A Machine Learning-based Approach for Detecting Malicious Activities in Cloud Computing Environments
Main Article Content
Abstract
With the rapid proliferation of cloud computing technologies, the digital realm faces an increasing threat from cyber-attacks and malicious activities. The core essence of this research revolves around leveraging machine learning techniques to bolster the security measures in cloud environments. Our primary objectives are twofold: firstly, to detect potential threats at their nascent stages, ensuring timely mitigation; and secondly, to minimize the occurrence of false positives, which can lead to unnecessary resources consumption and potential downtimes. Historically, existing security systems in cloud environments have been plagued with a multitude of challenges. Delayed threat detections often result in increased vulnerabilities, while a higher rate of false positives can lead to resource inefficiencies and potential mistrust in security protocols. Moreover, as cloud infrastructures continue to expand, ensuring that security measures scale effectively is of paramount importance. To surmount these challenges, our methodology embarks on a comprehensive journey, dissecting threat vectors in a structured manner. The process commences with a rigorous phase of data collection, ensuring a diverse and representative dataset. This data undergoes a meticulous preprocessing phase, ensuring its quality and relevance. Subsequently, our approach employs advanced feature extraction mechanisms, utilizing Principal Component Analysis (PCA) to distill the most pertinent features from the vast array of data. The heart of our approach is a specialized machine learning algorithm, fine-tuned to optimize metrics such as accuracy, sensitivity, and specificity. Preliminary results have been encouraging, with our model boasting an impressive accuracy rate of 95%, coupled with a sensitivity of 94% and a precision of 93%. However, in the spirit of rigorous research, we also analyzed models that did not meet our benchmarks. An illustrative model, for instance, achieved an accuracy of 80% and precision of 73%, highlighting potential areas of refinement and the iterative nature of developing machine learning solutions.In encapsulation, this research underscores the potential of machine learning as a formidable tool in the arsenal against cyber threats in cloud computing.
Article Details

This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.
IJCERT Policy:
The published work presented in this paper is licensed under the Creative Commons Attribution 4.0 International (CC BY 4.0) license. This means that the content of this paper can be shared, copied, and redistributed in any medium or format, as long as the original author is properly attributed. Additionally, any derivative works based on this paper must also be licensed under the same terms. This licensing agreement allows for broad dissemination and use of the work while maintaining the author's rights and recognition.
By submitting this paper to IJCERT, the author(s) agree to these licensing terms and confirm that the work is original and does not infringe on any third-party copyright or intellectual property rights.
References
] P., V., Zemmari, A., & Conti, M. (2019). A machine learning-based approach to detect malicious android apps using discriminant system calls. Future Generation Computer Systems, 94, 333–350. https://doi.org/10.1016/j.future.2018.11.021
] Rabbani, M., Wang, Y. L., Khoshkangini, R., Jelodar, H., Zhao, R., & Hu, P. (2020). A hybrid machine learning approach for malicious behaviour detection and recognition in cloud computing. Journal of Network and Computer Applications, 151, 102507. https://doi.org/10.1016/j.jnca.2019.102507
] Arunkumar, M., & Ashok Kumar, K. (2022). Malicious attack detection approach in cloud computing using machine learning techniques. Soft Computing, 26(23), 13097–13107. https://doi.org/10.1007/s00500-021-06679-0
] Yang, J., & Lim, H. (2021). Deep Learning Approach for Detecting Malicious Activities Over Encrypted Secure Channels. IEEE Access, 9, 39229–39244. https://doi.org/10.1109/access.2021.3064561
] Sayeed, M. A., Mohanty, S. P., Kougianos, E., & Zaveri, H. P. (2019). Neuro-Detect: A Machine Learning-Based Fast and Accurate Seizure Detection System in the IoMT. IEEE Transactions on Consumer Electronics, 65(3), 359–368. https://doi.org/10.1109/tce.2019.2917895
] Gupta, B. B., Yadav, K., Razzak, I., Psannis, K., Castiglione, A., & Chang, X. (2021). A novel approach for phishing URLs detection using lexical-based machine learning in a real-time environment. Computer Communications, 175, 47–57. https://doi.org/10.1016/j.comcom.2021.04.023
] Chkirbene, Z., Erbad, A., Hamila, R., Gouissem, A., Mohamed, A., & Hamdi, M. (2020). Machine learning based cloud computing anomalies detection. IEEE Network, 34(6), 178-183.
] Kumar, R., Sethi, K., Prajapati, N., Rout, R. R., & Bera, P. (2020, July). Machine learning based malware detection in cloud environment using clustering approach. In 2020 11th International Conference on Computing, Communication and Networking Technologies (ICCCNT) (pp. 1-7). IEEE.
] Alshammari A., Aldribi A. Apply machine learning techniques to detect malicious network traffic in cloud computing. J. Big Data. 2021;8:90. DOI: 10.1186/s40537-021-00452-5.
] Kimmell, J. C., Abdelsalam, M., & Gupta, M. (2021, August). Analyzing machine learning approaches for online malware detection in cloud. In 2021 IEEE International Conference on Smart Computing (SMARTCOMP) (pp. 189-196). IEEE.
] Zhang, Y., Li, Y., & Zhang, Y. (2021). An extensible machine learning model for detecting anomalies in cloud computing environments. Journal of Ambient Intelligence and Humanized Computing, 12(7), 7025-7036. DOI: 10.1007/s12652-021-03517-5.
] Wang, Y., Zhang, Y., & Li, Y. (2021). Ensemble learning-based approach for detecting malicious mining code in cloud platforms. Journal of Ambient Intelligence and Humanized Computing, 12(7), 7037-7048. DOI: 10.1007/s12652-021-03518-4.
] Rabbani, M., Wang, Y. L., Khoshkangini, R., & Jelodar, H. (2019). A Hybrid Machine Learning Approach for Malicious Behaviour Detection and Recognition in Cloud Computing. Journal of Network and Computer Applications, 151, 102507. DOI: 10.1016/j.jnca.2019.102507.
] Moustafa, N., Hu, J., & Slay, J. (2019). A holistic review of Network Anomaly Detection Systems: A comprehensive survey. Journal of Network and Computer Applications, 128, 33-55. DOI: 10.1016/j.jnca.2018.11.003.
] Chen, Y., Li, Y., & Zhang, Y. (2021). Edge machine learning approach for detecting malicious activity in IoT devices. Journal of Ambient Intelligence and Humanized Computing, 12(7), 7049-7060. DOI: 10.1007/s12652-021-03519-3.