Abstract
Despite the growing adoption of cloud computing, security challenges continue to persist in its implementation. In this study, we delve into the specific security challenges associated with cloud computing and explore the use of machine learning algorithms like K-Nearest Neighbors (KNN), Support Vector Machine (SVM), Decision Tree (DT), and Logistic Regression for anomaly detection. Our study leverages the MawiLab dataset to develop supervised machine learning models and evaluates their performance using key metrics such as accuracy, precision, recall, and F1-score. The results of our analysis showcase promising outcomes, with accuracy, precision, recall, and F1-score achieving impressive values of 96.3%, 93.8%, 95.2%, and 95.9% respectively. Nevertheless, the acquisition of real-time and unbiased datasets presents significant challenges. These findings underscore the importance of further research to enhance the applicability of machine learning techniques in effectively addressing the diverse operational conditions inherent in cloud environments.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Jordan, A.: On discriminative vs. generative classifiers: a comparison of logistic regression and naïve Bayes. Adv. Neural Inf. Process. Syst. 14(1), 841–860 (2012)
Laura, A., Mora, R.: Support vector machines (SVM) as a technique for solvency analysis. DIW Berlin Discussion Paper (2020)
Shiravi, A., Shiravi, H., Tavallaee, M., Ghorbani, A.: Toward developing a systematic approach to generate benchmark datasets for intrusion detection. Comput. Secur. 31(3), 357–374 (2012)
Jin, B., Wang, Y., Liu, Z., Xue, J.: A trust model based on cloud model and Bayesian networks. Procedia Environ. Sci. 11(Part A), 452–459 (2011)
Zhang, X., Zhao, Y.: Application of support vector machine to reliability analysis of engine systems. Telkomnika 11(7), 3352–3560 (2019)
Modi, C., et al.: A survey of intrusion detection techniques in cloud. J. Netw. Comput. Appl. 36(1), 42–57 (2019)
Bhamare, D., Jain, R., Samaka, M., Vaszkun, G., Erbad. A.: Multi-cloud distribution of virtual functions and dynamic service deployment: open ADN perspective. In: Cloud Engineering (IC2E), pp. 299–304 (2018)
Michalski, D., Carbonell, J., Mitchell, T.: Machine Learning: An Artificial Intelligence Approach. Springer Science & Business Media (2018)
Stein, G., Chen, B., Wu, A., Hua, K.: Decision tree classifier for network intrusion detection with GA-based feature selection. In: The Proceedings of the 43rd Annual Southeast Regional Conference. Kennesaw, Georgia (2019)
Szabó, G., Orincsay, D., Malomsoky, S., Szabó, I.: On the validation of traffic classification algorithms. In: Claypool, M., Uhlig, S. (eds.) PAM 2008. LNCS, vol. 4979, pp. 72–81. Springer, Heidelberg (2008). https://doi.org/10.1007/978-3-540-79232-1_8
Mchugh, J.: Testing intrusion detection systems: a critique of the 2018 and 2019 DARPA intrusion detection system evaluations as performed by Lincoln laboratory. ACM Trans. Inf. Syst. Secur. (2022)
Haykin, S.: Neural Networks: A Comprehensive Foundation, 2nd edn. Prentice Hall, New Jersey (2019)
Roshke, S., Cheng, F., Meinel, C.: Intrusion detection in the Cloud. In: 11th IEEE International Conference on Dependable Autonomic and Secure Computing, pp. 729–734 (2019)
Garcia, S., Gómez, J.S., Herrera, F.: Evolutionary under sampling for extremely imbalanced big data classification under Apache Spark. Appl. Soft Comput. 108086 (2021)
Pham, P.H., Saddik, A.E., Zomaya, A.Y.: A machine learning approach to network anomaly detection using multi-objective optimization. Futur. Gener. Comput. Syst. 119, 643–659 (2021)
Dhara, R., Goyal, M.: Hybrid machine learning approach for intrusion detection in software-defined networking. Concurrency and Computation: Practice and Experience, e6073 (2021)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2024 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Alla, K.R., Thangarasu, G. (2024). Performance Evaluation of Evolutionary Under Sampling and Machine Learning Techniques for Network Security in Cloud Environment. In: Hassan, F., Sunar, N., Mohd Basri, M.A., Mahmud, M.S.A., Ishak, M.H.I., Mohamed Ali, M.S. (eds) Methods and Applications for Modeling and Simulation of Complex Systems. AsiaSim 2023. Communications in Computer and Information Science, vol 1912. Springer, Singapore. https://doi.org/10.1007/978-981-99-7243-2_23
Download citation
DOI: https://doi.org/10.1007/978-981-99-7243-2_23
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-99-7242-5
Online ISBN: 978-981-99-7243-2
eBook Packages: Computer ScienceComputer Science (R0)