Enhancing Cloud Security through Intrusion Detection: A Comprehensive Study Using the ISOT-CID Dataset
DOI:
https://doi.org/10.70715/jitcai.2024.v1.i1.005Keywords:
Cloud security, Intrusion detection system (IDS), ISOT-CID dataset, Cyber threat detection, Machine learningAbstract
Cloud computing has revolutionized data management, offering unparalleled scalability, flexibility, and efficiency. However, its open and multi-tenant nature introduces significant security vulnerabilities, making it an attractive target for cyber threats. Intrusion Detection Systems (IDS) tailored for cloud environments are essential in mitigating these risks. Despite various IDS models, benchmarking datasets representing realistic cloud environments is a substantial limitation. This study utilizes the ISOT Cloud Intrusion Detection Benchmark Dataset (ISOT-CID), a publicly available dataset featuring a range of network and application layer attacks collected from a real production cloud environment. The research explores the dataset's structure, analyzes attack patterns, and evaluates IDS models' performance to provide actionable insights for enhancing cloud security. This work contributes to the field by presenting a systematic analysis of ISOT-CID, identifying effective IDS models, and proposing improvements for future cloud intrusion detection research.
References
[1] A. Aldribi, I. Traore, and B. Moa, "Data Sources and Datasets for Cloud Intrusion Detection Modeling and Evaluation," in Cloud Computing for Optimization: Foundations, Applications, and Challenges, Studies in Big Data, vol. 39, Springer, 2018, pp. 333-366. DOI: https://doi.org/10.1007/978-3-319-73676-1_13
[2] A. Aldribi, I. Traore, P. G. Quinan, and O. Nwamuo, "Documentation for the ISOT Cloud Intrusion Detection Dataset," Technical Report #ECE-2020-10-10, University of Victoria, ECE Department, 2020.
[3] A. Aldribi, I. Traore, B. Moa, and O. Nwamuo, "Hypervisor-Based Cloud Intrusion Detection through Online Multivariate Statistical Change Tracking," Computers & Security, vol. 87, 2019, doi: https://doi.org/10.1016/j.cose.2019.101646. DOI: https://doi.org/10.1016/j.cose.2019.101646
[4] U. Tupakula and V. Varadharajan, "A Practical Approach to Implement IDS for Cloud Computing," in IEEE Transactions on Services Computing, vol. 5, no. 1, pp. 188-199, 2012, doi: 10.1109/TSC.2010.53. DOI: https://doi.org/10.1109/TSC.2010.53
[5] M. Tavallaee, E. Bagheri, W. Lu, and A. A. Ghorbani, "A Detailed Analysis of the KDD CUP 99 Data Set," in 2009 IEEE Symposium on Computational Intelligence for Security and Defense Applications, Ottawa, 2009, pp. 1-6, doi: 10.1109/CISDA.2009.5356528. DOI: https://doi.org/10.1109/CISDA.2009.5356528
Downloads
Published
Data Availability Statement
This study utilizes the ISOT Cloud Intrusion Detection Benchmark Dataset (ISOT-CID), a publicly available dataset featuring a range of network and application layer attacks collected from a real production cloud environment.
Issue
Section
License
Copyright (c) 2024 Safana Alzide (Author)
This work is licensed under a Creative Commons Attribution 4.0 International License.