Skip to main content

Performance Evaluation of Evolutionary Under Sampling and Machine Learning Techniques for Network Security in Cloud Environment

  • Conference paper
  • First Online:
Methods and Applications for Modeling and Simulation of Complex Systems (AsiaSim 2023)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 1912))

Included in the following conference series:

  • 362 Accesses

Abstract

Despite the growing adoption of cloud computing, security challenges continue to persist in its implementation. In this study, we delve into the specific security challenges associated with cloud computing and explore the use of machine learning algorithms like K-Nearest Neighbors (KNN), Support Vector Machine (SVM), Decision Tree (DT), and Logistic Regression for anomaly detection. Our study leverages the MawiLab dataset to develop supervised machine learning models and evaluates their performance using key metrics such as accuracy, precision, recall, and F1-score. The results of our analysis showcase promising outcomes, with accuracy, precision, recall, and F1-score achieving impressive values of 96.3%, 93.8%, 95.2%, and 95.9% respectively. Nevertheless, the acquisition of real-time and unbiased datasets presents significant challenges. These findings underscore the importance of further research to enhance the applicability of machine learning techniques in effectively addressing the diverse operational conditions inherent in cloud environments.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Jordan, A.: On discriminative vs. generative classifiers: a comparison of logistic regression and naïve Bayes. Adv. Neural Inf. Process. Syst. 14(1), 841–860 (2012)

    Google Scholar 

  2. Laura, A., Mora, R.: Support vector machines (SVM) as a technique for solvency analysis. DIW Berlin Discussion Paper (2020)

    Google Scholar 

  3. Shiravi, A., Shiravi, H., Tavallaee, M., Ghorbani, A.: Toward developing a systematic approach to generate benchmark datasets for intrusion detection. Comput. Secur. 31(3), 357–374 (2012)

    Article  Google Scholar 

  4. Jin, B., Wang, Y., Liu, Z., Xue, J.: A trust model based on cloud model and Bayesian networks. Procedia Environ. Sci. 11(Part A), 452–459 (2011)

    Google Scholar 

  5. Zhang, X., Zhao, Y.: Application of support vector machine to reliability analysis of engine systems. Telkomnika 11(7), 3352–3560 (2019)

    Google Scholar 

  6. Modi, C., et al.: A survey of intrusion detection techniques in cloud. J. Netw. Comput. Appl. 36(1), 42–57 (2019)

    Article  Google Scholar 

  7. Bhamare, D., Jain, R., Samaka, M., Vaszkun, G., Erbad. A.: Multi-cloud distribution of virtual functions and dynamic service deployment: open ADN perspective. In: Cloud Engineering (IC2E), pp. 299–304 (2018)

    Google Scholar 

  8. Michalski, D., Carbonell, J., Mitchell, T.: Machine Learning: An Artificial Intelligence Approach. Springer Science & Business Media (2018)

    Google Scholar 

  9. Stein, G., Chen, B., Wu, A., Hua, K.: Decision tree classifier for network intrusion detection with GA-based feature selection. In: The Proceedings of the 43rd Annual Southeast Regional Conference. Kennesaw, Georgia (2019)

    Google Scholar 

  10. Szabó, G., Orincsay, D., Malomsoky, S., Szabó, I.: On the validation of traffic classification algorithms. In: Claypool, M., Uhlig, S. (eds.) PAM 2008. LNCS, vol. 4979, pp. 72–81. Springer, Heidelberg (2008). https://doi.org/10.1007/978-3-540-79232-1_8

    Chapter  Google Scholar 

  11. Mchugh, J.: Testing intrusion detection systems: a critique of the 2018 and 2019 DARPA intrusion detection system evaluations as performed by Lincoln laboratory. ACM Trans. Inf. Syst. Secur. (2022)

    Google Scholar 

  12. Haykin, S.: Neural Networks: A Comprehensive Foundation, 2nd edn. Prentice Hall, New Jersey (2019)

    Google Scholar 

  13. Roshke, S., Cheng, F., Meinel, C.: Intrusion detection in the Cloud. In: 11th IEEE International Conference on Dependable Autonomic and Secure Computing, pp. 729–734 (2019)

    Google Scholar 

  14. Garcia, S., Gómez, J.S., Herrera, F.: Evolutionary under sampling for extremely imbalanced big data classification under Apache Spark. Appl. Soft Comput. 108086 (2021)

    Google Scholar 

  15. Pham, P.H., Saddik, A.E., Zomaya, A.Y.: A machine learning approach to network anomaly detection using multi-objective optimization. Futur. Gener. Comput. Syst. 119, 643–659 (2021)

    Google Scholar 

  16. Dhara, R., Goyal, M.: Hybrid machine learning approach for intrusion detection in software-defined networking. Concurrency and Computation: Practice and Experience, e6073 (2021)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Gunasekar Thangarasu .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2024 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Alla, K.R., Thangarasu, G. (2024). Performance Evaluation of Evolutionary Under Sampling and Machine Learning Techniques for Network Security in Cloud Environment. In: Hassan, F., Sunar, N., Mohd Basri, M.A., Mahmud, M.S.A., Ishak, M.H.I., Mohamed Ali, M.S. (eds) Methods and Applications for Modeling and Simulation of Complex Systems. AsiaSim 2023. Communications in Computer and Information Science, vol 1912. Springer, Singapore. https://doi.org/10.1007/978-981-99-7243-2_23

Download citation

  • DOI: https://doi.org/10.1007/978-981-99-7243-2_23

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-99-7242-5

  • Online ISBN: 978-981-99-7243-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics