Cyber attacks detection and type prediction for cloud system using machine learning techniques

Cyber security and Cloud platforms are utilized in various usage and applications in today’s world. Given the wide range of applications, and the ease of usage they provide, the popularity of them are increasing dramatically. Leading many individuals and organizations to depend on them mainly. Secur...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Hauptverfasser: Amlak, Ghaith Mousa Hamzah, Al-Saedi, Karim Hashim Kraidi, Aljanabi, Kadhim B. S.
Format: Tagungsbericht
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page
container_issue 1
container_start_page
container_title
container_volume 3207
creator Amlak, Ghaith Mousa Hamzah
Al-Saedi, Karim Hashim Kraidi
Aljanabi, Kadhim B. S.
description Cyber security and Cloud platforms are utilized in various usage and applications in today’s world. Given the wide range of applications, and the ease of usage they provide, the popularity of them are increasing dramatically. Leading many individuals and organizations to depend on them mainly. Securing data, hardware, networks and other resources from cyber-attacks represent a crucial factor for these organizations. The work in this paper proposes an approach of multiple stages to detect and predict the cyber -attacks types aiming to enforce higher security procedures to secure the organization resources in general and data in specific. The approach first stage is the data collection where Meraz dataset available on the internet is used, and then different levels of preprocessing were conducted. The third stage is to apply different classification algorithms to group the attacks into malicious or not. Then after, the data related to the classifier that yield optimum classification results is selected for next level of knowledge extraction where hierarchical clustering was applied. The clustering is built on the malware samples of test dataset only. This dataset is divided into training and testing samples. A 10% of the dataset was used to predict the malware type. Hierarchical clustering was used with various configurations. The reason for using clustering is to predict the attack type by assigning each attack for distinct cluster. The proposed approach gave 98.88% of accuracy with Random Forest classifier and a reliable result for clustering were using Hierarchical clustering by using Euclidean distance metric, and ward linkage, The prediction values were as follows {0: 10671, 1: 3603, 2: 824}. The results obtained gave a novel approach for developing Machine Learning solution for cloud systems security. With this novel solution, the limitations of the traditional solutions are solved.
doi_str_mv 10.1063/5.0234258
format Conference Proceeding
fullrecord <record><control><sourceid>proquest_scita</sourceid><recordid>TN_cdi_proquest_journals_3106817813</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>3106817813</sourcerecordid><originalsourceid>FETCH-LOGICAL-p638-1079d49d5cfba7b450e277060c3e2e2756f57b1b979a41f4710da30340a7267f3</originalsourceid><addsrcrecordid>eNotkMtOwzAURC0EEqWw4A8ssUNKuX4nS1Txkiqx6YIVlhM71KV1gu0s8vckald3NBrN6B6E7gmsCEj2JFZAGaeivEALIgQplCTyEi0AKl5Qzr6u0U1KewBaKVUu0Pd6rF3EJmfT_CZsXXZN9l3AJlicx97hPjrrT17bRdwcusHiNKbsjnhIPvzgo2l2Pjh8cCaG2Zg6dsH_DS7doqvWHJK7O98l2r6-bNfvxebz7WP9vCl6ycqCgKosr6xo2tqomgtwVCmQ0DBHJylkK1RN6kpVhpOWKwLWMGAcjKJStWyJHk61fezm2az33RDDtKjZhKUkqiRsSj2eUqnx2cwf6T76o4mjJqBnfFroMz72D1W6YeI</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>conference_proceeding</recordtype><pqid>3106817813</pqid></control><display><type>conference_proceeding</type><title>Cyber attacks detection and type prediction for cloud system using machine learning techniques</title><source>AIP Journals Complete</source><creator>Amlak, Ghaith Mousa Hamzah ; Al-Saedi, Karim Hashim Kraidi ; Aljanabi, Kadhim B. S.</creator><contributor>AL-Safi, Mohammed G. S. ; Dawood, Ashour H. ; Stephan, Jane Jaleel ; Mohammed, Mohammed Qasim ; Obaid, Ahmed J. ; Al-Majidi, Abdul Razzaq Jabr</contributor><creatorcontrib>Amlak, Ghaith Mousa Hamzah ; Al-Saedi, Karim Hashim Kraidi ; Aljanabi, Kadhim B. S. ; AL-Safi, Mohammed G. S. ; Dawood, Ashour H. ; Stephan, Jane Jaleel ; Mohammed, Mohammed Qasim ; Obaid, Ahmed J. ; Al-Majidi, Abdul Razzaq Jabr</creatorcontrib><description>Cyber security and Cloud platforms are utilized in various usage and applications in today’s world. Given the wide range of applications, and the ease of usage they provide, the popularity of them are increasing dramatically. Leading many individuals and organizations to depend on them mainly. Securing data, hardware, networks and other resources from cyber-attacks represent a crucial factor for these organizations. The work in this paper proposes an approach of multiple stages to detect and predict the cyber -attacks types aiming to enforce higher security procedures to secure the organization resources in general and data in specific. The approach first stage is the data collection where Meraz dataset available on the internet is used, and then different levels of preprocessing were conducted. The third stage is to apply different classification algorithms to group the attacks into malicious or not. Then after, the data related to the classifier that yield optimum classification results is selected for next level of knowledge extraction where hierarchical clustering was applied. The clustering is built on the malware samples of test dataset only. This dataset is divided into training and testing samples. A 10% of the dataset was used to predict the malware type. Hierarchical clustering was used with various configurations. The reason for using clustering is to predict the attack type by assigning each attack for distinct cluster. The proposed approach gave 98.88% of accuracy with Random Forest classifier and a reliable result for clustering were using Hierarchical clustering by using Euclidean distance metric, and ward linkage, The prediction values were as follows {0: 10671, 1: 3603, 2: 824}. The results obtained gave a novel approach for developing Machine Learning solution for cloud systems security. With this novel solution, the limitations of the traditional solutions are solved.</description><identifier>ISSN: 0094-243X</identifier><identifier>EISSN: 1551-7616</identifier><identifier>DOI: 10.1063/5.0234258</identifier><identifier>CODEN: APCPCS</identifier><language>eng</language><publisher>Melville: American Institute of Physics</publisher><subject>Algorithms ; Classification ; Cluster analysis ; Clustering ; Cybersecurity ; Data collection ; Datasets ; Euclidean geometry ; Machine learning ; Malware ; Organizations</subject><ispartof>AIP Conference Proceedings, 2024, Vol.3207 (1)</ispartof><rights>Author(s)</rights><rights>2024 Author(s). Published under an exclusive license by AIP Publishing.</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://pubs.aip.org/acp/article-lookup/doi/10.1063/5.0234258$$EHTML$$P50$$Gscitation$$H</linktohtml><link.rule.ids>309,310,314,780,784,789,790,794,4512,23930,23931,25140,27924,27925,76384</link.rule.ids></links><search><contributor>AL-Safi, Mohammed G. S.</contributor><contributor>Dawood, Ashour H.</contributor><contributor>Stephan, Jane Jaleel</contributor><contributor>Mohammed, Mohammed Qasim</contributor><contributor>Obaid, Ahmed J.</contributor><contributor>Al-Majidi, Abdul Razzaq Jabr</contributor><creatorcontrib>Amlak, Ghaith Mousa Hamzah</creatorcontrib><creatorcontrib>Al-Saedi, Karim Hashim Kraidi</creatorcontrib><creatorcontrib>Aljanabi, Kadhim B. S.</creatorcontrib><title>Cyber attacks detection and type prediction for cloud system using machine learning techniques</title><title>AIP Conference Proceedings</title><description>Cyber security and Cloud platforms are utilized in various usage and applications in today’s world. Given the wide range of applications, and the ease of usage they provide, the popularity of them are increasing dramatically. Leading many individuals and organizations to depend on them mainly. Securing data, hardware, networks and other resources from cyber-attacks represent a crucial factor for these organizations. The work in this paper proposes an approach of multiple stages to detect and predict the cyber -attacks types aiming to enforce higher security procedures to secure the organization resources in general and data in specific. The approach first stage is the data collection where Meraz dataset available on the internet is used, and then different levels of preprocessing were conducted. The third stage is to apply different classification algorithms to group the attacks into malicious or not. Then after, the data related to the classifier that yield optimum classification results is selected for next level of knowledge extraction where hierarchical clustering was applied. The clustering is built on the malware samples of test dataset only. This dataset is divided into training and testing samples. A 10% of the dataset was used to predict the malware type. Hierarchical clustering was used with various configurations. The reason for using clustering is to predict the attack type by assigning each attack for distinct cluster. The proposed approach gave 98.88% of accuracy with Random Forest classifier and a reliable result for clustering were using Hierarchical clustering by using Euclidean distance metric, and ward linkage, The prediction values were as follows {0: 10671, 1: 3603, 2: 824}. The results obtained gave a novel approach for developing Machine Learning solution for cloud systems security. With this novel solution, the limitations of the traditional solutions are solved.</description><subject>Algorithms</subject><subject>Classification</subject><subject>Cluster analysis</subject><subject>Clustering</subject><subject>Cybersecurity</subject><subject>Data collection</subject><subject>Datasets</subject><subject>Euclidean geometry</subject><subject>Machine learning</subject><subject>Malware</subject><subject>Organizations</subject><issn>0094-243X</issn><issn>1551-7616</issn><fulltext>true</fulltext><rsrctype>conference_proceeding</rsrctype><creationdate>2024</creationdate><recordtype>conference_proceeding</recordtype><recordid>eNotkMtOwzAURC0EEqWw4A8ssUNKuX4nS1Txkiqx6YIVlhM71KV1gu0s8vckald3NBrN6B6E7gmsCEj2JFZAGaeivEALIgQplCTyEi0AKl5Qzr6u0U1KewBaKVUu0Pd6rF3EJmfT_CZsXXZN9l3AJlicx97hPjrrT17bRdwcusHiNKbsjnhIPvzgo2l2Pjh8cCaG2Zg6dsH_DS7doqvWHJK7O98l2r6-bNfvxebz7WP9vCl6ycqCgKosr6xo2tqomgtwVCmQ0DBHJylkK1RN6kpVhpOWKwLWMGAcjKJStWyJHk61fezm2az33RDDtKjZhKUkqiRsSj2eUqnx2cwf6T76o4mjJqBnfFroMz72D1W6YeI</recordid><startdate>20240919</startdate><enddate>20240919</enddate><creator>Amlak, Ghaith Mousa Hamzah</creator><creator>Al-Saedi, Karim Hashim Kraidi</creator><creator>Aljanabi, Kadhim B. S.</creator><general>American Institute of Physics</general><scope>8FD</scope><scope>H8D</scope><scope>L7M</scope></search><sort><creationdate>20240919</creationdate><title>Cyber attacks detection and type prediction for cloud system using machine learning techniques</title><author>Amlak, Ghaith Mousa Hamzah ; Al-Saedi, Karim Hashim Kraidi ; Aljanabi, Kadhim B. S.</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-p638-1079d49d5cfba7b450e277060c3e2e2756f57b1b979a41f4710da30340a7267f3</frbrgroupid><rsrctype>conference_proceedings</rsrctype><prefilter>conference_proceedings</prefilter><language>eng</language><creationdate>2024</creationdate><topic>Algorithms</topic><topic>Classification</topic><topic>Cluster analysis</topic><topic>Clustering</topic><topic>Cybersecurity</topic><topic>Data collection</topic><topic>Datasets</topic><topic>Euclidean geometry</topic><topic>Machine learning</topic><topic>Malware</topic><topic>Organizations</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Amlak, Ghaith Mousa Hamzah</creatorcontrib><creatorcontrib>Al-Saedi, Karim Hashim Kraidi</creatorcontrib><creatorcontrib>Aljanabi, Kadhim B. S.</creatorcontrib><collection>Technology Research Database</collection><collection>Aerospace Database</collection><collection>Advanced Technologies Database with Aerospace</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Amlak, Ghaith Mousa Hamzah</au><au>Al-Saedi, Karim Hashim Kraidi</au><au>Aljanabi, Kadhim B. S.</au><au>AL-Safi, Mohammed G. S.</au><au>Dawood, Ashour H.</au><au>Stephan, Jane Jaleel</au><au>Mohammed, Mohammed Qasim</au><au>Obaid, Ahmed J.</au><au>Al-Majidi, Abdul Razzaq Jabr</au><format>book</format><genre>proceeding</genre><ristype>CONF</ristype><atitle>Cyber attacks detection and type prediction for cloud system using machine learning techniques</atitle><btitle>AIP Conference Proceedings</btitle><date>2024-09-19</date><risdate>2024</risdate><volume>3207</volume><issue>1</issue><issn>0094-243X</issn><eissn>1551-7616</eissn><coden>APCPCS</coden><abstract>Cyber security and Cloud platforms are utilized in various usage and applications in today’s world. Given the wide range of applications, and the ease of usage they provide, the popularity of them are increasing dramatically. Leading many individuals and organizations to depend on them mainly. Securing data, hardware, networks and other resources from cyber-attacks represent a crucial factor for these organizations. The work in this paper proposes an approach of multiple stages to detect and predict the cyber -attacks types aiming to enforce higher security procedures to secure the organization resources in general and data in specific. The approach first stage is the data collection where Meraz dataset available on the internet is used, and then different levels of preprocessing were conducted. The third stage is to apply different classification algorithms to group the attacks into malicious or not. Then after, the data related to the classifier that yield optimum classification results is selected for next level of knowledge extraction where hierarchical clustering was applied. The clustering is built on the malware samples of test dataset only. This dataset is divided into training and testing samples. A 10% of the dataset was used to predict the malware type. Hierarchical clustering was used with various configurations. The reason for using clustering is to predict the attack type by assigning each attack for distinct cluster. The proposed approach gave 98.88% of accuracy with Random Forest classifier and a reliable result for clustering were using Hierarchical clustering by using Euclidean distance metric, and ward linkage, The prediction values were as follows {0: 10671, 1: 3603, 2: 824}. The results obtained gave a novel approach for developing Machine Learning solution for cloud systems security. With this novel solution, the limitations of the traditional solutions are solved.</abstract><cop>Melville</cop><pub>American Institute of Physics</pub><doi>10.1063/5.0234258</doi><tpages>10</tpages></addata></record>
fulltext fulltext
identifier ISSN: 0094-243X
ispartof AIP Conference Proceedings, 2024, Vol.3207 (1)
issn 0094-243X
1551-7616
language eng
recordid cdi_proquest_journals_3106817813
source AIP Journals Complete
subjects Algorithms
Classification
Cluster analysis
Clustering
Cybersecurity
Data collection
Datasets
Euclidean geometry
Machine learning
Malware
Organizations
title Cyber attacks detection and type prediction for cloud system using machine learning techniques
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-05T23%3A32%3A28IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_scita&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=proceeding&rft.atitle=Cyber%20attacks%20detection%20and%20type%20prediction%20for%20cloud%20system%20using%20machine%20learning%20techniques&rft.btitle=AIP%20Conference%20Proceedings&rft.au=Amlak,%20Ghaith%20Mousa%20Hamzah&rft.date=2024-09-19&rft.volume=3207&rft.issue=1&rft.issn=0094-243X&rft.eissn=1551-7616&rft.coden=APCPCS&rft_id=info:doi/10.1063/5.0234258&rft_dat=%3Cproquest_scita%3E3106817813%3C/proquest_scita%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=3106817813&rft_id=info:pmid/&rfr_iscdi=true