Machine Learning for Cloud Data Classification and Anomaly Intrusion Detection. Megouache, L., Zitouni, A., Sadouni, S., & Djoudi, M. Ingénierie des Systèmes d’Information, 29(5):pp 1809--1819, 2024. doi abstract bibtex The sheer volume of applications, data and users working in the cloud creates an ecosystem far too large to protect against possible attacks. Several attack detection mechanisms have been proposed to minimize the risk of data loss backed up to the cloud. However, these techniques are not reliable enough to protect them; this is due to the reasons of scalability, distribution and resource limitations. As a result, Information Technology Security experts may feel powerless against the growing threats plaguing the cloud. For that, we provide a reliable way to detect attackers who want to break into cloud data. In our framework, we have no labels and no predefined classes on historical data, and we wish to identify similar models to form homogeneous groups from our observations. Then, we will use a k-means clustering algorithm to handle unlabelled data, and a combination approach of clustering and classification. We start with a k-means clustering algorithm for generating a labelled dataset from an unlabelled dataset. By harnessing the power of a labelled dataset, we can train the extreme learning machine classifier to become an exceptional tool for intrusion detection. By utilizing this resampling technique, we can generate additional data sets to significantly enhance the system's capability to identify and thwart attacks. The innovation of this approach stems from its integration of clustering and classification into a unified learning model. The cutting-edge framework has been successfully implemented on the renowned KDD99 dataset, producing impressive numerical results that not only affirm its exceptional accuracy but also highlight the significant time-saving advantages of this innovative approach.
@article{
title = {Machine Learning for Cloud Data Classification and Anomaly Intrusion Detection},
type = {article},
year = {2024},
keywords = {artificial intelligence,cloud,extreme learning machine,intrusion detection system,k-means clustering,security},
pages = {pp 1809--1819},
volume = {29},
id = {7d470d8e-7bab-3750-b265-a27ffbffe13b},
created = {2024-10-26T16:04:06.700Z},
file_attached = {false},
profile_id = {3f3cebd9-2c9e-33e2-9759-3b3c3deedc23},
last_modified = {2024-10-26T16:04:06.700Z},
read = {false},
starred = {false},
authored = {true},
confirmed = {true},
hidden = {false},
citation_key = {megouache_machine_2024},
source_type = {article},
private_publication = {false},
abstract = {The sheer volume of applications, data and users working in the cloud creates an ecosystem far too large to protect against possible attacks. Several attack detection mechanisms have been proposed to minimize the risk of data loss backed up to the cloud. However, these techniques are not reliable enough to protect them; this is due to the reasons of scalability, distribution and resource limitations. As a result, Information Technology Security experts may feel powerless against the growing threats plaguing the cloud. For that, we provide a reliable way to detect attackers who want to break into cloud data. In our framework, we have no labels and no predefined classes on historical data, and we wish to identify similar models to form homogeneous groups from our observations. Then, we will use a k-means clustering algorithm to handle unlabelled data, and a combination approach of clustering and classification. We start with a k-means clustering algorithm for generating a labelled dataset from an unlabelled dataset. By harnessing the power of a labelled dataset, we can train the extreme learning machine classifier to become an exceptional tool for intrusion detection. By utilizing this resampling technique, we can generate additional data sets to significantly enhance the system's capability to identify and thwart attacks. The innovation of this approach stems from its integration of clustering and classification into a unified learning model. The cutting-edge framework has been successfully implemented on the renowned KDD99 dataset, producing impressive numerical results that not only affirm its exceptional accuracy but also highlight the significant time-saving advantages of this innovative approach.},
bibtype = {article},
author = {Megouache, Leila and Zitouni, Abdelhafid and Sadouni, Salheddine and Djoudi, Mahieddine},
doi = {https://doi.org/10.18280/isi.290514},
journal = {Ingénierie des Systèmes d’Information},
number = {5}
}
Downloads: 0
{"_id":"sXjTXChBiLXPkesHL","bibbaseid":"megouache-zitouni-sadouni-djoudi-machinelearningforclouddataclassificationandanomalyintrusiondetection-2024","author_short":["Megouache, L.","Zitouni, A.","Sadouni, S.","Djoudi, M."],"bibdata":{"title":"Machine Learning for Cloud Data Classification and Anomaly Intrusion Detection","type":"article","year":"2024","keywords":"artificial intelligence,cloud,extreme learning machine,intrusion detection system,k-means clustering,security","pages":"pp 1809--1819","volume":"29","id":"7d470d8e-7bab-3750-b265-a27ffbffe13b","created":"2024-10-26T16:04:06.700Z","file_attached":false,"profile_id":"3f3cebd9-2c9e-33e2-9759-3b3c3deedc23","last_modified":"2024-10-26T16:04:06.700Z","read":false,"starred":false,"authored":"true","confirmed":"true","hidden":false,"citation_key":"megouache_machine_2024","source_type":"article","private_publication":false,"abstract":"The sheer volume of applications, data and users working in the cloud creates an ecosystem far too large to protect against possible attacks. Several attack detection mechanisms have been proposed to minimize the risk of data loss backed up to the cloud. However, these techniques are not reliable enough to protect them; this is due to the reasons of scalability, distribution and resource limitations. As a result, Information Technology Security experts may feel powerless against the growing threats plaguing the cloud. For that, we provide a reliable way to detect attackers who want to break into cloud data. In our framework, we have no labels and no predefined classes on historical data, and we wish to identify similar models to form homogeneous groups from our observations. Then, we will use a k-means clustering algorithm to handle unlabelled data, and a combination approach of clustering and classification. We start with a k-means clustering algorithm for generating a labelled dataset from an unlabelled dataset. By harnessing the power of a labelled dataset, we can train the extreme learning machine classifier to become an exceptional tool for intrusion detection. By utilizing this resampling technique, we can generate additional data sets to significantly enhance the system's capability to identify and thwart attacks. The innovation of this approach stems from its integration of clustering and classification into a unified learning model. The cutting-edge framework has been successfully implemented on the renowned KDD99 dataset, producing impressive numerical results that not only affirm its exceptional accuracy but also highlight the significant time-saving advantages of this innovative approach.","bibtype":"article","author":"Megouache, Leila and Zitouni, Abdelhafid and Sadouni, Salheddine and Djoudi, Mahieddine","doi":"https://doi.org/10.18280/isi.290514","journal":"Ingénierie des Systèmes d’Information","number":"5","bibtex":"@article{\n title = {Machine Learning for Cloud Data Classification and Anomaly Intrusion Detection},\n type = {article},\n year = {2024},\n keywords = {artificial intelligence,cloud,extreme learning machine,intrusion detection system,k-means clustering,security},\n pages = {pp 1809--1819},\n volume = {29},\n id = {7d470d8e-7bab-3750-b265-a27ffbffe13b},\n created = {2024-10-26T16:04:06.700Z},\n file_attached = {false},\n profile_id = {3f3cebd9-2c9e-33e2-9759-3b3c3deedc23},\n last_modified = {2024-10-26T16:04:06.700Z},\n read = {false},\n starred = {false},\n authored = {true},\n confirmed = {true},\n hidden = {false},\n citation_key = {megouache_machine_2024},\n source_type = {article},\n private_publication = {false},\n abstract = {The sheer volume of applications, data and users working in the cloud creates an ecosystem far too large to protect against possible attacks. Several attack detection mechanisms have been proposed to minimize the risk of data loss backed up to the cloud. However, these techniques are not reliable enough to protect them; this is due to the reasons of scalability, distribution and resource limitations. As a result, Information Technology Security experts may feel powerless against the growing threats plaguing the cloud. For that, we provide a reliable way to detect attackers who want to break into cloud data. In our framework, we have no labels and no predefined classes on historical data, and we wish to identify similar models to form homogeneous groups from our observations. Then, we will use a k-means clustering algorithm to handle unlabelled data, and a combination approach of clustering and classification. We start with a k-means clustering algorithm for generating a labelled dataset from an unlabelled dataset. By harnessing the power of a labelled dataset, we can train the extreme learning machine classifier to become an exceptional tool for intrusion detection. By utilizing this resampling technique, we can generate additional data sets to significantly enhance the system's capability to identify and thwart attacks. The innovation of this approach stems from its integration of clustering and classification into a unified learning model. The cutting-edge framework has been successfully implemented on the renowned KDD99 dataset, producing impressive numerical results that not only affirm its exceptional accuracy but also highlight the significant time-saving advantages of this innovative approach.},\n bibtype = {article},\n author = {Megouache, Leila and Zitouni, Abdelhafid and Sadouni, Salheddine and Djoudi, Mahieddine},\n doi = {https://doi.org/10.18280/isi.290514},\n journal = {Ingénierie des Systèmes d’Information},\n number = {5}\n}","author_short":["Megouache, L.","Zitouni, A.","Sadouni, S.","Djoudi, M."],"biburl":"https://bibbase.org/service/mendeley/3f3cebd9-2c9e-33e2-9759-3b3c3deedc23","bibbaseid":"megouache-zitouni-sadouni-djoudi-machinelearningforclouddataclassificationandanomalyintrusiondetection-2024","role":"author","urls":{},"keyword":["artificial intelligence","cloud","extreme learning machine","intrusion detection system","k-means clustering","security"],"metadata":{"authorlinks":{}}},"bibtype":"article","biburl":"https://bibbase.org/service/mendeley/3f3cebd9-2c9e-33e2-9759-3b3c3deedc23","dataSources":["2252seNhipfTmjEBQ","rh94BkjSH73SyjZsR","PgsKQnKXuGehwfH4n","G2mFzxcNhwvPwybbi"],"keywords":["artificial intelligence","cloud","extreme learning machine","intrusion detection system","k-means clustering","security"],"search_terms":["machine","learning","cloud","data","classification","anomaly","intrusion","detection","megouache","zitouni","sadouni","djoudi"],"title":"Machine Learning for Cloud Data Classification and Anomaly Intrusion Detection","year":2024}