Hybrid intrusion detection system using machine learning

Recent technologies and innovations have encouraged users to adopt cloud-based architectures. 1 , 2 This has reduced IT barriers and provided new capabilities of dynamic provisioning, monitoring and managing resources by providing immediate access to resources, enabling easy scaling up of services and implementation of new classes of existing applications. However, sharing the same pool when requesting services involves the risk of data breaches, account compromises, injection vulnerabilities, abusive use of features such as the use of trial periods and distributed denial of service (DDoS) attacks. 3 , 4 As a result, many customers rank cloud security as a major challenge that threatens their work and reduces their trust in cloud service providers. Cloud-based architectures have reduced IT barriers and provided new capabilities of dynamic provisioning, monitoring and managing resources by providing immediate access to resources, enabling the easy scaling up of services. However, sharing the same pool when requesting services involves the risk of data breaches, account compromises, injection vulnerabilities and distributed denial of service (DDoS) attacks. As a result, many customers rank cloud security as a major challenge that threatens their work and reduces their trust in cloud service providers. Amar Meryem and Bouabid EL Ouahidi propose an architecture that eradicates malicious behaviours by detecting known attacks using log files; blocks suspicious behaviours in real time; secures sensitive data; and establishes better adaptations of security measures by dynamically updating security rules.

[1]  Ejaz Ahmed,et al.  Real-time big data processing for anomaly detection: A Survey , 2019, Int. J. Inf. Manag..

[2]  Sallam Osman Fageeri,et al.  An Efficient Log File Analysis Algorithm Using Binary-based Data Structure , 2014 .

[3]  Yuancheng Li,et al.  A Hybrid Malicious Code Detection Method based on Deep Learning , 2015 .

[4]  M. Vijayalakshmi,et al.  Secured Temporal Log Management Techniques for Cloud , 2015 .

[5]  Esmiralda Moradian,et al.  Secure Audit Log Management , 2013, KES.

[6]  Pin Lv,et al.  Mining Host Behavior Patterns From Massive Network and Security Logs , 2017, ICCS.

[7]  Sung Wook Baik,et al.  Machine learning-assisted signature and heuristic-based detection of malwares in Android devices , 2017, Comput. Electr. Eng..

[8]  Muttukrishnan Rajarajan,et al.  A survey of intrusion detection techniques in Cloud , 2013, J. Netw. Comput. Appl..

[9]  Amar Meryem,et al.  A novel approach in detecting intrusions using NSLKDD database and MapReduce programming , 2017 .

[10]  Ran Liu,et al.  Investigation of machine learning based network traffic classification , 2017, 2017 International Symposium on Wireless Communication Systems (ISWCS).

[11]  Jie Yang,et al.  HIDS-DT: An Effective Hybrid Intrusion Detection System Based on Decision Tree , 2010, 2010 International Conference on Communications and Mobile Computing.

[12]  Balachandra Muniyal,et al.  Performance Evaluation of Supervised Machine Learning Algorithms for Intrusion Detection , 2016 .

[13]  Supeno Djanali,et al.  Assessing Centroid-Based Classification Models for Intrusion Detection System Using Composite Indicators , 2019, Procedia Computer Science.

[14]  Mouad Lemoudden,et al.  A Binary-based MapReduce Analysis for Cloud Logs , 2016, ANT/SEIT.

[15]  Subutai Ahmad,et al.  Unsupervised real-time anomaly detection for streaming data , 2017, Neurocomputing.

[16]  Nazli Goharian,et al.  Misuse detection for information retrieval systems , 2003, CIKM '03.

[17]  Indraneel Sreeram,et al.  HTTP flood attack detection in application layer using machine learning metrics and bio inspired bat algorithm , 2019, Applied Computing and Informatics.

[18]  Idris Bharanidharan Shanmugam,et al.  Hybrid intelligent Intrusion Detection System , 2005 .

[19]  Saeid Nahavandi,et al.  Extreme learning machine based transfer learning algorithms: A survey , 2017, Neurocomputing.

[20]  Mohsin Iftikhar,et al.  A Comprehensive Survey on Security in Cloud Computing , 2017, FNC/MobiSPC.

[21]  Mouad Lemoudden,et al.  Managing cloud-generated logs using big data technologies , 2015, 2015 International Conference on Wireless Networks and Mobile Communications (WINCOM).

[22]  José Antonio Lozano,et al.  An efficient approximation to the K-means clustering for massive data , 2017, Knowl. Based Syst..

[23]  Akash Garg,et al.  A hybrid intrusion detection system: A review , 2016, 2016 10th International Conference on Intelligent Systems and Control (ISCO).

[24]  Yuval Elovici,et al.  Quantifying the resilience of machine learning classifiers used for cyber security , 2018, Expert Syst. Appl..

[25]  Amar Meryem,et al.  Enhancing Cloud Security using advanced MapReduce k-means on log files , 2018, ICSIM2018.

[26]  Tingting Li,et al.  Fuzzy c-means clustering based on weights and gene expression programming , 2017, Pattern Recognit. Lett..