Machine Learning Based Cloud Computing Anomalies Detection

  • Zina Chkirbene
  • , Aiman Erbad
  • , Ridha Hamila
  • , Ala Gouissem
  • , Amr Mohamed
  • , Mounir Hamdi

Research output: Contribution to journalArticlepeer-review

41 Citations (Scopus)

Abstract

Recently, machine learning algorithms have been proposed to design new security systems for anomalies detection as they exhibit fast processing with real-time predictions. However, one of the major challenges in machine learning-based intrusion detection methods is how to include enough training examples for all the possible classes in the model to avoid the class imbalance problem and accurately detect the intrusions and their types. in this article, we propose a novel weighted classes classification scheme to secure the network against malicious nodes while alleviating the problem of imbalanced data. in the proposed system, we combine a supervised machine learning algorithm with the network node past information and a specific designed best effort iterative algorithm to enhance the accuracy of rarely detectable attacks. The machine learning algorithm is used to generate a classifier that differentiates between the investigated attacks. The system stores these decisions in a private database. Then, we design a new weight optimization algorithm that exploits these decisions to generate a weights vector that includes the best weight for each class. The proposed model enhances the overall detection accuracy and maximizes the number of correctly detectable classes even for the classes with a relatively low number of training entries. The UNSW dataset has been used to evaluate the performance of the proposed model and compare it with state of the art techniques.

Original languageEnglish
Article number9183765
Pages (from-to)178-183
Number of pages6
JournalIEEE Network
Volume34
Issue number6
DOIs
Publication statusPublished - 1 Nov 2020
Externally publishedYes

Fingerprint

Dive into the research topics of 'Machine Learning Based Cloud Computing Anomalies Detection'. Together they form a unique fingerprint.

Cite this