chakwal 48800, Pakistan
[3] Imam Mohammad Ibn Saud Islamic Univ, Dept Informat Technol, Riyadh 11432, Saudi Arabia
[4] Univ North Carolina Charlotte UNC Charlotte, Dept Elect & Comp Engn, Charlotte, NC 28223 USA
[5] Al Balqa Appl Univ, Prince Abdullah bin Ghazi Fac Informat & Commun Te, Al Salt 1705, Jordan
关键词
Security; Machine learning algorithms; Cloud computing; Classification algorithms; Random forests; Machine learning; Data models; Privilege escalation; insider attack; machine learning; random forest; adaboost; XGBoost; LightGBM; classification; INSIDER THREAT DETECTION; SYSTEM;
D O I
10.1109/ACCESS.2023.3273895
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Because of the recent exponential rise in attack frequency and sophistication, the proliferation of smart things has created significant cybersecurity challenges. Even though the tremendous changes cloud computing has brought to the business world, its centralization makes it challenging to use distributed services like security systems. Valuable data breaches might occur due to the high volume of data that moves between businesses and cloud service suppliers, both accidental and malicious. The malicious insider becomes a crucial threat to the organization since they have more access and opportunity to produce significant damage. Unlike outsiders, insiders possess privileged and proper access to information and resources. In this work, a machine learning-based system for insider threat detection and classification is proposed and developed a systematic approach to identify various anomalous occurrences that may point to anomalies and security problems associated with privilege escalation. By combining many models, ensemble learning enhances machine learning outcomes and enables greater prediction performance. Multiple studies have been presented regarding detecting irregularities and vulnerabilities in network systems to find security flaws or threats involving privilege escalation. But these studies lack the proper identification of the attacks. This study proposes and evaluates ensembles of Machine learning (ML) techniques in this context. This paper implements machine learning algorithms for the classification of insider attacks. A customized dataset from multiple files of the CERT dataset is used. Four machine learning algorithms, i.e., Random Forest (RF), Adaboost, XGBoost, and LightGBM, are applied to that dataset and analyzed results. Overall, LightGBM performed best. However, some other algorithms, such as RF or AdaBoost, may perform better on some internal attacks (Behavioral Biometrics attacks) or other internal attacks. Therefore, there is room for incorporating more than one machine learning algorithm to obtain a stronger classification in multiple internal attacks. Among the proposed algorithms, the LightGBM algorithm provides the highest accuracy of 97%; the other accuracy values are RF at 86%, AdaBoost at 88%, and XGBoost at 88.27%.
引用
下载
收藏
页码:46561 / 46576
页数:16
相关论文
共 50 条
  • [41] Attack detection in water distribution systems using machine learning
    Ramotsoela, Daniel T.
    Hancke, Gerhard P.
    Abu-Mahfouz, Adnan M.
    HUMAN-CENTRIC COMPUTING AND INFORMATION SCIENCES, 2019, 9
  • [42] DDoS attack detection in ISP domain using machine learning
    Sahu, Swati
    Verma, Amit
    2019 5TH INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION, CONTROL AND AUTOMATION (ICCUBEA), 2019,
  • [43] Practical Challenges of Attack Detection in Microgrids Using Machine Learning
    Ramotsoela, Daniel T. T.
    Hancke, Gerhard P. P.
    Abu-Mahfouz, Adnan M. M.
    JOURNAL OF SENSOR AND ACTUATOR NETWORKS, 2023, 12 (01)
  • [44] EFFICIENT DDoS ATTACK DETECTION USING MACHINE LEARNING TECHNIQUES
    Nazarudeen, Fathima
    Sundar, Sumod
    2022 IEEE INTERNATIONAL POWER AND RENEWABLE ENERGY CONFERENCE, IPRECON, 2022,
  • [45] Detection of adversarial phishing attack using machine learning techniques
    Sudar, K. Muthamil
    Rohan, M.
    Vignesh, K.
    SADHANA-ACADEMY PROCEEDINGS IN ENGINEERING SCIENCES, 2024, 49 (03):
  • [46] DoS Attack Detection using Machine Learning and Neural Network
    Wankhede, Shreekhand
    Kshirsagar, Deepak
    2018 FOURTH INTERNATIONAL CONFERENCE ON COMPUTING COMMUNICATION CONTROL AND AUTOMATION (ICCUBEA), 2018,
  • [47] Prevention and detection of DDOS attack in virtual cloud computing environment using Naive Bayes algorithm of machine learning
    Shang Y.
    Measurement: Sensors, 2024, 31
  • [48] DDoS Attack Detection and Mitigation Techniques in Cloud Computing Environment
    Devi, Kiruthika B. S.
    Subbulakshmi, T.
    PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON INTELLIGENT SUSTAINABLE SYSTEMS (ICISS 2017), 2017, : 512 - 517
  • [49] A Vulnerability based Attack Detection and Mitigation in Cloud SaaS Framework
    Saisindhutheja R.
    Shyam G.K.
    Makka S.
    Journal of Engineering Science and Technology Review, 2022, 15 (05) : 158 - 169
  • [50] A Survey of Privilege Escalation Detection in Android
    Hutchinson, Shinelle
    Varol, Cihan
    2018 9TH IEEE ANNUAL UBIQUITOUS COMPUTING, ELECTRONICS & MOBILE COMMUNICATION CONFERENCE (UEMCON), 2018, : 726 - 731