Abstract
As more software solutions are now cloud based taking advantage of the powerful computing performance of remote servers and super computers, the machine learning industry is also switching to this technology providing promising solutions such as Google Cloud Artificial Intelligence, Amazon Web Services, and Microsoft Azure Machine Learning. With the adoption of the cloud technology for nowadays computer transactions and operations, a cloud IDS solution that can compete with the emerging technology challenges is crucially needed to help network administrators secure data and prevent any intrusions. The machine learning approaches often require high computing performance and gigantic memory space to process mega datasets and come up with better prediction results. This paper introduces a new aspect of using cloud-based machine learning solution as an online computing resource for the application of machine learning concepts to predict intrusions in IDS systems based on network packet behavior, while the traditional way is to use local computer resources through data mining solutions such as Weka or Orange. We used Microsoft Azure Machine Learning Studio along with CSE-CIC-IDS 2018 dataset from the Canadian Institute for Cyber Security to apply various techniques and algorithms to come up with a powerful network model. The aim of this paper is to explain how a cloud-based data mining tool can be used for its better performance and high accuracy for data mining and building a strong intrusion detection system. As a start point, we used a saved dataset that contains a collection of anomaly detection records applied on an IDS while various attributes are registered. To differentiate between normal and anomalous traffic, two profiles are used: B-profile and M- profile to generate benign and malicious traffic respectively in the network.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Kumar, M.: An incorporation of artificial intelligence capabilities in cloud computing. Int. J. Eng. Comput. Sci. 5(11), 19070–19073 (2016)
Cloud, Amazon Elastic Compute. Amazon web services (2011). Retrieved 9 Nov 2011
Mund, S.: Microsoft azure machine learning. Packt Publishing Ltd (2015)
Hall, M., et al.: The WEKA data mining software: an update. ACM SIGKDD Explor. Newsl. 11(1), 10–18 (2009)
Demšar, J., et al.: Orange: data mining toolbox in Python. J. Mach. Learn. Res. 14(1), 2349–2353 (2013)
Kanimozhi, V., Jacob, T.P.: Artificial intelligence based network intrusion detection with hyper-parameter optimization tuning on the realistic cyber dataset CSE-CIC-IDS2018 using cloud computing. In: 2019 International Conference on Communication and Signal Processing (ICCSP). IEEE (2019)
Panigrahi, R., Borah, S.: A statistical analysis of lazy classifiers using canadian institute of cybersecurity datasets. In: Borah, S., Emilia Balas, V., Polkowski, Z. (eds.) Advances in Data Science and Management. LNDECT, vol. 37, pp. 215–222. Springer, Singapore (2020). https://doi.org/10.1007/978-981-15-0978-0_21
Kanimozhi, V., Jacob, T.P.: Artificial intelligence outflanks all other machine learning classifiers in network intrusion detection system on the realistic cyber dataset CSE-CIC-IDS2018 using cloud computing. ICT Express 7(3), 366–370 (2021)
Gasso, G.: Logistic regression (2019)
Ou, G., Murphey, Y.L.: Multi-class pattern classification using neural networks. Pattern Recognit. 40(1), 4–18 (2007)
Leevy, J.L., Khoshgoftaar, T.M.: A survey and analysis of intrusion detection models based on CSE-CIC-IDS2018 big data. J. Big Data 7(1), 1–19 (2020). https://doi.org/10.1186/s40537-020-00382-x
Sharafaldin, I., Lashkari, A.H., Ghorbani, A.A.: Toward generating a new intrusion detection dataset and intrusion traffic characterization. In: ICISSp, pp. 108–116 (2018)
Hua, Y.: An efficient traffic classification scheme using embedded feature selection and LightGBM. In: 2020 Information Communication Technologies Conference (ICTC). IEEE (2020)
Kanimozhi, V., Jacob, T.P.: Calibration of various optimized machine learning classifiers in network intrusion detection system on the realistic cyber dataset CSE-CIC-IDS2018 using cloud computing. Int. J. Eng. Appl. Sci. Technol. 4(6), 209–213 (2019)
Kramer, O.: Scikit-learn. In: Kramer, O. (ed.) Machine learning for evolution strategies, pp. 45–53. Springer, Cham (2016). https://doi.org/10.1007/978-3-319-33383-0_5
Pal, M.: Random forest classifier for remote sensing classification. Int. J. Remote Sens. 26(1), 217–222 (2005)
Yigit, H.: A weighting approach for KNN classifier. In: 2013 International Conference on Electronics, Computer and Computation (ICECCO). IEEE (2013)
Rueping, S.: SVM classifier estimation from group probabilities. In: ICML (2010)
Schapire, R.E.: Explaining adaboost. In: Schölkopf, B., Luo, Z., Vovk, V. (eds.) Empirical inference, pp. 37–52. Springer, Heidelberg (2013). https://doi.org/10.1007/978-3-642-41136-6_5
Webb, G.I., Keogh, E., Miikkulainen, R.: Naïve Bayes. Encyclopedia Mach. Learn. 15, 713–714 (2010)
Huang, J., Ling, C.X.: Using AUC and accuracy in evaluating learning algorithms. IEEE Trans. Knowl. Data Eng. 17(3), 299–310 (2005)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2022 Springer Nature Switzerland AG
About this paper
Cite this paper
Wadiai, Y., Baslam, M. (2022). Machine Learning Approach to Automate Decision Support on Information System Attacks. In: Fakir, M., Baslam, M., El Ayachi, R. (eds) Business Intelligence. CBI 2022. Lecture Notes in Business Information Processing, vol 449. Springer, Cham. https://doi.org/10.1007/978-3-031-06458-6_6
Download citation
DOI: https://doi.org/10.1007/978-3-031-06458-6_6
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-031-06457-9
Online ISBN: 978-3-031-06458-6
eBook Packages: Computer ScienceComputer Science (R0)