Mitigating Cloud Computing Cybersecurity Risks Using Machine Learning Techniques

Cloud computing is gaining increasing adoption as it has elastic, on-demand and pay-per-use feature available in different service models like Infrastructure-as-a-Service (IaaS), Platform-as-a-Service (PaaS) and Software-as-a-Service (SaaS). With the increased adoption of the Internet of things in cities, homes, power grids, personal health monitoring systems, a huge amount of data is generated. However, the IoT devices are unable to store them. They rely on cloud storage for this purpose and use cloud computing for processing. But this computing model is suffering from cyberattacks. Cloud service providers can use machine learning techniques to detect such attacks and take measures to prevent them. In this paper, various cyberattacks faced by the cloud have been surveyed and discussed the machine learning techniques proposed by researchers to mitigate those attacks.

[1]  Miguel Correia,et al.  Lucy in the sky without diamonds: Stealing confidential data in the cloud , 2011, 2011 IEEE/IFIP 41st International Conference on Dependable Systems and Networks Workshops (DSN-W).

[2]  A. B. M. Shawkat Ali,et al.  Trust Issues that Create Threats for Cyber Attacks in Cloud Computing , 2011, 2011 IEEE 17th International Conference on Parallel and Distributed Systems.

[3]  Kemal Hajdarevic,et al.  Cloud computing threats classification model based on the detection feasibility of machine learning algorithms , 2017, 2017 40th International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO).

[4]  Lingfeng Wang,et al.  A neural network based distributed intrusion detection system on cloud platform , 2012, 2012 IEEE 2nd International Conference on Cloud Computing and Intelligence Systems.

[5]  Yaman Roumani,et al.  An empirical study on predicting cloud incidents , 2019, Int. J. Inf. Manag..

[6]  Hovav Shacham,et al.  Hey, you, get off of my cloud: exploring information leakage in third-party compute clouds , 2009, CCS.

[7]  Alok Sharma,et al.  Detecting Denial of Service Attacks in the Cloud , 2016, 2016 IEEE 14th Intl Conf on Dependable, Autonomic and Secure Computing, 14th Intl Conf on Pervasive Intelligence and Computing, 2nd Intl Conf on Big Data Intelligence and Computing and Cyber Science and Technology Congress(DASC/PiCom/DataCom/CyberSciTech).

[8]  Wanlei Zhou,et al.  Cloud security defence to protect cloud computing against HTTP-DoS and XML-DoS attacks , 2011, J. Netw. Comput. Appl..

[9]  Yuh-Jye Lee,et al.  Frequent Pattern Based User Behavior Anomaly Detection for Cloud System , 2013, 2013 Conference on Technologies and Applications of Artificial Intelligence.

[10]  C. N. Modi,et al.  Bayesian Classifier and Snort based network intrusion detection system in cloud computing , 2012, 2012 Third International Conference on Computing, Communication and Networking Technologies (ICCCNT'12).

[11]  Said El Kafhali,et al.  DDoS attack detection using machine learning techniques in cloud computing environments , 2017, 2017 3rd International Conference of Cloud Computing Technologies and Applications (CloudTech).