Abstract
The increasing development of decentralized computer systems that interact extensively has increased the criticality of confronting cyberattackers, hackers, and terrorists. With the development of cloud computing and its widespread use, as well as its dispersed and decentralized character, a unique security measure is required to safeguard this architecture. By monitoring, validating, and managing settings, records, internet traffic, usage data, as well as the operations of specific activities, firewalls can distinguish between normal and unexpected behaviours, thus adding additional network security to cloud computing systems. The location of network security mechanisms in cloud computing environment and also the methods employed in such methods are the two primary aspects where many studies have concentrated their efforts. The objective of such studies is to reveal as many incursions as feasible and to improve the pace and correctness of sensing while minimizing false alarms. Nevertheless, these methods have a large computing burden, a poor degree of precision, and a large time consumption. We propose an accurate and complete approach for detecting and preventing assaults in cloud computing environment via the use of a machine learning techniques both supervised and un-supervised. The operational findings demonstrate that the suggested approach substantially increases attack detection, network security correctness, dependability, and accessibility in cloud computing environment, while drastically reducing false alarms.
Similar content being viewed by others
Data availability
Data sharing is not applicable—no new data generated.
References
Ashok Kumar K, Muthu Kumar B, Veeramuthu A, Mynavathi VS (2019) Unsupervised Machine Learning for Clustering the Infected Leaves Based on the Leaf-Colors. In: Kumar Mishra Durgesh, Yang Xin-She, Unal Aynur (eds) Data Science and Big Data Analytics Lecture Notes on Data Engineering and Communications Technologies. Springer, pp 303–312
Balasamy K, Shamia D (2021) Feature extraction-based medical image watermarking using fuzzy-based median filter. IETE J Res. https://doi.org/10.1080/03772063.2021.1893231
Balasamy K, Suganyadevi S (2021) A fuzzy based ROI selection for encryption and watermarking in medical image using DWT and SVD. Multimed Tools Appl 80:7167–7186. https://doi.org/10.1007/s11042-020-09981-5
Balasamy K, Krishnaraj N, Ramprasath J, Ramprakash P (2021) A secure framework for protecting clinical data in medical IoT environment. Smart Healthcare Syst Design: Secur Priv Asp. https://doi.org/10.1002/9781119792253.ch9
Behal S, Kumar K (2017) Detection of DDoS attacks and flash events using novel information theory metrics. J ComputNetw 116:96–110
Carl G, Kesidis G, Richard R, Brooks, Suresh R (2006) Denial-of-service attack-detection techniques. IEEE Internet Comput 10(1):82–89
Emami M, Jabbarpour MR, Abolhassani B, Jung JJ, Zarrabi H (2017) Soft cooperative spectrum sensing using quantization method in the presence of smart pue attack. Mobile Netw Appl. https://doi.org/10.1007/s11036-016-0802-9
Hatef MA, Shaker V, Jabbarpour MR, Jung J, Zarrabi H (2017) HIDCC: a hybrid intrusion detection approach in cloud computing. Concurrency Computat Pract Exper. https://doi.org/10.1002/cpe.4171
Jabbarpour MR, Jalooli A, Marefat A, Noor RM (2015) A taxonomy-based comparison of vehicle cloud architectures. In: The 3rd International Conference on Information and Computer Networks (ICICN 2015), Florence, Italy, 2015
Jarray A, Karmouch A (2013) Cost-efficient mapping for fault-tolerant virtual networks. IEEE Trans Comput 64(3):668–681
Jayasri P, Atchaya A, SanfeeyaParveen M, Ramprasath J (2021) Intrusion detection system in software defined networks using machine learning approach. Int J Adv Eng Res Sci 8(4):135–142
Krishnaraj N, Kumar RB, Rajeshwar D, Kumar TS (2020) Implementation of energy aware modified distance vector routing protocol for energy efficiency in wireless sensor networks, In: IEEE International Conference on Inventive Computation Technologies, 201–204, 2020
Krishnaraj N, Smys S (2019) A multihoming ACO-MDV routing for maximum power efficiency in an IoT environment. Wireless Pers Commun 109(1):243–256
Mohiuddin Ahmed, Mahmood AN, Jiankun H (2016) A survey of network anomaly detection techniques. J Netw Comput Appl 60:19–31
Mugunthan SR (2019) Soft computing based autonomous low rate DDOS attack detection and security for cloud computing. J Soft Comput Paradig (JSCP) 1(02):80–90
Prabhakaran V, Kulandasamy A (2020) Integration of recurrent convolutional neural network and optimal encryption scheme for intrusion detection with secure in the cloud. Comput Intell. https://doi.org/10.1111/coin.12408.datastorage
Qiao Y, Huang W, Luo X, Gong Q, Richard Yu F (2018) A multi-level DDoS mitigation framework for the industrial internet of things. IEEE Commun Mag 56(2):30–36
Raj JS, Smys S (2019) Virtual structure for sustainable wireless networks in cloud services and enterprise information system. J ISMAC 1(3):188–205
Ramprakash P, Sakthivadivel M, Krishnaraj N, Ramprasath J (2014) Host-based intrusion detection system using sequence of system calls. Int J Eng Manag Res, Vandana Publ 4(2):241–247
Ramprasath J, Seethalakshmi V (2020) Secure access of resources in software-defined networks using dynamic access control list. Int J Commun Syst. https://doi.org/10.1002/dac.4607
Ramprasath J, Seethalakshmi V (2021a) Improved network monitoring using software-defined networking for DDoS detection and mitigation evaluation. Wireless Pers Commun 116:2743–2757. https://doi.org/10.1007/s11277-020-08042-2
Ramprasath J, Seethalakshmi V (2021b) Mitigation of malicious flooding in software defined networks using dynamic access control list. Wireless Pers Commun. https://doi.org/10.1007/s11277-021-08626-6
Ramprasath J, Ramakrishnan S, SaravanaPerumal P, Sivaprakasam M, ManokaranVishnuraj U (2016) Secure network implementation using VLAN and ACL. Int J Adv Eng Res Sci 3(1):2349–6495
Ramprasath J, Ramya P, Rathnapriya T (2020) Malicious attack detection in software defined networking using machine learning approach. Int J Adv Eng Emerg Technol 11(1):22–27
Ramprasath J, Aswin Yegappan M, Dinesh R, Balakrishnan N, Kaarthi S (2017) Assigning Static Ip Using DHCP In Accordance With MAC. Int J Trends Eng Technol, 20(1)
Rao N, Srihari K, Chandra S, Ananda Rao A (2019) A survey of distributed denial-of-service (DDoS) defense techniques in ISP domains. In: Saini HS, Sayal R, Govardhan A, Buyya R (eds) Innovations in Computer Science and Engineering. Springer, Singapore, pp 221–230
Sahoo KS, Puthal D, Tiwary M, Rodrigues JJPC, Sahoo B, Dash R (2018) An early detection of low rate DDoS attack to SDN based data center networks using information distance metrics. J Future Generat Comput Syst 89:685–697
Sandesh R, Sharma K, Dhakal D (2019) A Survey on Detection and Mitigation of Distributed Denial-of-Service Attack in Named Data Networking. In: Sarma Hiren Kumar Deva, Borah Samarjeet, Dutta Nitul (eds) Advances in Communication Cloud and Big Data. Springer, Singapore, pp 163–171
Shakya S (2019) An efficient security framework for data migration in a cloud computing environment. J Artif Intell 1(01):45–53
Smys S, Raj JS (2019) A stochastic mobile data traffic model for vehicular ad hoc networks. J Ubiquitous Comput CommTechnol (UCCT) 1(01):55–63
Smys S, Vijesh Joe C (2021) Metric routing protocol for detecting untrustworthy nodes for packet transmission. J Inform Technol 3(02):67–76
Smys S, Abul B, Haoxiang W (2020) Hybrid intrusion detection system for internet of things (IoT). J ISMAC 2(04):190–199
Vaghela VB, Vandra KH, Modi NK (2014) Entropy based feature selection for multi-relational naïve bayesian classifier. J Int Technol Inform Manag 23(1):2
Funding
No funding was received to assist with the preparation of this manuscript.
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
Conflict of interests
None to declare.
Ethical approval
This article does not contain any studies with human participants or animals performed by any of the authors.
Additional information
Communicated by Joy Iong-Zong Chen.
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Arunkumar, M., Ashok Kumar, K. Malicious attack detection approach in cloud computing using machine learning techniques. Soft Comput 26, 13097–13107 (2022). https://doi.org/10.1007/s00500-021-06679-0
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s00500-021-06679-0