Cyberattack Detection System in Private Cloud

Authors

  • Chethan M.S. Assistant Professor, Department of Computer Science and Engineering, Shridevi Institute of Engineering and Technology, Maralenahalli, Karnataka, India
  • Girish L. Assistant Professor, Department of Computer Science and Engineering, Shridevi Institute of Engineering and Technology, Maralenahalli, Karnataka, India
  • Manjula T. Associate Professor, Department of Computer Science and Engineering, Shridevi Institute of Engineering and Technology, Maralenahalli, Karnataka, India
  • Priya R. Acharya Associate Professor, Department of Computer Science and Engineering, Shridevi Institute of Engineering and Technology, Maralenahalli, Karnataka, India
  • Nikki Kishore Student, Department of Computer Science and Engineering, Shridevi Institute of Engineering and Technology, Maralenahalli, Karnataka, India
  • Chaitra M.S. Lecturer, Department of Electronics and Communication, Government Polytechnic, Malavalli, Karnataka, India

Keywords:

Cyber security, Private cloud, Machine learning, cyberattack detection, network traffic analysis

Abstract

As cloud computing adoption in colleges continues to rise, the security of private cloud systems has become a paramount concern. Data breaches resulting from cyberattacks can inflict severe damage to a university's revenue and reputation. This research proposes a novel machine learning-based cyber threat detection system tailored to the university's private cloud environment. The system's main objective is to continuously monitor the cloud infrastructure and employ advanced machine learning algorithms to analyze network traffic, and identifying and preventing unusual activities that may indicate potential cyberattacks. By leveraging the potential of machine learning, this innovative system aims to enhance the university's cybersecurity protections. It considers the dynamic and evolving nature of cyber threats, enabling real-time detection and proactive measures against malicious activities. The integration of cutting-edge machine learning models and feature extraction techniques empowers the system to identify patterns of anomalous behavior, even in the face of sophisticated attacks. Essential elements of the suggested system encompass the analysis of network traffic, the identification of anomalies, and the incorporation of threat intelligence. Through the analysis of network packets and access logs, the system can effectively detect signs of unauthorized access, data exhilaration, and other cyber threats. Additionally, threat intelligence feeds provide the system with up-to-date information on emerging threats, enabling quick responses to potential risks. Moreover, the system's implementation adheres to privacy and data protection regulations, ensuring secure handling of sensitive information within the private cloud environment. Regular updates and adaptive learning capabilities enable the system to evolve with changing cyber threats, ensuring continued robustness in the face of new challenges. In conclusion, the proposed machine learning-based cyberattack detection system presents a powerful solution to safeguarding the university's private cloud infrastructure. By promptly detecting and mitigating potential cyber threats, the system acts as a proactive defense mechanism, safeguarding valuable data and preserving the university's reputation in the ever-evolving landscape of cyber security.

References

Almulla Khalid. Cyber-attack detection in network traffic using machine learning. Thesis. New York: Rochester Institute of Technology; 2022.

Chioma Chigozie-Okwum, Ifeyinwa Angela Ajah. Botnet Identification Using Machine Learning Techniques. 2nd International Conference on Education and Development. 2019 Jul.

Pijush Barthakur. Development of a Real-Time Machine- Learning based Botnet Detection Mechanism. Thesis. Karnataka, India: Gogte Institute of Technology; 2016 Nov.

Darrin Wasom. Intrusion Detection System: An Overview of RealSecure. SANS Institute InfoSec Reading Room, SANS Institute; 2001.

Islam MR, Rahman MM, Ahasan MT, Sarkar N, Akash S, Islam M, Islam F, Aktar MN, Saeed M, Harun-Or-Rashid M, Hosain MK. The impact of mucormycosis (black fungus) on SARS-CoV-2-infected patients: at a glance. Environmental Science and Pollution Research. Oct 2022; 29(46): 69341–69366.

Alhazmi A, Malaiya Y. Hybrid intrusion. detection system using rule-based and machine learning techniques. Future Gener Comput Syst. 2018; 86: 1040–1053.

Hari Gonaygunta (Department of Information Technology, University of the Cumberlands). Machine Learning Algorithms for Detection of Cyber Threats using Logistic Regression. Int J Smart Sensors Ad Hoc Netw. 2023; 3(4): 6.

Yang H, Li M, Zhang Y. A network intrusion detection system based on artificial immune system. Int J Distrib Sensor Netw. 2019; 15(4): 1550147719841952.

Carl Livadas, Robert Walsh, David Lapsley, Timothy Strayer W. Using Machine Learning Techniques to Identify Botnet Traffic. In 2nd IEEE Local Computer Networks Workshop on Network Security (WoNS'2006). 2006 Nov; 967–97.

Mustafa Alshamkhany, Wisam Alshamkhany, Mohamed Mansour, Salam Dhou, et al. Botnet Attack Detection Using Machine Learning. 2020 IEEE 14th International Conference on Innovations in Information Technology (IIT)}. 2020; 203-208.

Anand Ravindra Vishwakarma. Network Traffic Based Botnet Detection Using Machine Learning. Thesis. California: San Jose State University; 2020 Spring.

Published

2023-10-09