Cyber attacks detection and type prediction for cloud system using machine learning techniques
Cyber security and Cloud platforms are utilized in various usage and applications in today’s world. Given the wide range of applications, and the ease of usage they provide, the popularity of them are increasing dramatically. Leading many individuals and organizations to depend on them mainly. Secur...
Gespeichert in:
Hauptverfasser: | , , |
---|---|
Format: | Tagungsbericht |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | |
---|---|
container_issue | 1 |
container_start_page | |
container_title | |
container_volume | 3207 |
creator | Amlak, Ghaith Mousa Hamzah Al-Saedi, Karim Hashim Kraidi Aljanabi, Kadhim B. S. |
description | Cyber security and Cloud platforms are utilized in various usage and applications in today’s world. Given the wide range of applications, and the ease of usage they provide, the popularity of them are increasing dramatically. Leading many individuals and organizations to depend on them mainly. Securing data, hardware, networks and other resources from cyber-attacks represent a crucial factor for these organizations. The work in this paper proposes an approach of multiple stages to detect and predict the cyber -attacks types aiming to enforce higher security procedures to secure the organization resources in general and data in specific. The approach first stage is the data collection where Meraz dataset available on the internet is used, and then different levels of preprocessing were conducted. The third stage is to apply different classification algorithms to group the attacks into malicious or not. Then after, the data related to the classifier that yield optimum classification results is selected for next level of knowledge extraction where hierarchical clustering was applied. The clustering is built on the malware samples of test dataset only. This dataset is divided into training and testing samples. A 10% of the dataset was used to predict the malware type. Hierarchical clustering was used with various configurations. The reason for using clustering is to predict the attack type by assigning each attack for distinct cluster. The proposed approach gave 98.88% of accuracy with Random Forest classifier and a reliable result for clustering were using Hierarchical clustering by using Euclidean distance metric, and ward linkage, The prediction values were as follows {0: 10671, 1: 3603, 2: 824}. The results obtained gave a novel approach for developing Machine Learning solution for cloud systems security. With this novel solution, the limitations of the traditional solutions are solved. |
doi_str_mv | 10.1063/5.0234258 |
format | Conference Proceeding |
fullrecord | <record><control><sourceid>proquest_scita</sourceid><recordid>TN_cdi_proquest_journals_3106817813</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>3106817813</sourcerecordid><originalsourceid>FETCH-LOGICAL-p638-1079d49d5cfba7b450e277060c3e2e2756f57b1b979a41f4710da30340a7267f3</originalsourceid><addsrcrecordid>eNotkMtOwzAURC0EEqWw4A8ssUNKuX4nS1Txkiqx6YIVlhM71KV1gu0s8vckald3NBrN6B6E7gmsCEj2JFZAGaeivEALIgQplCTyEi0AKl5Qzr6u0U1KewBaKVUu0Pd6rF3EJmfT_CZsXXZN9l3AJlicx97hPjrrT17bRdwcusHiNKbsjnhIPvzgo2l2Pjh8cCaG2Zg6dsH_DS7doqvWHJK7O98l2r6-bNfvxebz7WP9vCl6ycqCgKosr6xo2tqomgtwVCmQ0DBHJylkK1RN6kpVhpOWKwLWMGAcjKJStWyJHk61fezm2az33RDDtKjZhKUkqiRsSj2eUqnx2cwf6T76o4mjJqBnfFroMz72D1W6YeI</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>conference_proceeding</recordtype><pqid>3106817813</pqid></control><display><type>conference_proceeding</type><title>Cyber attacks detection and type prediction for cloud system using machine learning techniques</title><source>AIP Journals Complete</source><creator>Amlak, Ghaith Mousa Hamzah ; Al-Saedi, Karim Hashim Kraidi ; Aljanabi, Kadhim B. S.</creator><contributor>AL-Safi, Mohammed G. S. ; Dawood, Ashour H. ; Stephan, Jane Jaleel ; Mohammed, Mohammed Qasim ; Obaid, Ahmed J. ; Al-Majidi, Abdul Razzaq Jabr</contributor><creatorcontrib>Amlak, Ghaith Mousa Hamzah ; Al-Saedi, Karim Hashim Kraidi ; Aljanabi, Kadhim B. S. ; AL-Safi, Mohammed G. S. ; Dawood, Ashour H. ; Stephan, Jane Jaleel ; Mohammed, Mohammed Qasim ; Obaid, Ahmed J. ; Al-Majidi, Abdul Razzaq Jabr</creatorcontrib><description>Cyber security and Cloud platforms are utilized in various usage and applications in today’s world. Given the wide range of applications, and the ease of usage they provide, the popularity of them are increasing dramatically. Leading many individuals and organizations to depend on them mainly. Securing data, hardware, networks and other resources from cyber-attacks represent a crucial factor for these organizations. The work in this paper proposes an approach of multiple stages to detect and predict the cyber -attacks types aiming to enforce higher security procedures to secure the organization resources in general and data in specific. The approach first stage is the data collection where Meraz dataset available on the internet is used, and then different levels of preprocessing were conducted. The third stage is to apply different classification algorithms to group the attacks into malicious or not. Then after, the data related to the classifier that yield optimum classification results is selected for next level of knowledge extraction where hierarchical clustering was applied. The clustering is built on the malware samples of test dataset only. This dataset is divided into training and testing samples. A 10% of the dataset was used to predict the malware type. Hierarchical clustering was used with various configurations. The reason for using clustering is to predict the attack type by assigning each attack for distinct cluster. The proposed approach gave 98.88% of accuracy with Random Forest classifier and a reliable result for clustering were using Hierarchical clustering by using Euclidean distance metric, and ward linkage, The prediction values were as follows {0: 10671, 1: 3603, 2: 824}. The results obtained gave a novel approach for developing Machine Learning solution for cloud systems security. With this novel solution, the limitations of the traditional solutions are solved.</description><identifier>ISSN: 0094-243X</identifier><identifier>EISSN: 1551-7616</identifier><identifier>DOI: 10.1063/5.0234258</identifier><identifier>CODEN: APCPCS</identifier><language>eng</language><publisher>Melville: American Institute of Physics</publisher><subject>Algorithms ; Classification ; Cluster analysis ; Clustering ; Cybersecurity ; Data collection ; Datasets ; Euclidean geometry ; Machine learning ; Malware ; Organizations</subject><ispartof>AIP Conference Proceedings, 2024, Vol.3207 (1)</ispartof><rights>Author(s)</rights><rights>2024 Author(s). Published under an exclusive license by AIP Publishing.</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://pubs.aip.org/acp/article-lookup/doi/10.1063/5.0234258$$EHTML$$P50$$Gscitation$$H</linktohtml><link.rule.ids>309,310,314,780,784,789,790,794,4512,23930,23931,25140,27924,27925,76384</link.rule.ids></links><search><contributor>AL-Safi, Mohammed G. S.</contributor><contributor>Dawood, Ashour H.</contributor><contributor>Stephan, Jane Jaleel</contributor><contributor>Mohammed, Mohammed Qasim</contributor><contributor>Obaid, Ahmed J.</contributor><contributor>Al-Majidi, Abdul Razzaq Jabr</contributor><creatorcontrib>Amlak, Ghaith Mousa Hamzah</creatorcontrib><creatorcontrib>Al-Saedi, Karim Hashim Kraidi</creatorcontrib><creatorcontrib>Aljanabi, Kadhim B. S.</creatorcontrib><title>Cyber attacks detection and type prediction for cloud system using machine learning techniques</title><title>AIP Conference Proceedings</title><description>Cyber security and Cloud platforms are utilized in various usage and applications in today’s world. Given the wide range of applications, and the ease of usage they provide, the popularity of them are increasing dramatically. Leading many individuals and organizations to depend on them mainly. Securing data, hardware, networks and other resources from cyber-attacks represent a crucial factor for these organizations. The work in this paper proposes an approach of multiple stages to detect and predict the cyber -attacks types aiming to enforce higher security procedures to secure the organization resources in general and data in specific. The approach first stage is the data collection where Meraz dataset available on the internet is used, and then different levels of preprocessing were conducted. The third stage is to apply different classification algorithms to group the attacks into malicious or not. Then after, the data related to the classifier that yield optimum classification results is selected for next level of knowledge extraction where hierarchical clustering was applied. The clustering is built on the malware samples of test dataset only. This dataset is divided into training and testing samples. A 10% of the dataset was used to predict the malware type. Hierarchical clustering was used with various configurations. The reason for using clustering is to predict the attack type by assigning each attack for distinct cluster. The proposed approach gave 98.88% of accuracy with Random Forest classifier and a reliable result for clustering were using Hierarchical clustering by using Euclidean distance metric, and ward linkage, The prediction values were as follows {0: 10671, 1: 3603, 2: 824}. The results obtained gave a novel approach for developing Machine Learning solution for cloud systems security. With this novel solution, the limitations of the traditional solutions are solved.</description><subject>Algorithms</subject><subject>Classification</subject><subject>Cluster analysis</subject><subject>Clustering</subject><subject>Cybersecurity</subject><subject>Data collection</subject><subject>Datasets</subject><subject>Euclidean geometry</subject><subject>Machine learning</subject><subject>Malware</subject><subject>Organizations</subject><issn>0094-243X</issn><issn>1551-7616</issn><fulltext>true</fulltext><rsrctype>conference_proceeding</rsrctype><creationdate>2024</creationdate><recordtype>conference_proceeding</recordtype><recordid>eNotkMtOwzAURC0EEqWw4A8ssUNKuX4nS1Txkiqx6YIVlhM71KV1gu0s8vckald3NBrN6B6E7gmsCEj2JFZAGaeivEALIgQplCTyEi0AKl5Qzr6u0U1KewBaKVUu0Pd6rF3EJmfT_CZsXXZN9l3AJlicx97hPjrrT17bRdwcusHiNKbsjnhIPvzgo2l2Pjh8cCaG2Zg6dsH_DS7doqvWHJK7O98l2r6-bNfvxebz7WP9vCl6ycqCgKosr6xo2tqomgtwVCmQ0DBHJylkK1RN6kpVhpOWKwLWMGAcjKJStWyJHk61fezm2az33RDDtKjZhKUkqiRsSj2eUqnx2cwf6T76o4mjJqBnfFroMz72D1W6YeI</recordid><startdate>20240919</startdate><enddate>20240919</enddate><creator>Amlak, Ghaith Mousa Hamzah</creator><creator>Al-Saedi, Karim Hashim Kraidi</creator><creator>Aljanabi, Kadhim B. S.</creator><general>American Institute of Physics</general><scope>8FD</scope><scope>H8D</scope><scope>L7M</scope></search><sort><creationdate>20240919</creationdate><title>Cyber attacks detection and type prediction for cloud system using machine learning techniques</title><author>Amlak, Ghaith Mousa Hamzah ; Al-Saedi, Karim Hashim Kraidi ; Aljanabi, Kadhim B. S.</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-p638-1079d49d5cfba7b450e277060c3e2e2756f57b1b979a41f4710da30340a7267f3</frbrgroupid><rsrctype>conference_proceedings</rsrctype><prefilter>conference_proceedings</prefilter><language>eng</language><creationdate>2024</creationdate><topic>Algorithms</topic><topic>Classification</topic><topic>Cluster analysis</topic><topic>Clustering</topic><topic>Cybersecurity</topic><topic>Data collection</topic><topic>Datasets</topic><topic>Euclidean geometry</topic><topic>Machine learning</topic><topic>Malware</topic><topic>Organizations</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Amlak, Ghaith Mousa Hamzah</creatorcontrib><creatorcontrib>Al-Saedi, Karim Hashim Kraidi</creatorcontrib><creatorcontrib>Aljanabi, Kadhim B. S.</creatorcontrib><collection>Technology Research Database</collection><collection>Aerospace Database</collection><collection>Advanced Technologies Database with Aerospace</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Amlak, Ghaith Mousa Hamzah</au><au>Al-Saedi, Karim Hashim Kraidi</au><au>Aljanabi, Kadhim B. S.</au><au>AL-Safi, Mohammed G. S.</au><au>Dawood, Ashour H.</au><au>Stephan, Jane Jaleel</au><au>Mohammed, Mohammed Qasim</au><au>Obaid, Ahmed J.</au><au>Al-Majidi, Abdul Razzaq Jabr</au><format>book</format><genre>proceeding</genre><ristype>CONF</ristype><atitle>Cyber attacks detection and type prediction for cloud system using machine learning techniques</atitle><btitle>AIP Conference Proceedings</btitle><date>2024-09-19</date><risdate>2024</risdate><volume>3207</volume><issue>1</issue><issn>0094-243X</issn><eissn>1551-7616</eissn><coden>APCPCS</coden><abstract>Cyber security and Cloud platforms are utilized in various usage and applications in today’s world. Given the wide range of applications, and the ease of usage they provide, the popularity of them are increasing dramatically. Leading many individuals and organizations to depend on them mainly. Securing data, hardware, networks and other resources from cyber-attacks represent a crucial factor for these organizations. The work in this paper proposes an approach of multiple stages to detect and predict the cyber -attacks types aiming to enforce higher security procedures to secure the organization resources in general and data in specific. The approach first stage is the data collection where Meraz dataset available on the internet is used, and then different levels of preprocessing were conducted. The third stage is to apply different classification algorithms to group the attacks into malicious or not. Then after, the data related to the classifier that yield optimum classification results is selected for next level of knowledge extraction where hierarchical clustering was applied. The clustering is built on the malware samples of test dataset only. This dataset is divided into training and testing samples. A 10% of the dataset was used to predict the malware type. Hierarchical clustering was used with various configurations. The reason for using clustering is to predict the attack type by assigning each attack for distinct cluster. The proposed approach gave 98.88% of accuracy with Random Forest classifier and a reliable result for clustering were using Hierarchical clustering by using Euclidean distance metric, and ward linkage, The prediction values were as follows {0: 10671, 1: 3603, 2: 824}. The results obtained gave a novel approach for developing Machine Learning solution for cloud systems security. With this novel solution, the limitations of the traditional solutions are solved.</abstract><cop>Melville</cop><pub>American Institute of Physics</pub><doi>10.1063/5.0234258</doi><tpages>10</tpages></addata></record> |
fulltext | fulltext |
identifier | ISSN: 0094-243X |
ispartof | AIP Conference Proceedings, 2024, Vol.3207 (1) |
issn | 0094-243X 1551-7616 |
language | eng |
recordid | cdi_proquest_journals_3106817813 |
source | AIP Journals Complete |
subjects | Algorithms Classification Cluster analysis Clustering Cybersecurity Data collection Datasets Euclidean geometry Machine learning Malware Organizations |
title | Cyber attacks detection and type prediction for cloud system using machine learning techniques |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-05T23%3A32%3A28IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_scita&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=proceeding&rft.atitle=Cyber%20attacks%20detection%20and%20type%20prediction%20for%20cloud%20system%20using%20machine%20learning%20techniques&rft.btitle=AIP%20Conference%20Proceedings&rft.au=Amlak,%20Ghaith%20Mousa%20Hamzah&rft.date=2024-09-19&rft.volume=3207&rft.issue=1&rft.issn=0094-243X&rft.eissn=1551-7616&rft.coden=APCPCS&rft_id=info:doi/10.1063/5.0234258&rft_dat=%3Cproquest_scita%3E3106817813%3C/proquest_scita%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=3106817813&rft_id=info:pmid/&rfr_iscdi=true |