Artificial Intelligence Algorithm-Based Economic Denial of Sustainability Attack Detection Systems: Cloud Computing Environments
<p>Economic denial of sustainability threat to cloud computing service providers.</p> "> Figure 2
<p>Framework of the proposed system.</p> "> Figure 3
<p>Volume of the dataset for each class.</p> "> Figure 4
<p>The CNN structure.</p> "> Figure 5
<p>Structure of the LSTM technique.</p> "> Figure 6
<p>Confusion metrics of machine learning on binary classification: (<b>a</b>) SVM, (<b>b</b>) KNN, and (<b>c</b>) RF.</p> "> Figure 7
<p>Performance of deep learning models for binary classification: (<b>a</b>) CNN, (<b>b</b>) LSTM.</p> "> Figure 8
<p>Accuracy loss of deep learning models for binary classification: (<b>a</b>) CNN, (<b>b</b>) LSTM.</p> "> Figure 9
<p>Performance of CNN model using multi-classification: (<b>a</b>) accuracy, (<b>b</b>) loss.</p> "> Figure 10
<p>Performance of LSTM model using multi-classification: (<b>a</b>) accuracy, (<b>b</b>) loss.</p> "> Figure 11
<p>Results of Pearson correlation determining the features with highest correlation labels.</p> "> Figure 12
<p>Comparison of performance of the proposed system with different existing systems for detection of EDoS attacks.</p> ">
Abstract
:1. Introduction
2. Contribution
3. Study Background
4. Materials and Methods
4.1. Datasets
4.2. Preprocessing
4.2.1. One-Hot Encoding
4.2.2. Min–Max Normalization Method
4.3. Machine Learning Algorithms
4.3.1. Support Vector Machine (SVM)
4.3.2. K-Nearest Neighbors (KNN)
4.3.3. Random Forest Tree
4.4. Introduction to CNN and LSTM
- is the vector of the input data that are forwarded to the memory cell at time t;
- , , , , and refer to the weight matrixes;
- , , , and are point to bias vectors;
- indicates the specified value of the memory cell at time t;
- and are defined values of the candidate state of the memory cell and the state of the memory cell at time t, respectively;
- σ and tanh represent the activation functions in the LSTM neural network;
- , and are the obtained values for the input gate, the forget gate, and the output gate at time t, respectively. These gates have values in the range of 0–1 over the nonlinear sigmoid activation function.
4.5. Performance Measurements
4.5.1. Accuracy
4.5.2. Recall
4.5.3. Precision
4.5.4. F1 Score
5. Experiment
5.1. Experimental Setup
5.2. Splitting Dataset
5.3. Results of Machine Learning Algorithms
5.4. Results of Deep Learning Algorithms
5.5. Statistical Analysis
6. Results and Discussion
7. Conclusions
- The proposed systems are based on ML and DL models for detecting EDoS attacks in cloud computing. The assessment and findings demonstrate that the system is efficient in terms of accuracy.
- We offer two EDoS detection scenarios: binary classification, which contains normal and attack classes only, and multi-classification, which contains nine classes of attacks.
- Statistical analysis was applied to find the percentage of error between the input and prediction values from different ML and DL models.
- Overall, the RF tree demonstrated the best ability to detect EDoS attacks on binary classification, whereas the SVM method had the best ability on multi-classification datasets.
- The experiments revealed that the proposed system produced better results than existing systems.
- It is also noteworthy that the performance of ML models is marginally superior to that of mathematical models. The ML model has precision of 100%, whereas the mathematical model has precision of 99% for binary classification and 97.56% for multi-classification datasets.
Author Contributions
Funding
Institutional Review Board Statement
Informed Consent Statement
Data Availability Statement
Acknowledgments
Conflicts of Interest
References
- Chowdhury, F.Z.; Kiah, L.B.M.; Ahsan, M.A.M.; Idris, M.Y.I.B. Economic denial of sustainability (EDoS) mitigation approaches incloud: Analysis and open challenges. In Proceedings of the International Conference on Electrical Engineering and Computer Science (ICECOS), Palembang, Indonesia, 22–23 August 2017; pp. 206–211. [Google Scholar]
- Rambabu, M.; Gupta, S.; Singh, R.S. Data mining in cloud computing: Survey. In Innovations in Computational Intelligence and Computer Vision; Sharma, M.K., Dhaka, V.S., Perumal, T., Dey, N., Tavares, J.M.R.S., Eds.; Advances in Intelligent Systems and Computing; Springer: Singapore, 2021; Volume 1189. [Google Scholar]
- El Kafhali, S.; El Mir, I.; Hanini, M. Security threats, defense mechanisms, challenges, and future directions in cloud computing. Arch. Comput. Methods Eng. 2022, 29, 223–246. [Google Scholar] [CrossRef]
- Kuyoro, S.O.; Ibikunle, F.; Awodele, O. Cloud computing security issues and challenges. Int. J. Comput. Netw. 2011, 3, 247–255. [Google Scholar]
- Chris, H. Cloud Computing Security: From DDoS (Distributed Denial of Service) to EDoS (Economic Denial of Sustainability). 2008. Available online: http://rationalsecurity.typepad.com/blog/2008/11/cloudcomputing-security-from-ddos-distributed-denial-of-service-to-edos-economic-denial-of-sustaina.html (accessed on 22 March 2022).
- Chris, H. A Couple of Follow-Ups on the EDoS (Economic Denial of Sustainability) Concept. 2009. Available online: http://rationalsecurity.typepad.com/blog/edos/ (accessed on 22 March 2017).
- Reuven, C. Cloud Attack: Economic Denial of Sustainability (EDoS). Available online: http://www.elasticvapor.com/2009/01/cloud-attack-economic-denial-of.html (accessed on 20 March 2022).
- Singh, P.; Manickam, S.; Rehman, S.U. A survey of mitigation techniques against Economic Denial of Sustainability (EDoS) attack on cloud computing architecture. In Proceedings of the IEEE 3rd International Conference on Reliability, Infocom Technologies and Optimization (ICRITO), Noida, India, 8–10 October 2014; pp. 1–4. [Google Scholar]
- Bremler-Barr, A.; Brosh, E.; Sides, M. DDoS attack on cloud auto-scaling mechanisms. In Proceedings of the IEEE Conference on Computer Communications (INFOCOM 2017), Atlanta, GA, USA, 1–4 May 2017; pp. 1–9. [Google Scholar]
- Somani, G.; Gaur, M.S.; Sanghi, D.; Conti, M. DDoS attacks in cloud computing: Collateral damage to non-targets. Comput. Netw. 2016, 109, 157–171. [Google Scholar] [CrossRef]
- Baig, Z.A.; Sait, S.M.; Binbeshr, F. Controlled access to cloud resources for mitigating Economic Denial of Sustainability (EDoS) attacks. Comput. Netw. 2016, 97, 31–47. [Google Scholar] [CrossRef] [Green Version]
- Tavallaee, M.; Bagheri, E.; Lu, W.; Ghorbani, A.A. A detailed analysis of the KDD CUP 99 data set. In Proceedings of the 2009 IEEE Symposium on Computational Intelligence for Security and Defense Applications, Ottawa, ON, Canada, 8–10 July 2009; pp. 1–6. [Google Scholar]
- Al-Haidari, F.; Salah, K.; Sqalli, M.; Buhari, S.M. Performance modeling and analysis of the EDoS-shield mitigation. Arab. J. Sci. Eng. 2017, 42, 793–804. [Google Scholar]
- Khor, S.H.; Nakao, A. Spow on-demand cloud-based EDDoS mitigation mechanism. In Proceedings of the 5th Workshop on Hot Topics in System Dependability, Lisbon, Portugal, 29 June 2009; pp. 1–6. [Google Scholar]
- European Union Agency for Network and Information Security (ENISA) Threat Landscape Report 2016. Available online: https://www.enisa.europa.eu/publications/enisa-threat-landscape-report-2016 (accessed on 22 March 2022).
- European Comission Cybersecurity Stratregy. 2017. Available online: https://ec.europa.eu/digital-singlemarket/en/policies/cybersecurity (accessed on 20 March 2022).
- US National Cyber Incident Response Plan (NCIRP). 2017. Available online: https://www.us-cert.gov/ncirp (accessed on 22 March 2022).
- Kolias, C.; Kambourakis, G.; Stavrou, A.; Voas, J. DDoS in the IoT: Mirai and other botnets. Computer 2017, 50, 80–84. [Google Scholar]
- European Police (Europol). The Internet Organised Crime Threat Assessment (IOCTA). 2017. Available online: https://www.europol.europa.eu/activities-services/main-reports/internet-organisedcrime-threat-assessment-iocta-2017 (accessed on 22 March 2022).
- Ghanem, K.; Aparicio-Navarro, F.J.; Kyriakopoulos, K.G.; Lambotharan, S.; Chambers, J.A. Support vector machine for network intrusion and cyber attack detection. In Proceedings of the 2017 Sensor Signal Processing for Defence Conference (SSPD), London, UK, 6–7 December 2017; pp. 1–5. [Google Scholar]
- Phan, T.V.; Park, M. Efficient distributed denial-of-service attack defense in SDN-based cloud. IEEE Access 2019, 7, 18701–18714. [Google Scholar]
- Alkahtani, H.; Aldhyani, T.H.H. Developing Cybersecurity Systems Based on Machine Learning and Deep Learning Algorithms for Protecting Food Security Systems: Industrial Control Systems. Electronics 2022, 11, 1717. [Google Scholar] [CrossRef]
- Bhingarkar, A.S.; Shah, B.D. A survey: Securing cloud infrastructure against edos attack. In Proceedings of the International Conference on Grid Computing and Applications (GCA), Athens, Greece, 27–30 July 2015; pp. 16–22. [Google Scholar]
- Vivinsandar, S.; Shenai, S. Economic denial of sustainability (EDoS) in cloud services using HTTP and XML based DDoS attacks. Int. J. Comput. Appl. 2012, 41, 11–16. [Google Scholar] [CrossRef]
- Zhou, W.; Jia, W.; Wen, S.; Xiang, Y.; Zhou, W. Detection and defense of application-layer DDoS attacks in backbone web traffic. Future Gener. Comput. Syst. 2014, 38, 36–46. [Google Scholar]
- Singh, K.; Dee, T. MLP-GA based algorithm to detect application layer DDoS attack. J. Inf. Secur. Appl. 2017, 36, 145–153. [Google Scholar] [CrossRef]
- Monge, M.A.S.; Vidal, J.M.; Villalba, L.J.G. Entropy-based economic denial of sustainability detection. Entropy 2017, 19, 649. [Google Scholar] [CrossRef] [Green Version]
- Bhingarkar, S.; Shah, D. FLNL: Fuzzy entropy and lion neural learner for EDoS attack mitigation in cloud computing. Int. J. Model. Simul. Sci. Comput. 2018, 9, 1850049. [Google Scholar] [CrossRef]
- Masood, M.; Anwar, Z.; Raza, S.A.; Hur, M.A. EDoS Armor: A cost effective economic denial of sustainability attack mitigation framework for e-commerce applications in cloud environments. In Proceedings of the Multi Topic Conference (INMIC), Lahore, Pakistan, 9–20 December 2013; pp. 37–42. [Google Scholar]
- Baig, Z.A.; Binbeshr, F. Controlled virtual resource access to mitigate economic denial of sustainability (EDoS) attacks against cloud infrastructures. In Proceedings of the Cloud Computing and Big Data (CloudCom-Asia), Fuzhou, China, 16–19 December 2013. [Google Scholar]
- Koduru, A.; Neelakantam, T.; Saira Bhanu, S.M. Detection of economic denial of sustainability using time spent on a web page in cloud. In Proceedings of the Cloud Computing in Emerging Markets (CCEM), Bangalore, India, 16–18 October 2013. [Google Scholar]
- Al-Haidari, F.; Sqalli, M.H.; Salah, K. Enhanced EDoSShield for mitigating EDoS attacks originating from spoofed IP addresses. In Proceedings of the 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications, Liverpool, UK, 25–27 June 2012. [Google Scholar]
- Naresh, K. Mitigating economic denial of sustainability (EDoS) in cloud computing using in-cloud scrubber service. In Proceedings of the 2012 Fourth International Conference on Computational Intelligence and Communication Networks (CICN), Mathura, India, 3–5 November 2012. [Google Scholar]
- Sqalli, M.H.; Al-Haidari, F.; Salah, K. EDOs-shield—A two-steps mitigation technique against EDos attacks in cloud computing. In Proceedings of the 2011 Fourth IEEE International Conference on Utility and Cloud Computing (UCC), Melbourne, VIC, Australia, 5–8 December 2011. [Google Scholar]
- Teoh, T.T.; Chiew, G.; Franco, E.J.; Ng, P.C.; Benjamin, M.P.; Goh, Y.J. Anomaly detection in cyber security attacks on networks using MLP deep learning. In Proceedings of the 2018 International Conference on Smart Computing and Electronic Enterprise (ICSCEE), Kuala Lumpur, Malaysia, 11–12 July 2018; pp. 1–5. [Google Scholar]
- Larriva-Novo, X.A.; Vega-Barbas, M.; Villagra, V.A.; Sanz Rodrigo, M. Evaluation of cybersecurity data setcharacteristics for their applicability to neural networks algorithms detecting cybersecurity anomalies. IEEE Access 2020, 8, 9005–9014. [Google Scholar] [CrossRef]
- Alkahtani, H.; Aldhyani, T.H.H. Botnet Attack Detection by Using CNN-LSTM Model for Internet of Things Applications. Secur. Commun. Netw. 2021, 2021, 3806459. [Google Scholar] [CrossRef]
- Gauthama Raman, M.R.; Somu, N.; Jagarapu, S.; Manghnani, T.; Selvam, T.; Krithivasan, K.; Shankar Sriram, V.S. An efficient intrusion detection technique based on support vector machine and improved binary gravitational search algorithm. Artif. Intell. Rev. 2020, 53, 3255–3286. [Google Scholar] [CrossRef]
- Shaaban, A.R.; Abd-Elwanis, E.; Hussein, M. DDoS attack detection and classification via Convolutional Neural Network (CNN). In Proceedings of the 2019 Ninth International Conference on Intelligent Computing and Information Systems (ICICIS), Cairo, Egypt, 8–10 December 2019; pp. 233–238. [Google Scholar]
- Yin, C.; Zhu, Y.; Fei, J.; He, X. A deep learning approach for intrusion detection using recurrent neural networks. IEEE Access 2017, 5, 21954–21961. [Google Scholar] [CrossRef]
- Liang, X.; Znati, T. A long short-term memory enabled framework for DDoS detection. In Proceedings of the 2019 IEEE Global Communications Conference (GLOBECOM), Waikoloa, HI, USA, 9–13 December 2019; pp. 1–6. [Google Scholar]
- Li, Y.; Lu, Y. LSTM-BA: DDoS detection approach combining LSTM and Bayes. In Proceedings of the 2019 Seventh International Conference on Advanced Cloud and Big Data (CBD), Suzhou, China, 21–22 September 2019; pp. 180–185. [Google Scholar]
- Dinh, P.T.; Park, M. Dynamic economic-denial-of-sustainability (EDoS) detection in SDN-based cloud. In Proceedings of the 2020 Fifth International Conference on Fog and Mobile Edge Computing (FMEC), Paris, France, 20–23 April 2020; pp. 62–69. [Google Scholar]
- Roy, B.; Cheung, H. A deep learning approach for intrusion detection in internet of things using Bi-directional long short-term memory recurrent neural network. In Proceedings of the 2018 28th International Telecommunication Networks and Applications Conference (ITNAC), Sydney, Australia, 21–23 November 2018; pp. 1–6. [Google Scholar]
- Singh, K.; Singh, P.; Kumar, K. Application layer HTTP-GET flood DDoS attacks: Research landscape and challenges. Comput. Secur. 2017, 65, 344–372. [Google Scholar] [CrossRef]
- Shawahna, A.; Abu-Amara, M.; Mahmoud, A.S.H.; Osais, Y. EDoS-ADS: An enhanced mitigation technique against economic denial of sustainability (EDoS) attacks. IEEE Trans. Cloud Comput. 2020, 8, 790–804. [Google Scholar] [CrossRef]
- Zhong, Z.; Xu, M.; Rodriguez, M.A.; Xu, C.; Buyya, R. Machine learning-based orchestration of containers: A taxonomy and future directions. ACM Comput. Surv. (CSUR) 2021. [Google Scholar] [CrossRef]
- Kushwah, G.S.; Ranga, V. Optimized extreme learning machine for detecting DDoS attacks in cloud computing. Comput. Secur. 2021, 105, 102260. [Google Scholar] [CrossRef]
- Makuvaza, A.; Jat, D.S.; Gamundani, A.M. Deep neural network (DNN) solution for real-time detection of distributed denial of service (DDoS) attacks in software defined networks (SDNs). SN Comput. Sci. 2021, 2, 107. [Google Scholar] [CrossRef]
- Bindra, N.; Sood, M. Detecting DDoS attacks using machine learning techniques and contemporary intrusion detection dataset. Autom. Control. Comput. Sci. 2019, 53, 419–428. [Google Scholar] [CrossRef]
- Kshirsagar, D.; Kumar, S. An efficient feature reduction method for the detection of DoS attack. ICT Express 2021, 7, 371–375. [Google Scholar] [CrossRef]
- Manimurugan, S.; Al-Mutairi, S.; Aborokbah, M.M.; Chilamkurti, N.; Ganesan, S.; Patan, R. Effective attack detection in internet of medical things smart environment using a deep belief neural network. IEEE Access 2020, 8, 77396–77404. [Google Scholar] [CrossRef]
- Dehkordi, A.B.; Soltanaghaei, M.; Boroujeni, F.Z. The DDoS attacks detection through machine learning and statistical methods in SDN. J. Supercomput. 2021, 77, 2383–2415. [Google Scholar] [CrossRef]
- The CTU-13 Dataset. A Labeled Dataset with Botnet, Normal and Background traffic. Available online: https://www.stratosphereips.org/datasets- (accessed on 15 March 2022).
- Elsayed, M.S.; Le-Khac, N.A.; Dev, S.; Jurcut, A.D. Ddosnet: A deep-learning model for detecting network attacks. In Proceedings of the 2020 IEEE 21st International Symposium on “A World of Wireless, Mobile and Multimedia Networks” (WoWMoM), Cork, Ireland, 31 August–3 September 2020; pp. 391–396. [Google Scholar]
- Javaid, A.; Niyaz, Q.; Sun, W.; Alam, M. A Deep Learning Approach for Network Intrusion Detection System. EAI Endorsed Trans. Secur. Saf. 2016, 3, e2. [Google Scholar]
- Sadaf, K.; Sultana, J. Intrusion detection based on autoencoder and isolation forest in fog computing. IEEE Access 2020, 8, 167059–167068. [Google Scholar] [CrossRef]
- Ferrag, M.A.; Maglaras, L. DeepCoin: A novel deep learning and blockchain-based energy exchange framework for smart grids. IEEE Trans. Eng. Manag. 2019, 67, 1285–1297. [Google Scholar] [CrossRef] [Green Version]
- Zhou, L.; Ouyang, X.; Ying, H.; Han, L.; Cheng, Y.; Zhang, T. Cyber-attack classification in smart grid via deep neural network. In Proceedings of the 2nd International Conference on Computer Science and Application Engineering, Hohhot, China, 22–24 October 2018; pp. 1–5. [Google Scholar]
- Aldallal, A.; Alisa, F. Effective intrusion detection system to secure data in cloud using machine learning. Symmetry 2021, 13, 2306. [Google Scholar] [CrossRef]
- Shahinzadeh, H.; Mahmoudi, A.; Moradi, J.; Nafisi, H.; Kabalci, E.; Benbouzid, M. Anomaly Detection and Resilience-Oriented Countermeasures against Cyberattacks in Smart Grids. In Proceedings of the 2021 7th International Conference on Signal Processing and Intelligent Systems (ICSPIS), Tehran, Iran, 29–30 December 2021; pp. 1–7. [Google Scholar]
- Bagherzadeh, L.; Shahinzadeh, H.; Shayeghi, H.; Dejamkhooy, A.; Bayindir, R.; Iranpour, M. Integration of cloud computing and IoT (CloudIoT) in smart grids: Benefits, challenges, and solutions. In Proceedings of the 2020 International Conference on Computational Intelligence for Smart Power System and Sustainable Energy (CISPSSE), Keonjhar, India, 29–31 July 2020; pp. 1–8. [Google Scholar]
- Shahinzadeh, H.; Mahmoudi, A.; Gharehpetian, G.B.; Muyeen, S.M.; Benbouzid, M.; Kabalci, E. An agile black-out detection and response paradigm in smart grids incorporating iot-oriented initiatives and fog-computing platform. In Proceedings of the 2022 International Conference on Protection and Automation of Power Systems (IPAPS), Zahedan, Iran, 19–20 January 2022; Volume 16, pp. 1–8. [Google Scholar]
- Moradi, J.; Shahinzadeh, H.; Nafisi, H.; Marzband, M.; Gharehpetian, G.B. Attributes of big data analytics for data-driven decision making in cyber-physical power systems. In Proceedings of the 2020 14th International Conference on Protection and Automation of Power Systems (IPAPS), Tehran, Iran, 31 December 2019–1 January 2020; pp. 83–92. [Google Scholar]
- Liu, G.; Zhao, H.; Fan, F.; Liu, G.; Xu, Q.; Nazir, S. An enhanced intrusion detection model based on improved kNN in WSNs. Sensors 2022, 22, 1407. [Google Scholar] [CrossRef]
- Gomes, R.; Ahsan, M.; Denton, A. Random forest classifier in SDN framework for user-based indoor localization. In Proceedings of the 2018 IEEE International Conference on Electro/Information Technology (EIT), Rochester, MI, USA, 3–5 May 2018; pp. 0537–0542. [Google Scholar]
- Pal, M. Random forest classifier for remote sensing classification. Int. J. Remote Sens. 2005, 26, 217–222. [Google Scholar] [CrossRef]
- Aldhyani, T.H.H.; Alkahtani, H. Attacks to automatous vehicles: A deep learning algorithm for cybersecurity. Sensors 2022, 22, 360. [Google Scholar] [CrossRef]
- Alkahtani, H.; Aldhyani, T.; Al-Yaari, M. Adaptive anomaly detection framework model objects in cyberspace. Appl. Bionics Biomech. 2020, 2020, 6660489. [Google Scholar] [CrossRef]
- Fu, R.; Zhang, Z.; Li, L. Using LSTM and GRU neural network methods for traffic flow prediction. In Proceedings of the 2016 31st Youth Academic Annual Conference of Chinese Association of Automation (YAC), Wuhan, China, 11–13 November 2016; pp. 324–328. [Google Scholar]
- Čeponis, D.; Goranin, N. Investigation of dual-flow deep learning models LSTM-FCN and GRU-FCN efficiency against single-flow CNN models for the host-based intrusion and malware detection task on univariate times series data. Appl. Sci. 2020, 10, 2373. [Google Scholar] [CrossRef] [Green Version]
- Dey, R.; Salemt, F.M. Gate-variants of gated recurrent unit (GRU) neural networks. In Proceedings of the 2017 IEEE 60th International Midwest Symposium on Circuits and Systems (MWSCAS), Boston, MA, USA, 6–9 August 2017; pp. 1597–1600. [Google Scholar]
- Chang, L.Y.; Chen, W.C. Data mining of tree-based models to analyze freeway accident frequency. J. Saf. Res. 2005, 36, 365–375. [Google Scholar] [CrossRef]
- Aldous, D. Tree-based models for random distribution of mass. J. Stat. Phys. 1993, 73, 625–641. [Google Scholar] [CrossRef]
- Jing, D.; Chen, H.-B. SVM based network intrusion detection for the UNSW-NB15 dataset. In Proceedings of the 2019 IEEE 13th International Conference on ASIC (ASICON), Chongqing, China, 29 October–1 November 2019; pp. 1–4. [Google Scholar]
- Husain, A.; Salem, A.; Jim, C.; Dimitoglou, G. Development of an efficient network intrusion detection model using extreme gradient boosting (XGBoost) on the UNSW-NB15 dataset. In Proceedings of the 2019 IEEE International Symposium on Signal Processing and Information Technology (ISSPIT), Ajman, United Arab Emirates, 10–12 December 2019; pp. 1–7. [Google Scholar]
- Gwon, H.; Lee, C.; Keum, R.; Choi, H. Network intrusion detection based on LSTM and feature embedding. arXiv 2019, arXiv:1911.11552. [Google Scholar] [CrossRef]
- Karn, R.R.; Kudva, P.; Elfadel, I.A.M. Dynamic autoselection and autotuning of machine learning models for cloud network analytics. IEEE Trans. Parallel Distrib. Syst. 2019, 30, 1052–1064. [Google Scholar] [CrossRef]
- Ahsan, M.; Gomes, R.; Chowdhury, M.M.; Nygard, K.E. Enhancing machine learning prediction in cybersecurity using dynamic feature selector. J. Cybersecur. Priv. 2021, 1, 199–218. [Google Scholar] [CrossRef]
Attacks | Description |
---|---|
Analysis | A hacker attempts to reach the same network as the user to listen to (and record) network traffic. |
Fuzzers | A fuzzing attack is a procedure that is automated and used to identify vulnerabilities in software applications. It involves injecting enormous quantities of random data, also known as fuzz, into a source code and observing the results of the experiment. |
Shellcode | Shellcode is a specific type of code that may be remotely inserted and used by hackers to attack a wide range of software vulnerabilities and flaws. It has this name because it usually results in the spawning of a command shell from which attackers may gain control of the vulnerable machine. |
Reconnaissance | When an intruder interacts with a targeted system to obtain knowledge on vulnerabilities, it is known as active reconnaissance. |
Exploits | The term “exploit” refers to an attack on a computer system, particularly one that takes advantage of a specific weakness that the system makes available to intruders. |
DoS | A DoS assault is a type of cyberattack that attempts to bring a computer or network to a halt, rendering it inaccessible to intended users. DoS attacks do this by flooding the target with traffic or by feeding it information that causes the target to crash and shut down. |
Worms | One of the fundamental functions of a computer worm is to self-replicate and infect other uninfected computers. |
Backdoor | A backdoor is a type of malware that allows users to obtain access to a system by circumventing conventional authentication mechanisms. Therefore, remote access is acquired to resources inside an application, such as databases and file servers, giving offenders the ability to remotely issue system instructions and update malware without the need to physically access the resource. |
Generic | It is possible to perform a general attack against a cryptographic primitive without concern for the specifics of how this particular cryptographic primitive was developed. |
Parameter Types | Parameter Values |
---|---|
Kernel size value | 5 |
Max pooling size value | 4 |
Dropout layer value | 0.50 |
FC layer | 512 |
Activation function and optimizer operator | ReLU function and Adam |
Size of epochs | 20 |
Batch size | 50 |
Variable | Training Size | Testing Size |
---|---|---|
Dataset | 56,683 | 24,294 |
Algorithm | Classes | Accuracy (%) | Precision (%) | Recall (%) | F1 Score (%) |
---|---|---|---|---|---|
SVM | Normal | 98 | 97 | 100 | 99 |
Attacks | 100 | 91 | 95 | ||
Weighted Average | 98 | 98 | 98 | ||
KNN | Normal | 98 | 99 | 99 | 99 |
Attacks | 97 | 95 | 96 | ||
Weighted Average | 98 | 98 | 98 | ||
RF | Normal | 99 | 99 | 99 | 99 |
Attacks | 98 | 96 | 97 | ||
Weighted Average | 98 | 98 | 98 |
Attacks | Precision % | Recall % | F1 Score % |
---|---|---|---|
Analysis | 100 | 100 | 100 |
Backdoor | 0.00 | 0.00 | 0.00 |
DoS | 100 | 100 | 100 |
Exploits | 100 | 100 | 100 |
Fuzzers | 47 | 47 | 47 |
Generic | 99 | 99 | 99 |
Normal | 100 | 100 | 100 |
Reconnaissance | 58 | 65 | 61 |
Worms | 00 | 0.00 | 0.00 |
Accuracy | 97.56% | ||
Weighted Average | 97 | 98 | 98 |
Attacks | Precision % | Recall % | F1 Score % |
---|---|---|---|
Analysis | 100 | 100 | 100 |
Backdoor | 0.00 | 0.00 | 0.00 |
DoS | 100 | 100 | 100 |
Exploits | 100 | 100 | 100 |
Fuzzers | 46 | 51 | 48 |
Generic | 99 | 99 | 99 |
Normal | 100 | 100 | 100 |
Reconnaissance | 58 | 54 | 56 |
Worms | 33 | 0.03 | 0.05 |
Accuracy | 97.41% | ||
Weighted Average | 97 | 97 | 97 |
Attacks | Precision % | Recall % | F1 Score % |
---|---|---|---|
Analysis | 100 | 100 | 100 |
Backdoor | 0.00 | 0.00 | 0.00 |
DoS | 100 | 100 | 100 |
Exploits | 100 | 100 | 100 |
Fuzzers | 49 | 48 | 49 |
Generic | 99 | 99 | 99 |
Normal | 100 | 100 | 100 |
Reconnaissance | 60 | 59 | 59 |
Worms | 31 | 11 | 16 |
Accuracy | 97.50% | ||
Weighted Average | 97 | 98 | 97 |
Algorithm | Loss | Accuracy (%) | Precision (%) | Recall (%) | F1 Score (%) |
---|---|---|---|---|---|
CNN | 0.055 | 98.15 | 98.98 | 93.20 | 96 |
LSTM | 0.0495 | 98.27 | 98.28 | 94.35 | 96.28 |
Algorithm | Loss | Accuracy (%) | Precision (%) | Recall (%) | F1 Score (%) |
---|---|---|---|---|---|
CNN | 0.558 | 84.46 | 77 | 84 | 80 |
LSTM | 0.30 | 90.35 | 88 | 90 | 88 |
Model | MAE | MSE | RMSE | R2 (%) |
---|---|---|---|---|
SVM | 0.0222 | 0.0222 | 0.14908 | 88.11 |
KNN | 0.0189 | 0.0189 | 0.1377 | 89.66 |
RF | 0.01465 | 0.01465 | 0.121 | 92.02 |
CNN | 0.032 | 0.0147 | 0.012 | 91.89 |
CNN-LSTM | 0.0172 | 0.0172 | 0.1312 | 90.50 |
Model | MAE | MSE | RMSE | R2 (%) |
---|---|---|---|---|
SVM | 0.057 | 0.157 | 0.3965 | 89.39 |
KNN | 0.085 | 0.1941 | 0.440 | 88.92 |
RF | 0.0576 | 0.156 | 0.3801 | 89.35 |
CNN | 0.255 | 0.533 | 0.730 | 65.71 |
LSTM | 0.230 | 0.717 | 0.846 | 90.34 |
Reference | Year | Dataset | Classification Type | Model | Feature Selection | Accuracy (%) |
---|---|---|---|---|---|---|
Ref. [75] | 2019 | UNSW-NB | Multi-classification | SVM | x | 75.77% |
Ref. [76] | 2019 | UNSW-NB | Multi-classification | XGBoost | x | 86% |
Ref. [77] | 2019 | UNSW-NB | Multi-classification | LSTM | x | 83% |
Ref. [78] | 2019 | UNSW-NB | Multi-classification | Dynamic classifier | K-best | 61% |
Ref. [79] | 2021 | Binary classification | RF, CNN-LSTM | Information gain Wrapper method application | 92.76% 91.91% | |
Proposed model | 2022 | UNSW-NB | Multi-classification | SVM, RF | Without using CF | 86.23% 89.84% |
Proposed model | 2022 | UNSW-NB | Multi-classification | SVM, RF | Correlation with threshold value of 50% | 97.54% 97.50% |
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations. |
© 2022 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Aldhyani, T.H.H.; Alkahtani, H. Artificial Intelligence Algorithm-Based Economic Denial of Sustainability Attack Detection Systems: Cloud Computing Environments. Sensors 2022, 22, 4685. https://doi.org/10.3390/s22134685
Aldhyani THH, Alkahtani H. Artificial Intelligence Algorithm-Based Economic Denial of Sustainability Attack Detection Systems: Cloud Computing Environments. Sensors. 2022; 22(13):4685. https://doi.org/10.3390/s22134685
Chicago/Turabian StyleAldhyani, Theyazn H. H., and Hasan Alkahtani. 2022. "Artificial Intelligence Algorithm-Based Economic Denial of Sustainability Attack Detection Systems: Cloud Computing Environments" Sensors 22, no. 13: 4685. https://doi.org/10.3390/s22134685
APA StyleAldhyani, T. H. H., & Alkahtani, H. (2022). Artificial Intelligence Algorithm-Based Economic Denial of Sustainability Attack Detection Systems: Cloud Computing Environments. Sensors, 22(13), 4685. https://doi.org/10.3390/s22134685