Abstract
Recently cloud computing has emerged the IT world. It eventually promoted the acquisition of resources and services as needed, but it has also instilled fear and user’s renunciations. However, Machine learning processing has proven high robustness in solving security flaws and reducing false alarm rates in detecting attacks. This paper, proposes a hybrid system that does not only labels behaviors based on machine learning algorithms using both misuse and anomaly-detection, but also highlights correlations between network relevant features, speeds up the updating of signatures dictionary and upgrades the analysis of user behavior.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Stats, I.W.: World Internet Users Statistics and 2018 World Population Stats (2018). [En ligne]. https://www.internetworldstats.com/stats.htm
Mell, P., Grance, T.: The NIST Definition of Cloud Computing (2011)
Ali, M., Khan, S.U., Vasilakos, A.V.: Security in cloud computing: opportunities and challenges. Inf. Sci. 305, 357–383 (2015)
Ramachandra, G., Iftikhar, M., Aslam Khan, F.: A comprehensive survey on security in cloud computing. Procedia Comput. Sci. 110, 467–472 (2017)
Passi, H.: OWASP - Top 10 Vulnerabilities in web applications (updated for 2018 …), 2 January 2018. [En ligne]. https://www.greycampus.com/blog/information-security/owasp-top-vulnerabilities-in-web-applications
Shah, J.: Understanding and study of intrusion detection systems for various networks and domains. In: Computer Communication and Informatics (ICCCI) (2017)
Indraneel, S., Praveen, V., Vuppala, K.: HTTP flood attack detection in application layer using machine learning metrics and bio inspired bat algorithm. Appl. Comput. Inform. (2017)
Moshfeq Salaken, S., Khosravi, A., Nguyen, T., Nahavandi, S.: Extreme learning machine based transfer learning algorithms: a survey. Neurocomputing 267, 516–524 (2017)
Li, Y., Ma, R., Jiao, R.: A hybrid malicious code detection method based on deep learning. Int. J. Secur. Appl. 9, 205–216 (2015)
Diro, A.A., Chilamkurti, N.: Distributed Attack Detection Scheme Using Deep Learning approach for Internet of Things. Future Generation Computer Systems 82, 761–768 (2017)
Lemoudden, M., Amar, M., El Ouahidi, B.: A binary-based MapReduce analysis for cloud logs. Procedia Comput. Sci. 83, 1213–1218 (2016)
Amar, M., Douzi, S., El Ouahidi, B., Lemoudden, M.: A novel approach in detecting intrusions using NSLKDD database and MapReduce programming. Procedia Comput. Sci. 110, 230–235 (2017)
Amar, M., Douzi S., El Ouahidi, B.: Enhancing cloud security using advanced MapReduce k-means on log files. In: ACM International Conference Proceeding Series, pp. 63–67 (2018)
Amar, M., Lemoudden, M., El Ouahidi, M.: Log file’s centralization to improve cloud security. In: IEEE Xplore, Cloud Computing Technologies and Applications (CloudTech) (2016)
Rehman, Z.-U., et al.: Machine learning-assisted signature and heuristic-based detection of malwares in Android devices. Comput. Electr. Eng. 69, 1–14 (2017)
Veeramachaneni, K., Arnaldo, I.: AI2: training a big data machine to defend. In: Big Data Security on Cloud (BigDataSecurity), IEEE International Conference on High Performance and Smart Computing (HPSC), and IEEE International Conference on Intelligent Data and Security (IDS) (2016)
Hervé, B., Tindo, G.: Vers une Nouvelle Architecture de Detection d’Intrusion Reseaux à Base de Reseaux Neuronaux. HAL Archives-ouvertes (2016)
Ya, J., Liu, T., Li, Q., Shi, J., Zhang, H., Lv, P.: Mining host behavior patterns from massive network and security logs. Procedia Comput. Sci. 108, 38–47 (2017)
Cathey, R., Ma, L., Goharian, N., Grossman, D.: Misuse Detection for Information Retrieval Systems (2003)
Fan, Z., Liu, R.: Investigation of machine learning based network traffic classification. In: Wireless Communication Systems (ISWCS) (2017)
Katzir, Z., Elovici, Y.: Quantifying the resilience of machine learning classifiers used for cyber security. Expert Syst. Appl. 92, 419–429 (2018)
Aggarwal, P., Sharma, S.K.: Analysis of KDD dataset attributes - class wise for intrusion detection. Procedia Comput. Sci. 57, 842–851 (2015)
Belavagi, M., Muniyal, B.: Performance evaluation of supervised machine learning algorithms for intrusion detection. Procedia Computer Science 89, 117–123 (2016)
Polamuri, S.: FIve Most Popular Similarity Measures Implementation in Python (2015). [En ligne]. http://dataaspirant.com/2015/04/11/five-most-popular-similarity-measures-implementation-in-python/
Mining Similarity Using Euclidean Distance, Pearson Correlation, and Filtering (2010). [En ligne]. http://mines.humanoriented.com/classes/2010/fall/csci568/portfolio_exports/mvoget/similarity/similarity.html
SotM 31 - The Honeynet Project (2004). [En ligne]. http://www.honeynet.org/scans/scan31/
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Switzerland AG
About this paper
Cite this paper
Amar, M., Lemoudden, M., El Ouahidi, B. (2019). Advanced Hybrid Technique in Detecting Cloud Web Application’s Attacks. In: Renault, É., Mühlethaler, P., Boumerdassi, S. (eds) Machine Learning for Networking. MLN 2018. Lecture Notes in Computer Science(), vol 11407. Springer, Cham. https://doi.org/10.1007/978-3-030-19945-6_6
Download citation
DOI: https://doi.org/10.1007/978-3-030-19945-6_6
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-19944-9
Online ISBN: 978-3-030-19945-6
eBook Packages: Computer ScienceComputer Science (R0)