A Machine Learning Based Intrusion Impact Analysis Scheme for Clouds

被引:0
|
作者
Arshad, Junaid [1 ]
Jokhio, Imran Ali [2 ]
Townend, Paul [1 ]
机构
[1] Univ Leeds, Sch Comp, Leeds, W Yorkshire, England
[2] Mehran Univ Engn & Technol, Dept Software Engn, Jamshoro, Pakistan
关键词
Cloud computing; Cloud security; Intrusion severity analysis; Intrusion Detection; Intrusion Response;
D O I
暂无
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
Clouds represent a major paradigm shift, inspiring the contemporary approach to computing. They present fascinating opportunities to address dynamic user requirements with the provision of on demand expandable computing infrastructures. However, Clouds introduce novel security challenges which need to be addressed to facilitate widespread adoption. This paper is focused on one such challenge intrusion impact analysis. In particular, we highlight the significance of intrusion impact analysis for the overall security of Clouds. Additionally, we present a machine learning based scheme to address this challenge in accordance with the specific requirements of Clouds for intrusion impact analysis. We also present rigorous evaluation performed to assess the effectiveness and feasibility of the proposed method to address this challenge for Clouds. The evaluation results demonstrate high degree of effectiveness to correctly determine the impact of an intrusion along with significant reduction with respect to the intrusion response time.
引用
收藏
页码:107 / 118
页数:12
相关论文
共 50 条
  • [1] A machine learning based intrusion detection scheme for data fusion in mobile clouds involving heterogeneous client networks
    Dey, Saurabh
    Ye, Qiang
    Sampalli, Srinivas
    [J]. INFORMATION FUSION, 2019, 49 : 205 - 215
  • [2] Impact of Features Reduction on Machine Learning Based Intrusion Detection Systems
    Fatima, Masooma
    Rehman, Osama
    Rahman, Ibrahim M. H.
    [J]. EAI ENDORSED TRANSACTIONS ON SCALABLE INFORMATION SYSTEMS, 2022, 9 (06)
  • [3] Analysis of Machine Learning Techniques Based Intrusion Detection Systems
    Sharma, Rupam Kr.
    Kalita, Hemanta Kumar
    Borah, Parashjyoti
    [J]. PROCEEDINGS OF 3RD INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING, NETWORKING AND INFORMATICS, ICACNI 2015, VOL 2, 2016, 44 : 485 - 493
  • [4] Aiding Intrusion Analysis Using Machine Learning
    Zomlot, Loai
    Chandran, Sathya
    Caragea, Doina
    Ou, Xinming
    [J]. 2013 12TH INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND APPLICATIONS (ICMLA 2013), VOL 2, 2013, : 40 - 47
  • [5] Machine Learning Based Network Intrusion Detection
    Lee, Chie-Hong
    Su, Yann-Yean
    Lin, Yu-Chun
    Lee, Shie-Jue
    [J]. 2017 2ND IEEE INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND APPLICATIONS (ICCIA), 2017, : 79 - 83
  • [6] Failure analysis and control of natural gas pipelines under excavation impact based on machine learning scheme
    Xu, Duo
    Chen, Liqiong
    Yu, Chang
    Zhang, Sen
    Zhao, Xiang
    Lai, Xin
    [J]. INTERNATIONAL JOURNAL OF PRESSURE VESSELS AND PIPING, 2023, 201
  • [7] Machine Learning Techniques for Intrusion Detection: A Comparative Analysis
    Hamid, Yasir
    Sugumaran, M.
    Journaux, Ludovic
    [J]. PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON INFORMATICS AND ANALYTICS (ICIA' 16), 2016,
  • [8] Performance Analysis of Machine Learning Techniques in Intrusion Detection
    Tungjaturasopon, Praiya
    Piromsopa, Krerk
    [J]. PROCEEDINGS OF 2018 VII INTERNATIONAL CONFERENCE ON NETWORK, COMMUNICATION AND COMPUTING (ICNCC 2018), 2018, : 6 - 10
  • [9] Performance Analysis of Machine Learning Classifiers for Intrusion Detection
    Zwane, Skhumbuzo
    Tarwireyi, Paul
    Adigun, Matthew
    [J]. 2018 INTERNATIONAL CONFERENCE ON INTELLIGENT AND INNOVATIVE COMPUTING APPLICATIONS (ICONIC), 2018, : 538 - 542
  • [10] Performance Analysis Of Machine Learning Techniques In Intrusion Detection
    Kaya, Cetin
    Yildiz, Oktay
    Ay, Sinan
    [J]. 2016 24TH SIGNAL PROCESSING AND COMMUNICATION APPLICATION CONFERENCE (SIU), 2016, : 1473 - 1476