Kernel-Based Machine Learning Models to Predict Mitigation Time During Cloud Security Attacks

Kernel-Based Machine Learning Models to Predict Mitigation Time During Cloud Security Attacks

Padmaja Kadiri, Seshadri Ravala
Copyright: © 2021 |Pages: 14
DOI: 10.4018/IJeC.2021100106
OnDemand:
(Individual Articles)
Available
$37.50
No Current Special Offers
TOTAL SAVINGS: $37.50

Abstract

Security threats are unforeseen attacks to the services provided by the cloud service provider. Depending on the type of attack, the cloud service and its associated features will be unavailable. The mitigation time is an integral part of attack recovery. This research paper explores the different parameters that will aid in predicting the mitigation time after an attack on cloud services. Further, the paper presents machine learning models that can predict the mitigation time. The paper presents the kernel-based machine learning models that can predict the average mitigation time during security attacks. The analysis of the results shows that the kernel-based models show 87% accuracy in predicting the mitigation time. Furthermore, the paper explores the performance of the kernel-based machine learning models based on the regression-based predictive models. The regression model is used as a benchmark model to analyze the performance of the machine learning-based predictive models in the prediction of mitigation time in the wake of an attack.
Article Preview
Top

1. Introduction

On demand service requirements in terms of software, platform, infrastructure, etc. has played a major role in the growth and evolution of the IT industry. There has been tremendous growth in this area since its inception based on the concept computing as Utility (Md Tanzim Khorshed, 2012). This to the IT world is cloud computing. With the growth of cloud computing, more and more players started providing services and the number of customers opting for services has grown exponentially. There are various reasons for companies adopting cloud computing services such as convenience in setup, on-demand capacity, requiring little maintenance and the most important of all highly dependable computing platforms (Naresh Kumar, 2012). With the growth in the adoption of cloud services, the security threats also further increased. The gaps in the area need to be minimized (Md Tanzim Khorshed, 2012).

This paper addresses the various security issues faced in a cloud environment and an attempt to predict the mitigation time to overcome different attacks are shown in Figure 1. It is very much essential to predict the mitigation time for different types of attacks since these attacks can unleash collateral damage to the network infrastructure and can disrupt the various services which in turn will disrupt the customer business. The data are provided by a leading Cloud Service provider based on a non-disclosure agreement and a total of seven different attack types are considered which is discussed in Section 1.1.

Figure 1.

Overview of Cloud Computing (203)

IJeC.2021100106.f01

1.1. Different Types of Attacks Considered in This Research

  • a.

    Denial of Service and Distributed Denial of Service

  • b.

    Dictionary

  • c.

    Eavesdropping

  • d.

    Password

  • e.

    Phishing

  • f.

    Snooping

1.2. Contribution

This paper proposes the use of machine learning algorithms to predict the mitigation time from different types of attacks.

  • The statistical features of different attacks in a cloud based system are analyzed and the feature that directly impacts the mitigation time from the attack is identified.

  • Two different classes of machine learning algorithms are used in order to predict the mitigation time of the different types of attacks.

    • ¡ Regression Based model

    • ¡ Kernel Based model

Top

2. Literature Review

(Zecheng He., 2017) et al. analyzed the existing strategies in tackling the denial of service (DOS) attacks. The existing passive defenses are not useful either in identifying the source of the attack or in acting based on attack statistical features. The authors proposed a DOS attack detection system where it uses machine learning algorithms to identify the attack in the cloud. The authors used statistical information on cloud servers as well as virtual machines and evaluated nine different machine learning algorithms to compare its performance. As per the analysis, more than 90 percent of the attacks under 4 different DOS attack categories are detected without degrading the performance (Zecheng He., 2017). The authors further stated that the statistical data can be used for a border analysis and detection of different attacks and prediction of different features.

Complete Article List

Search this Journal:
Reset
Volume 20: 1 Issue (2024)
Volume 19: 7 Issues (2023)
Volume 18: 6 Issues (2022): 3 Released, 3 Forthcoming
Volume 17: 4 Issues (2021)
Volume 16: 4 Issues (2020)
Volume 15: 4 Issues (2019)
Volume 14: 4 Issues (2018)
Volume 13: 4 Issues (2017)
Volume 12: 4 Issues (2016)
Volume 11: 4 Issues (2015)
Volume 10: 4 Issues (2014)
Volume 9: 4 Issues (2013)
Volume 8: 4 Issues (2012)
Volume 7: 4 Issues (2011)
Volume 6: 4 Issues (2010)
Volume 5: 4 Issues (2009)
Volume 4: 4 Issues (2008)
Volume 3: 4 Issues (2007)
Volume 2: 4 Issues (2006)
Volume 1: 4 Issues (2005)
View Complete Journal Contents Listing