Skip to main content

Advanced Hybrid Technique in Detecting Cloud Web Application’s Attacks

  • Conference paper
  • First Online:
  • 1277 Accesses

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 11407))

Abstract

Recently cloud computing has emerged the IT world. It eventually promoted the acquisition of resources and services as needed, but it has also instilled fear and user’s renunciations. However, Machine learning processing has proven high robustness in solving security flaws and reducing false alarm rates in detecting attacks. This paper, proposes a hybrid system that does not only labels behaviors based on machine learning algorithms using both misuse and anomaly-detection, but also highlights correlations between network relevant features, speeds up the updating of signatures dictionary and upgrades the analysis of user behavior.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   69.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   89.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Stats, I.W.: World Internet Users Statistics and 2018 World Population Stats (2018). [En ligne]. https://www.internetworldstats.com/stats.htm

  2. Mell, P., Grance, T.: The NIST Definition of Cloud Computing (2011)

    Google Scholar 

  3. Ali, M., Khan, S.U., Vasilakos, A.V.: Security in cloud computing: opportunities and challenges. Inf. Sci. 305, 357–383 (2015)

    Article  MathSciNet  Google Scholar 

  4. Ramachandra, G., Iftikhar, M., Aslam Khan, F.: A comprehensive survey on security in cloud computing. Procedia Comput. Sci. 110, 467–472 (2017)

    Article  Google Scholar 

  5. Passi, H.: OWASP - Top 10 Vulnerabilities in web applications (updated for 2018 …), 2 January 2018. [En ligne]. https://www.greycampus.com/blog/information-security/owasp-top-vulnerabilities-in-web-applications

  6. Shah, J.: Understanding and study of intrusion detection systems for various networks and domains. In: Computer Communication and Informatics (ICCCI) (2017)

    Google Scholar 

  7. Indraneel, S., Praveen, V., Vuppala, K.: HTTP flood attack detection in application layer using machine learning metrics and bio inspired bat algorithm. Appl. Comput. Inform. (2017)

    Google Scholar 

  8. Moshfeq Salaken, S., Khosravi, A., Nguyen, T., Nahavandi, S.: Extreme learning machine based transfer learning algorithms: a survey. Neurocomputing 267, 516–524 (2017)

    Article  Google Scholar 

  9. Li, Y., Ma, R., Jiao, R.: A hybrid malicious code detection method based on deep learning. Int. J. Secur. Appl. 9, 205–216 (2015)

    Google Scholar 

  10. Diro, A.A., Chilamkurti, N.: Distributed Attack Detection Scheme Using Deep Learning approach for Internet of Things. Future Generation Computer Systems 82, 761–768 (2017)

    Article  Google Scholar 

  11. Lemoudden, M., Amar, M., El Ouahidi, B.: A binary-based MapReduce analysis for cloud logs. Procedia Comput. Sci. 83, 1213–1218 (2016)

    Article  Google Scholar 

  12. Amar, M., Douzi, S., El Ouahidi, B., Lemoudden, M.: A novel approach in detecting intrusions using NSLKDD database and MapReduce programming. Procedia Comput. Sci. 110, 230–235 (2017)

    Article  Google Scholar 

  13. Amar, M., Douzi S., El Ouahidi, B.: Enhancing cloud security using advanced MapReduce k-means on log files. In: ACM International Conference Proceeding Series, pp. 63–67 (2018)

    Google Scholar 

  14. Amar, M., Lemoudden, M., El Ouahidi, M.: Log file’s centralization to improve cloud security. In: IEEE Xplore, Cloud Computing Technologies and Applications (CloudTech) (2016)

    Google Scholar 

  15. Rehman, Z.-U., et al.: Machine learning-assisted signature and heuristic-based detection of malwares in Android devices. Comput. Electr. Eng. 69, 1–14 (2017)

    Google Scholar 

  16. Veeramachaneni, K., Arnaldo, I.: AI2: training a big data machine to defend. In: Big Data Security on Cloud (BigDataSecurity), IEEE International Conference on High Performance and Smart Computing (HPSC), and IEEE International Conference on Intelligent Data and Security (IDS) (2016)

    Google Scholar 

  17. Hervé, B., Tindo, G.: Vers une Nouvelle Architecture de Detection d’Intrusion Reseaux à Base de Reseaux Neuronaux. HAL Archives-ouvertes (2016)

    Google Scholar 

  18. Ya, J., Liu, T., Li, Q., Shi, J., Zhang, H., Lv, P.: Mining host behavior patterns from massive network and security logs. Procedia Comput. Sci. 108, 38–47 (2017)

    Article  Google Scholar 

  19. Cathey, R., Ma, L., Goharian, N., Grossman, D.: Misuse Detection for Information Retrieval Systems (2003)

    Google Scholar 

  20. Fan, Z., Liu, R.: Investigation of machine learning based network traffic classification. In: Wireless Communication Systems (ISWCS) (2017)

    Google Scholar 

  21. Katzir, Z., Elovici, Y.: Quantifying the resilience of machine learning classifiers used for cyber security. Expert Syst. Appl. 92, 419–429 (2018)

    Article  Google Scholar 

  22. Aggarwal, P., Sharma, S.K.: Analysis of KDD dataset attributes - class wise for intrusion detection. Procedia Comput. Sci. 57, 842–851 (2015)

    Article  Google Scholar 

  23. Belavagi, M., Muniyal, B.: Performance evaluation of supervised machine learning algorithms for intrusion detection. Procedia Computer Science 89, 117–123 (2016)

    Article  Google Scholar 

  24. Polamuri, S.: FIve Most Popular Similarity Measures Implementation in Python (2015). [En ligne]. http://dataaspirant.com/2015/04/11/five-most-popular-similarity-measures-implementation-in-python/

  25. Mining Similarity Using Euclidean Distance, Pearson Correlation, and Filtering (2010). [En ligne]. http://mines.humanoriented.com/classes/2010/fall/csci568/portfolio_exports/mvoget/similarity/similarity.html

  26. SotM 31 - The Honeynet Project (2004). [En ligne]. http://www.honeynet.org/scans/scan31/

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Meryem Amar .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Amar, M., Lemoudden, M., El Ouahidi, B. (2019). Advanced Hybrid Technique in Detecting Cloud Web Application’s Attacks. In: Renault, É., Mühlethaler, P., Boumerdassi, S. (eds) Machine Learning for Networking. MLN 2018. Lecture Notes in Computer Science(), vol 11407. Springer, Cham. https://doi.org/10.1007/978-3-030-19945-6_6

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-19945-6_6

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-19944-9

  • Online ISBN: 978-3-030-19945-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics