Proficient Machine Learning Techniques for a Secured Cloud Environment
Open Access
- 30 August 2022
- journal article
- Published by Blue Eyes Intelligence Engineering and Sciences Engineering and Sciences Publication - BEIESP in International Journal of Engineering and Advanced Technology
- Vol. 11 (6), 74-81
- https://doi.org/10.35940/ijeat.f3730.0811622
Abstract
Many different checks, rules, processes, and technologies work together to keep cloud-based applications and infrastructure safe and secure against cyberattacks. Data security, customer privacy, regulatory enforcement, and device and user authentication regulations are all protected by these safety measures. Insecure Access Points, DDoS Attacks, Data Breach and Data Loss are the most pressing issues in cloud security. In the cloud computing context, researchers looked at several methods for detecting intrusions. Cloud security best practises such as host & middleware security, infrastructure and virtualization security, and application system & data security make up the bulk of these approaches, which are based on more traditional means of detecting abuse and anomalies. Machine Learning-based strategies for securing cloud infrastructure are the topic of this work, and ongoing research comprises research issues. There are a number of unresolved issues that will be addressed in the future.Keywords
This publication has 41 references indexed in Scilit:
- Two-tier network anomaly detection model: a machine learning approachJournal of Intelligent Information Systems, 2015
- A Survey of Data Mining and Machine Learning Methods for Cyber Security Intrusion DetectionIEEE Communications Surveys & Tutorials, 2015
- Use of machine learning in big data analytics for insider threat detectionPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2015
- Design of intelligent KNN‐based alarm filter using knowledge‐based alert verification in intrusion detectionSecurity and Communication Networks, 2015
- Survey on Anomaly Detection using Data Mining TechniquesProcedia Computer Science, 2015
- A novel SVM by combining kernel principal component analysis and improved chaotic particle swarm optimization for intrusion detectionSoft Computing, 2014
- Toward developing a systematic approach to generate benchmark datasets for intrusion detectionComputers & Security, 2012
- From cloud computing to cloud manufacturingRobotics and Computer-Integrated Manufacturing, 2012
- Data Location and Security Issues in Cloud ComputingPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2011
- Using thematic analysis in psychologyQualitative Research in Psychology, 2006