Skip to main content
Log in

Malicious attack detection approach in cloud computing using machine learning techniques

  • Focus
  • Published:
Soft Computing Aims and scope Submit manuscript

Abstract

The increasing development of decentralized computer systems that interact extensively has increased the criticality of confronting cyberattackers, hackers, and terrorists. With the development of cloud computing and its widespread use, as well as its dispersed and decentralized character, a unique security measure is required to safeguard this architecture. By monitoring, validating, and managing settings, records, internet traffic, usage data, as well as the operations of specific activities, firewalls can distinguish between normal and unexpected behaviours, thus adding additional network security to cloud computing systems. The location of network security mechanisms in cloud computing environment and also the methods employed in such methods are the two primary aspects where many studies have concentrated their efforts. The objective of such studies is to reveal as many incursions as feasible and to improve the pace and correctness of sensing while minimizing false alarms. Nevertheless, these methods have a large computing burden, a poor degree of precision, and a large time consumption. We propose an accurate and complete approach for detecting and preventing assaults in cloud computing environment via the use of a machine learning techniques both supervised and un-supervised. The operational findings demonstrate that the suggested approach substantially increases attack detection, network security correctness, dependability, and accessibility in cloud computing environment, while drastically reducing false alarms.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8

Similar content being viewed by others

Data availability

Data sharing is not applicable—no new data generated.

References

  • Ashok Kumar K, Muthu Kumar B, Veeramuthu A, Mynavathi VS (2019) Unsupervised Machine Learning for Clustering the Infected Leaves Based on the Leaf-Colors. In: Kumar Mishra Durgesh, Yang Xin-She, Unal Aynur (eds) Data Science and Big Data Analytics Lecture Notes on Data Engineering and Communications Technologies. Springer, pp 303–312

    Chapter  Google Scholar 

  • Balasamy K, Shamia D (2021) Feature extraction-based medical image watermarking using fuzzy-based median filter. IETE J Res. https://doi.org/10.1080/03772063.2021.1893231

    Article  Google Scholar 

  • Balasamy K, Suganyadevi S (2021) A fuzzy based ROI selection for encryption and watermarking in medical image using DWT and SVD. Multimed Tools Appl 80:7167–7186. https://doi.org/10.1007/s11042-020-09981-5

    Article  Google Scholar 

  • Balasamy K, Krishnaraj N, Ramprasath J, Ramprakash P (2021) A secure framework for protecting clinical data in medical IoT environment. Smart Healthcare Syst Design: Secur Priv Asp. https://doi.org/10.1002/9781119792253.ch9

    Article  Google Scholar 

  • Behal S, Kumar K (2017) Detection of DDoS attacks and flash events using novel information theory metrics. J ComputNetw 116:96–110

    Google Scholar 

  • Carl G, Kesidis G, Richard R, Brooks, Suresh R (2006) Denial-of-service attack-detection techniques. IEEE Internet Comput 10(1):82–89

    Article  Google Scholar 

  • Emami M, Jabbarpour MR, Abolhassani B, Jung JJ, Zarrabi H (2017) Soft cooperative spectrum sensing using quantization method in the presence of smart pue attack. Mobile Netw Appl. https://doi.org/10.1007/s11036-016-0802-9

    Article  Google Scholar 

  • Hatef MA, Shaker V, Jabbarpour MR, Jung J, Zarrabi H (2017) HIDCC: a hybrid intrusion detection approach in cloud computing. Concurrency Computat Pract Exper. https://doi.org/10.1002/cpe.4171

    Article  Google Scholar 

  • Jabbarpour MR, Jalooli A, Marefat A, Noor RM (2015) A taxonomy-based comparison of vehicle cloud architectures. In: The 3rd International Conference on Information and Computer Networks (ICICN 2015), Florence, Italy, 2015

  • Jarray A, Karmouch A (2013) Cost-efficient mapping for fault-tolerant virtual networks. IEEE Trans Comput 64(3):668–681

    Article  MathSciNet  Google Scholar 

  • Jayasri P, Atchaya A, SanfeeyaParveen M, Ramprasath J (2021) Intrusion detection system in software defined networks using machine learning approach. Int J Adv Eng Res Sci 8(4):135–142

    Article  Google Scholar 

  • Krishnaraj N, Kumar RB, Rajeshwar D, Kumar TS (2020) Implementation of energy aware modified distance vector routing protocol for energy efficiency in wireless sensor networks, In: IEEE International Conference on Inventive Computation Technologies, 201–204, 2020

  • Krishnaraj N, Smys S (2019) A multihoming ACO-MDV routing for maximum power efficiency in an IoT environment. Wireless Pers Commun 109(1):243–256

    Article  Google Scholar 

  • Mohiuddin Ahmed, Mahmood AN, Jiankun H (2016) A survey of network anomaly detection techniques. J Netw Comput Appl 60:19–31

    Article  Google Scholar 

  • Mugunthan SR (2019) Soft computing based autonomous low rate DDOS attack detection and security for cloud computing. J Soft Comput Paradig (JSCP) 1(02):80–90

    Google Scholar 

  • Prabhakaran V, Kulandasamy A (2020) Integration of recurrent convolutional neural network and optimal encryption scheme for intrusion detection with secure in the cloud. Comput Intell. https://doi.org/10.1111/coin.12408.datastorage

    Article  Google Scholar 

  • Qiao Y, Huang W, Luo X, Gong Q, Richard Yu F (2018) A multi-level DDoS mitigation framework for the industrial internet of things. IEEE Commun Mag 56(2):30–36

    Article  Google Scholar 

  • Raj JS, Smys S (2019) Virtual structure for sustainable wireless networks in cloud services and enterprise information system. J ISMAC 1(3):188–205

    Article  Google Scholar 

  • Ramprakash P, Sakthivadivel M, Krishnaraj N, Ramprasath J (2014) Host-based intrusion detection system using sequence of system calls. Int J Eng Manag Res, Vandana Publ 4(2):241–247

    Google Scholar 

  • Ramprasath J, Seethalakshmi V (2020) Secure access of resources in software-defined networks using dynamic access control list. Int J Commun Syst. https://doi.org/10.1002/dac.4607

    Article  Google Scholar 

  • Ramprasath J, Seethalakshmi V (2021a) Improved network monitoring using software-defined networking for DDoS detection and mitigation evaluation. Wireless Pers Commun 116:2743–2757. https://doi.org/10.1007/s11277-020-08042-2

    Article  Google Scholar 

  • Ramprasath J, Seethalakshmi V (2021b) Mitigation of malicious flooding in software defined networks using dynamic access control list. Wireless Pers Commun. https://doi.org/10.1007/s11277-021-08626-6

    Article  Google Scholar 

  • Ramprasath J, Ramakrishnan S, SaravanaPerumal P, Sivaprakasam M, ManokaranVishnuraj U (2016) Secure network implementation using VLAN and ACL. Int J Adv Eng Res Sci 3(1):2349–6495

    Google Scholar 

  • Ramprasath J, Ramya P, Rathnapriya T (2020) Malicious attack detection in software defined networking using machine learning approach. Int J Adv Eng Emerg Technol 11(1):22–27

    Google Scholar 

  • Ramprasath J, Aswin Yegappan M, Dinesh R, Balakrishnan N, Kaarthi S (2017) Assigning Static Ip Using DHCP In Accordance With MAC. Int J Trends Eng Technol, 20(1)

  • Rao N, Srihari K, Chandra S, Ananda Rao A (2019) A survey of distributed denial-of-service (DDoS) defense techniques in ISP domains. In: Saini HS, Sayal R, Govardhan A, Buyya R (eds) Innovations in Computer Science and Engineering. Springer, Singapore, pp 221–230

    Google Scholar 

  • Sahoo KS, Puthal D, Tiwary M, Rodrigues JJPC, Sahoo B, Dash R (2018) An early detection of low rate DDoS attack to SDN based data center networks using information distance metrics. J Future Generat Comput Syst 89:685–697

    Article  Google Scholar 

  • Sandesh R, Sharma K, Dhakal D (2019) A Survey on Detection and Mitigation of Distributed Denial-of-Service Attack in Named Data Networking. In: Sarma Hiren Kumar Deva, Borah Samarjeet, Dutta Nitul (eds) Advances in Communication Cloud and Big Data. Springer, Singapore, pp 163–171

    Google Scholar 

  • Shakya S (2019) An efficient security framework for data migration in a cloud computing environment. J Artif Intell 1(01):45–53

    Google Scholar 

  • Smys S, Raj JS (2019) A stochastic mobile data traffic model for vehicular ad hoc networks. J Ubiquitous Comput CommTechnol (UCCT) 1(01):55–63

    Google Scholar 

  • Smys S, Vijesh Joe C (2021) Metric routing protocol for detecting untrustworthy nodes for packet transmission. J Inform Technol 3(02):67–76

    Google Scholar 

  • Smys S, Abul B, Haoxiang W (2020) Hybrid intrusion detection system for internet of things (IoT). J ISMAC 2(04):190–199

    Article  Google Scholar 

  • Vaghela VB, Vandra KH, Modi NK (2014) Entropy based feature selection for multi-relational naïve bayesian classifier. J Int Technol Inform Manag 23(1):2

    Google Scholar 

Download references

Funding

No funding was received to assist with the preparation of this manuscript.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to M. Arunkumar.

Ethics declarations

Conflict of interests

None to declare.

Ethical approval

This article does not contain any studies with human participants or animals performed by any of the authors.

Additional information

Communicated by Joy Iong-Zong Chen.

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Arunkumar, M., Ashok Kumar, K. Malicious attack detection approach in cloud computing using machine learning techniques. Soft Comput 26, 13097–13107 (2022). https://doi.org/10.1007/s00500-021-06679-0

Download citation

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s00500-021-06679-0

Keywords

Navigation