Enhancing Cloud Infrastructure Security Through AI-Powered Big Data Anomaly Detection
DOI:
https://doi.org/10.63282/3050-922X.IJERET-V2I2P107Keywords:
Cloud Security, Intrusion Detection System (IDS), Machine Learning, UNSW-NB15 Dataset, Cyber Threats, Anomaly Detection, Feature Selection, Network Security, Artificial Intelligence (AI), Intrusion Detection Systems (IDS)Abstract
Numerous resources and computer capabilities are made available over the Internet via cloud computing. Because of its appealing characteristics, cloud systems draw a lot of users. Cloud systems may still have serious security problems despite this. Accordingly, it’s crucial to develop a system capable of detecting abnormalities in cloud environments, allowing for the high detection rate of both insider and outsider assaults. The suggested approach makes use of cutting-edge ML models. XGBoost and Multi-Layer Perceptron (MLP) combined with the necessary preprocessing techniques, i.e., feature selection and SMOTE-based class balancing, are accurate and resilient to identify anomalies in the context of a complex cloud environment. The XGBoost model performed better than other classifiers with 97.5 percent accuracy and 1.00 ROC-AUC. The Multi-Load Pump model also showed excellent results with 96.20 percent accuracy and 0.99 ROC-AUC. The superiority of the suggested models in comparison with conventional methods such as Naive Bayes (NB) and Random Forest (RF) is proved with the assistance of comparative analysis. In general, AI and big data analytics have transformed into a scalable, dependable, and proactive cloud automation framework to secure cloud environments against even advanced cyber threats
References
[1] Song Fu, “Performance Metric Selection for Autonomic Anomaly Detection on Cloud Computing Systems,” in 2011 IEEE Global Telecommunications Conference - Globecom 2011, IEEE, Dec. 2011, pp. 1–5. doi: 10.1109/GLOCOM.2011.6134532.
[2] H. R. Faragardi, A. Rajabi, T. Nolte, and A. H. Heidarizadeh, “A Profit-aware Allocation of High Performance Computing Applications on Distributed Cloud Data Centers with Environmental Considerations A Profit-aware Allocation of High Performance Computing Applications on Distributed Cloud Data Centers with Environmen,” CSI J. Comput. Sci. Eng., pp. 1–11, 2014.
[3] S. Garg, “Predictive Analytics and Auto Remediation using Artificial Inteligence and Machine learning in Cloud Computing Operations,” Int. J. Innov. Res. Eng. Multidiscip. Phys. Sci., vol. 7, no. 2, 2019, doi: 10.5281/zenodo.15362327.
[4] B. de Bruin and L. Floridi, “The Ethics of Cloud Computing,” Sci. Eng. Ethics, vol. 23, no. 1, pp. 21–39, Feb. 2017, doi: 10.1007/s11948-016-9759-0.
[5] H. R. Faragardi, “Ethical Considerations in Cloud Computing Systems,” in Proceedings of the IS4SI 2017 Summit Digitalisation For A Sustainable Society, Gothenburg, Sweden, Basel Switzerland: MDPI, Jun. 2017, p. 166. doi: 10.3390/IS4SI-2017-04016.
[6] S. Garg, “AI/ML Driven Proactive Performance Monitoring, Resource Allocation And Effective Cost Management In Saas Operations,” Int. J. Core Eng. Manag., vol. 6, no. 06, pp. 263–273, 2019.
[7] J. Park and J. Park, “Blockchain Security in Cloud Computing: Use Cases, Challenges, and Solutions,” Symmetry (Basel)., vol. 9, no. 8, p. 164, Aug. 2017, doi: 10.3390/sym9080164.
[8] K. Hashizume, D. G. Rosado, E. Fernández-Medina, and E. B. Fernandez, “An analysis of security issues for cloud computing,” J. Internet Serv. Appl., vol. 4, no. 1, p. 5, 2013, doi: 10.1186/1869-0238-4-5.
[9] S. Singh, Y.-S. Jeong, and J. H. Park, “A survey on cloud computing security: Issues, threats, and solutions,” J. Netw. Comput. Appl., vol. 75, pp. 200–222, Nov. 2016, doi: 10.1016/j.jnca.2016.09.002.
[10] V. Kolluri, “A Pioneering Approach To Forensic Insights: Utilization of AI for Cybersecurity Incident Investigations,” Int. J. Res. Anal. Rev., no. August 2016, 2016.
[11] M. Nawir, A. Amir, O. B. Lynn, N. Yaakob, and R. B. Ahmad, “Performances of Machine Learning Algorithms for Binary Classification of Network Anomaly Detection System,” J. Phys. Conf. Ser., pp. 1–9, May 2018, doi: 10.1088/1742-6596/1018/1/012015.
[12] A. Mikail and B. Pranggono, “Securing Infrastructure-as-a-Service Public Clouds Using Security Onion,” Appl. Syst. Innov., vol. 2, no. 1, p. 6, Jan. 2019, doi: 10.3390/asi2010006.
[13] S. K. Yoo and B. Y. Kim, “A Decision-Making Model for Adopting a Cloud Computing System,” Sustainability, vol. 10, no. 8, p. 2952, Aug. 2018, doi: 10.3390/su10082952.
[14] R. C. Aygun and A. G. Yavuz, “Network Anomaly Detection with Stochastically Improved Autoencoder Based Models,” in 2017 IEEE 4th International Conference on Cyber Security and Cloud Computing (CSCloud), IEEE, Jun. 2017, pp. 193–198. doi: 10.1109/CSCloud.2017.39.
[15] V. Kolluri, “Cutting-Edge Insights into Unmasking Malware: AI-Powered Analysis and Detection Techniques,” JETIR, vol. 4, no. 2, 2017.
[16] S. Singamsetty, “Fuzzy-Optimized Lightweight Cyber-Attack Detection for Secure Edge-Based IoT,” J. Crit. Rev., vol. 6, no. 07, pp. 1028–1033, 2019, doi: 10.53555/jcr.v6:i7.13156.
[17] M. M. Saad, T. Iqbal, H. Ali, M. F. Bulbul, S. Khan, and C. Tanougast, “Incident Detection over Unified Threat Management Platform on a Cloud Network,” in 2019 10th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications (IDAACS), IEEE, Sep. 2019, pp. 592–596. doi: 10.1109/IDAACS.2019.8924299.
[18] P. Lin, K. Ye, and C. Z. Xu, “Dynamic Network Anomaly Detection System by Using Deep Learning Techniques,” in Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2019, pp. 161–176. doi: 10.1007/978-3-030-23502-4_12.
[19] A. R. Wani, Q. P. Rana, U. Saxena, and N. Pandey, “Analysis and Detection of DDoS Attacks on Cloud Computing Environment using Machine Learning Techniques,” in 2019 Amity International Conference on Artificial Intelligence (AICAI), IEEE, Feb. 2019, pp. 870–875. doi: 10.1109/AICAI.2019.8701238.
[20] I. Aljamal, A. Tekeoglu, K. Bekiroglu, and S. Sengupta, “Hybrid Intrusion Detection System Using Machine Learning Techniques in Cloud Computing Environments,” in 2019 IEEE 17th International Conference on Software Engineering Research, Management and Applications (SERA), IEEE, May 2019, pp. 84–89. doi: 10.1109/SERA.2019.8886794.
[21] M. Zaman and C. H. Lung, “Evaluation of machine learning techniques for network intrusion detection,” in NOMS 2018 - 2018 IEEE/IFIP Network Operations and Management Symposium, IEEE, Apr. 2018, pp. 1–5. doi: 10.1109/NOMS.2018.8406212.
[22] A. Nezarat and Y. Shams, “A game theoretic-based distributed detection method for VM-to-hypervisor attacks in cloud environment,” J. Supercomput., vol. 73, no. 10, pp. 4407–4427, Oct. 2017, doi: 10.1007/s11227-017-2025-7.
[23] M. Saqlain, M. Piao, Y. Shim, and J. Y. Lee, “Framework of an IoT-based Industrial Data Management for Smart Manufacturing,” J. Sens. Actuator Networks, vol. 8, no. 2, p. 25, Apr. 2019, doi: 10.3390/jsan8020025.
[24] B. S. Khater, A. A. B. W. Wahab, M. Y. I. Bin Idris, M. A. Hussain, and A. A. Ibrahim, “A Lightweight Perceptron-Based Intrusion Detection System for Fog Computing,” Appl. Sci., vol. 9, no. 1, p. 178, Jan. 2019, doi: 10.3390/app9010178.
[25] S. S. Dhaliwal, A.-A. Nahid, and R. Abbas, “Effective Intrusion Detection System Using XGBoost,” Information, vol. 9, no. 7, p. 149, Jun. 2018, doi: 10.3390/info9070149.
[26] T. T. Teoh, G. Chiew, E. J. Franco, P. C. Ng, M. . Benjamin, and Y. J. Goh, “Anomaly detection in cyber security attacks on networks using MLP deep learning,” in 2018 International Conference on Smart Computing and Electronic Enterprise (ICSCEE), IEEE, Jul. 2018, pp. 1–5. doi: 10.1109/ICSCEE.2018.8538395.
[27] K. Kostas, “Anomaly Detection in Networks Using Machine Learning,” 2018.
[28] T. Salman, D. Bhamare, A. Erbad, R. Jain, and M. Samaka, “Machine Learning for Anomaly Detection and Categorization in Multi-Cloud Environments,” in 2017 IEEE 4th International Conference on Cyber Security and Cloud Computing (CSCloud), IEEE, Jun. 2017, pp. 97–103. doi: 10.1109/CSCloud.2017.15.
[29] Kalla, D., & Samiuddin, V. (2020). Chatbot for medical treatment using NLTK Lib. IOSR J. Comput. Eng, 22, 12.
[30] Kuraku, S., & Kalla, D. (2020). Emotet malware a banking credentials stealer. Iosr J. Comput. Eng, 22, 31-41.
[31] Sreejith Sreekandan Nair, Govindarajan Lakshmikanthan (2020). Beyond VPNs: Advanced Security Strategies for the Remote Work Revolution. International Journal of Multidisciplinary Research in Science, Engineering and Technology 3 (5):1283-1294.
[32] Masud, M. M., Moniruzzaman, M., Rahman, M. M., & Noor, S. (2009). Effect of poultry manure in combination with chemical fertilizers on the yield and nutrient uptake by chilli in the hilly region. J. Soil Nat, 3(2), 24-27.