International Journal of Futuristic Innovation in Engineering, Science and Technology

Authors

  • Puneet Gautam Information Systems Engineering, Harrisburg University of Science and Technology, Harrisburg, PA

DOI:

https://doi.org/10.59367/hvyd5106

Keywords:

AI-driven threat detection, cloud cybersecurity, automated incident response, machine learning, cloud security

Abstract

With the rapid expansion of cloud computing, the need for robust cybersecurity measures has become paramount. As organizations increasingly migrate their data and applications to the cloud, they encounter numerous cybersecurity risks that threaten the integrity, confidentiality, and availability of their information. Traditional risk assessment methods often fall short in addressing the dynamic and complex nature of cloud environments. This paper explores a novel approach to cybersecurity risk assessment in cloud computing using machine learning techniques. We propose a comprehensive framework that leverages machine learning algorithms to detect, predict, and mitigate potential cybersecurity threats. The framework incorporates various supervised and unsupervised learning models, including decision trees, support vector machines, and neural networks, to analyze large datasets and identify patterns indicative of security breaches. Our approach also includes feature selection methods to optimize the performance of these models by focusing on the most relevant risk factors. We conducted extensive experiments on publicly available cloud security datasets, which demonstrated the efficacy of our machine learning-based risk assessment framework in identifying threats with high accuracy and minimal false positives. The results indicate that our approach significantly outperforms traditional risk assessment techniques in terms of speed, scalability, and adaptability to evolving threat landscapes. This study contributes to the field by providing a scalable and efficient solution for enhancing cybersecurity in cloud environments. It highlights the potential of machine learning to revolutionize how we assess and manage cybersecurity risks, offering a proactive stance against emerging threats. Future work will focus on refining the model by incorporating real-time data and exploring advanced machine learning techniques such as deep learning and reinforcement learning to further enhance its predictive capabilities.

References

R. Buyya, C. S. Yeo, S. Venugopal, J. Broberg, and I. Brandic, "Cloud computing and emerging IT platforms: Vision, hype, and reality for delivering computing as the 5th utility," Future Generation Computer Systems, vol. 25, no. 6, pp. 599-616, Jun. 2009.

P. Mell and T. Grance, "The NIST definition of cloud computing," NIST Special Publication 800-145, Sep. 2011.

T. Mather, S. Kumaraswamy, and S. Latif, Cloud Security and Privacy: An Enterprise Perspective on Risks and Compliance, 1st ed. Sebastopol, CA: O'Reilly Media, 2009.

Singh and K. Chatterjee, "Cloud security issues and challenges: A survey," Journal of Network and Computer Applications, vol. 79, pp. 88-115, 2017.

Z. Xiao and Y. Xiao, "Security and privacy in cloud computing," IEEE Communications Surveys & Tutorials, vol. 15, no. 2, pp. 843-859, 2013.

B. Grobauer, T. Walloschek, and E. Stocker, "Understanding cloud computing vulnerabilities," IEEE Security & Privacy, vol. 9, no. 2, pp. 50-57, 2011.

S. Subashini and V. Kavitha, "A survey on security issues in service delivery models of cloud computing," Journal of Network and Computer Applications, vol. 34, no. 1, pp. 1-11, 2011.

D. Zissis and D. Lekkas, "Addressing cloud computing security issues," Future Generation Computer Systems, vol. 28, no. 3, pp. 583-592, 2012.

J. Wu, Z. Zhang, X. Wang, and Z. Zheng, "A study on the improvement of cloud computing security using machine learning," IEEE Access, vol. 7, pp. 67417-67429, 2019.

N. Sklavos and X. Zhang, "Machine learning techniques for cybersecurity: Trends and challenges," IEEE Transactions on Emerging Topics in Computational Intelligence, vol. 5, no. 5, pp. 667-678, 2021.

R. Sommer and V. Paxson, "Outside the closed world: On using machine learning for network intrusion detection," in Proceedings of the 2010 IEEE Symposium on Security and Privacy, 2010, pp. 305-316.

T. Hastie, R. Tibshirani, and J. Friedman, The Elements of Statistical Learning: Data Mining, Inference, and Prediction, 2nd ed. New York, NY: Springer, 2009.

Goodfellow, Y. Bengio, and A. Courville, Deep Learning, 1st ed. Cambridge, MA: MIT Press, 2016.

H. Ringberg, R. E. Skoog, A. Mahimkar, S. Sharma, and J. R. Santos, "Network-wide anomaly detection with machine learning," IEEE Transactions on Network and Service Management, vol. 14, no. 4, pp. 898-912, 2017.

D. C. Montgomery, Design and Analysis of Experiments, 8th ed. Hoboken, NJ: John Wiley & Sons, 2012.

F. B. Bastani, I. W. Yan, and L. Xie, "Data diversity for cloud computing: A framework for security analysis," in Proceedings of the 2014 IEEE International Conference on Cloud Computing, 2014, pp. 201-208.

A. Abbasi, S. Saeed, and M. H. Miraz, "Towards a dynamic cloud computing security model using machine learning," Future Generation Computer Systems, vol. 115, pp. 147-156, 2021.

Z. Lipton, "The mythos of model interpretability," ACM Queue, vol. 16, no. 3, pp. 30-57, 2018.

C. Rudin, "Stop explaining black box machine learning models for high-stakes decisions and use interpretable models instead," Nature Machine Intelligence, vol. 1, pp. 206-215, 2019.

Adadi and M. Berrada, "Peeking inside the black-box: A survey on explainable artificial intelligence (XAI)," IEEE Access, vol. 6, pp. 52138-52160, 2018.

Du, Q. Zhu, Y. Gao, and W. L. Woo, "Enhancing cloud security and privacy: A hybrid approach using blockchain and machine learning," IEEE Access, vol. 9, pp. 67836-67845, 2021.

M. U. Khan, M. Mat Kiah, S. U. Khan, and S. Madani, "Cloud computing: Security threats and countermeasures," Journal of Computer Networks and Communications, vol. 2013, pp. 1-11, 2013.

S. Pearson and A. Benameur, "Privacy, security and trust issues arising from cloud computing," in Proceedings of the 2010 IEEE 2nd International Conference on Cloud Computing Technology and Science, 2010, pp. 693-702.

A. Gordon, M. P. Loeb, and W. Lucyshyn, "Information security expenditures and real options: A wait-and-see approach," Computers & Security, vol. 24, no. 1, pp. 42-56, 2005.

X. Wu, K. Yu, W. Ding, H. Wang, and X. Zhu, "Online feature selection with streaming features," IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 35, no. 5, pp. 1178-1192, 2013.

T. Chen and C. Guestrin, "XGBoost: A scalable tree boosting system," in Proceedings of the 22nd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, 2016, pp. 785-794.

J. Gao, Y. Zhu, X. Wu, and Z. Yang, "Machine learning models for predicting vulnerabilities in cloud computing," IEEE Transactions on Cloud Computing, vol. 8, no. 2, pp. 574-585, 2020.

H. Lashkari, M. S. Rad, and S. Homayoun, "An efficient machine learning approach for detecting unknown cloud malware," IEEE Transactions on Cloud Computing, vol. 8, no. 4, pp. 1110-1123, 2020.

N. K. Dhanjani, B. Applebaum, and A. Rios, Hacking Exposed: Web Applications, 3rd ed. New York, NY: McGraw-Hill, 2010.

G. Bonaccorso, Machine Learning Algorithms, 2nd ed. Birmingham, UK: Packt Publishing, 2018.

Al-Saffar, H. Tao, Y. Xiang, and M. Z. Shakir, "Machine learning algorithms for smart data analysis: A comparative review," IEEE Access, vol. 8, pp. 118978-118989, 2020.

P. Syverson, "A taxonomy of replay attacks [cryptographic protocols]," in Proceedings of the 7th IEEE Computer Security Foundations Workshop, 1994, pp. 187-191.

F. Callegati, W. Cerroni, and M. Ramilli, "Man-in-the-middle attack to the HTTPS protocol," IEEE Security & Privacy, vol. 7, no. 1, pp. 78-81, 2009.

N. Moustafa and J. Slay, "The significant feature selection of the UNSW-NB15 dataset for Network Intrusion Detection Systems," in Proceedings of the 2016 4th International Symposium on Digital Forensic and Security (ISDFS), 2016, pp. 1-6.

S. A. Jyothi, A. I. Mustapha, and H. M. Dhanya, "Intrusion detection using supervised machine learning," International Journal of Computer Science and Information Security, vol. 15, no. 4, pp. 23-29, 2017.

Breiman, "Random forests," Machine Learning, vol. 45, no. 1, pp. 5-32, 2001.

C. Cortes and V. Vapnik, "Support-vector networks," Machine Learning, vol. 20, no. 3, pp. 273-297, 1995.

S. S. Alotaibi, A. Hussain, and M. S. Sadiq, "Unsupervised anomaly detection approach for cloud environment," Cluster Computing, vol. 22, no. 5, pp. 13155-13164, 2019.

T. Fawcett and F. Provost, "Activity monitoring: Noticing interesting changes in behavior," in Proceedings of the 5th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, 1999, pp. 53-62.

J. MacQueen, "Some methods for classification and analysis of multivariate observations," in Proceedings of the Fifth Berkeley Symposium on Mathematical Statistics and Probability, 1967, pp. 281-297.

V. Chandola, A. Banerjee, and V. Kumar, "Anomaly detection: A survey," ACM Computing Surveys, vol. 41, no. 3, pp. 1-58, 2009.

C. Cachin, I. Keidar, and A. Shraer, "Trusting the cloud," ACM SIGACT News, vol. 40, no. 2, pp. 81-86, 2009.

R. Boutaba, M. A. Salahuddin, N. Limam, et al., "A comprehensive survey on machine learning for networking: Evolution, applications and research opportunities," Journal of Internet Services and Applications, vol. 9, no. 1, p. 16, 2018.

J. Goodfellow, Y. Bengio, and A. Courville, Deep Learning, 1st ed. Cambridge, MA: MIT Press, 2016.

T. G. Dietterich, "Ensemble methods in machine learning," in International Workshop on Multiple Classifier Systems, 2000, pp. 1-15.

Chawla, N. Japkowicz, and A. Kolcz, "Editorial: Special issue on learning from imbalanced data sets," ACM SIGKDD Explorations Newsletter, vol. 6, no. 1, pp. 1-6, 2004.

R. S. Sutton and A. G. Barto, Reinforcement Learning: An Introduction, 2nd ed. Cambridge, MA: MIT Press, 2018.

C. Modi, D. Patel, B. Borisaniya, et al., "A survey of intrusion detection techniques in cloud," Journal of Network and Computer Applications, vol. 36, no. 1, pp. 42-57, 2013.

Dean and S. Ghemawat, "MapReduce: Simplified data processing on large clusters," Communications of the ACM, vol. 51, no. 1, pp. 107-113, 2008.

E. T. Jaynes, "Information theory and statistical mechanics," Physical Review, vol. 106, no. 4, pp. 620-630, 1957.

B. Biggio, G. Fumera, and F. Roli, "Pattern recognition systems under attack: Design issues and research challenges," International Journal of Pattern Recognition and Artificial Intelligence, vol. 28, no. 07, p. 1460002, 2014.

J. Goodfellow, J. Shlens, and C. Szegedy, "Explaining and harnessing adversarial examples," in Proceedings of the 3rd International Conference on Learning Representations (ICLR), 2015.

S. J. Pan and Q. Yang, "A survey on transfer learning," IEEE Transactions on Knowledge and Data Engineering, vol. 22, no. 10, pp. 1345-1359, 2010.

T. Ribeiro, S. Singh, and C. Guestrin, "Why should I trust you? Explaining the predictions of any classifier," in Proceedings of the 22nd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, 2016, pp. 1135-1144.

Z. C. Lipton, "The mythos of model interpretability," Queue, vol. 16, no. 3, pp. 31-57, 2018.

Adadi and M. Berrada, "Peeking inside the black-box: A survey on explainable artificial intelligence (XAI)," IEEE Access, vol. 6, pp. 52138-52160, 2018.

Y. LeCun, Y. Bengio, and G. Hinton, "Deep learning," Nature, vol. 521, no. 7553, pp. 436-444, 2015.

Q. Yang, Y. Liu, T. Chen, and Y. Tong, "Federated machine learning: Concept and applications," ACM Transactions on Intelligent Systems and Technology (TIST), vol. 10, no. 2, pp. 1-19, 2019.

Bonawitz, V. Ivanov, B. Kreuter, et al., "Practical secure aggregation for privacy-preserving machine learning," in Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security (CCS), 2017, pp. 1175-1191.

X. Xu, I. Weber, and M. Staples, Architecture for Blockchain Applications, 1st ed. Berlin, Germany: Springer, 2019.

Zohar, "Bitcoin: under the hood," Communications of the ACM, vol. 58, no. 9, pp. 104-113, 2015.

D. J. Bernstein, "Curve25519: New Diffie-Hellman speed records," in International Conference on the Theory and Application of Cryptology and Information Security, 2006, pp. 207-228.

Papernot, P. McDaniel, A. Sinha, and M. P. Wellman, "SoK: Security and privacy in machine learning," in Proceedings of the 2018 IEEE European Symposium on Security and Privacy (EuroS&P), 2018, pp. 399-414.

Athalye, N. Carlini, and D. Wagner, "Obfuscated gradients give a false sense of security: Circumventing defenses to adversarial examples," in Proceedings of the 35th International Conference on Machine Learning (ICML), 2018, pp. 274-283.

Madry, A. Makelov, L. Schmidt, D. Tsipras, and A. Vladu, "Towards deep learning models resistant to adversarial attacks," in Proceedings of the 6th International Conference on Learning Representations (ICLR), 2018.

Downloads

Published

2024-10-01

Issue

Section

Articles

How to Cite

International Journal of Futuristic Innovation in Engineering, Science and Technology. (2024). International Journal of Futuristic Innovation in Engineering, Science and Technology (IJFIEST), 3(3), 1-15. https://doi.org/10.59367/hvyd5106

Similar Articles

1-10 of 26

You may also start an advanced similarity search for this article.