You are on page 1of 19

School of Information Technology & Engineering

Digital Assignment I
SWE 3002: Information System Security

Team-4:
19MIS0225- MACHIREDDY KEERTHI
19MIS0229- GOURISHETTY SAI GAGAN
19MIS0240- DASARI VENKATAMOHAN KARTHIK
19MIS0243- ENJETI GURUMOHAN
19MIS0246 -C SHAJAHAN
19MIS0251- N L GOWSHICK KANNA
19MIS0252- PATHAN AFTAAB KHAN
19MIS0254- M N ASHOK NIRMAL
19MIS0255 -R BHAVANA
19MIS0257- KUNCHALA JAYA SAI PAVAN KUMAR
19MIS0276- SRINIVAS S
19MIS0289- NIDISH ANAND R
19MIS0293- PARIMI VAMSIKRISHNA
19MIS0302 -SYAMALA SHIVANANDA REDDY
19MIS0308- U A ABHILASH
19MIS0320- D RAGAVI

Topic: Assessment on applicability and adoptability of AI and ML


techniques to improve Information Systems security “Zero day Vulnerability
and Cloud Security”
Year Article Information Literature Review

Article title: “The Machine learning has migrated from the


promise of machine laboratory to the forefront of operational
learning in digital systems over the past few years. Large
security” companies like Amazon, Facebook,
Google etc have adopted machine learning
to improve customer experiences in terms
Authors: James B Fraley, of security, connect people socially with
James Cannady new applications and facilitate connections.
Machine learning has the powerful
SoutheastCon 2017, 1-6, capability to secure systems from zero-day
2017 attacks, improve malware attacks,
recognise breaches and alert the
organizations regarding security issues.ML
is used to identify the advanced targeting
Publisher: IEEE threats and vulnerabilities and exploits.
The study studied 14,000 ISS
professionals and found the need for
security digitally and from cyber crimes
which can be achieved by Machine
learning applications. This paper discusses
2017 how ML can be used to detect security
attacks and how it can significantly change
the security landscape.

Article title: “some In this article, an overview of data mining


Artificial intelligence techniques used in ISS are presented.
methods and Artificial Intelligence gives promising
technologies for cloud opportunities to solve security problems.
computing protection.”
AI assists in the activities automation within
the infrastructure. AI and ML technologies
can quickly analyse different types f threats
Authors: AA Grusho, Mi in easy manner. From zero ay
Zabezhailo, AA Z vulnerabilities to phishing attacks, AI can
atasarinnyi, VO detect and respond to various deviations.
Piskovskii. Earlier days of cloud, applications were
large.AI can provide cloud platforms and
servers to give more secured service that
provide quality performance to the end
Automatic dccumentation
customer. They provide strng security in
and mathematical
linguistics 51 (2), 62-74, the new environments without significant
2017 burden added on application performance.
Cloud and AI are growing in parallel. The
complexity of cloud need AI for secured
environment with efficiency, transparency
and control.
Machine learning has the powerful capability to
secure systems from zero-day attacks, improve
Article title: Network malware attacks, recognise breaches and alert
Behavioral Analysis for the organizations relating to security
Zero-Day Malware
problems.ML is employed to spot the advanced
Detection
targeting threats and vulnerabilities and
exploits. Its determined that cyber threats ar
increasing terribly chop-chop since its was
started. within the year 2013 , over 2 lakh
malicious tools had been came into notice daily
· Authors: Karim Ganame
by victimization antivirus vendors. the quantity
has been increased to eight lakh per day in
· Marc André Allaire 2014 and years passing on the quantity is
increasing terribly chop-chop. within the year
· Ghassen Zagdene 2017 the quantity has reached to three million
and a lot of per day. thus its been determined
· Oussama Boudar traditional protection tools as been wont to
show their limits and that they ar terribly less
effective to beat regarding the new cyber
Publisher: IEEE threats. detective work by no
means-visible-before or zero-day malware, that
embody ransomware, with efficiency needs a
innovative approach in cyber safety
management. Here, ransomeware is a form of
malware from cryptography. this needs a flow
into from signature-based entirely detection to
behavior-based entirely detection. From this
info , there's a transparent confirmation
regarding the cyber threats increasing year by
yearThis paper is about the capability of the
CDS to detect zero-day ransomware.

This paper discusses about the role of


machine learning in detection DDos attack
Article title: DDoS attack .
detection using machine
learning techniques in cloud
In IT companies cloud computing plays a
computing environments
major role.Cloud computing is a revolution
in IT generation that offers scalable,
virtualized on-call for resources to the stop
users with more flexibility, much less
maintenance and reduced infrastructure
fee. ML is used to identify the advanced
Authors: targeting threats and vulnerabilities and
exploits. The variety of cyber threats is
Marwane Zekri ; continuously growing .These assets are
supervised via one of a kind management
Said El Kafhali; groups and supplied over Internet using
known networking protocols, requirements
Noureddine Aboutabit
and formats. The underlying technology
Youssef Saadi and legacy protocols contain insects and
vulnerabilities which could open doors for
intrusion with the aid of the attackers.
Attacks as DDoS (Distributed Denial of
Service) are ones of the most frequent that
inflict severe harm and have an effect on
the cloud overall performance. In a DDoS
assault, the attacker normally makes use
of innocent compromised computers) by
way of taking advantages of regarded or
unknown bugs and vulnerabilities to ship a
massive wide variety of packets from those
already-captured zombies to a server. This
may occupy a first-rate portion of
community bandwidth of the sufferer cloud
infrastructures or consume a whole lot of
the servers time. Thus, on this work, we
designed a DDoS detection system based
on some algorithm to mitigate the DDoS
threat. This set of rules, coupled with
signature detection techniques, generates
a selection tree to perform automatic,
effective detection of signatures assaults
for DDoS flooding assaults. To validate this
device, it is decided that to system
studying techniques and as compared the
received effects.

Akash Kumar Singh and This article shows about the efficiency of
Akash Kumar machine learning techniques to detect
Singh(2017), Integrated malwares. The authors tries to propose a
Malware Analysis Using solution by extracting the selected features
Machine Learning. from the static and dynamic analysis
techniques. After extracting selected features
10.1109/TEL-NET.2017.83435
they proposed an integrated approach. Features
54
in integrated approach are like
Published: 2017 GetProcAddress, Anti-Vm, Anti-Debugging,
Packer analysis and etc. Author believes that
the use of machine learning not only improves
the capacity and speed of malware
classification but also detect malware which
use unprecedent zero-day vulnerabilities.
Author uses windows based Portable
Executable file (PE-32) format which includes
malware samples of various classes mainly
consists of Adware, Spywares, Packed
malwares, and Remote administration Trojans
as a dataset. Author got a better results by using
this integrated approach and we can even
conclude that Random forest classification
derived better accuracy in malware detection.

Ram Shankar Siva Kumar, This article states about the possibilities and
Andrew Wicker and Matt challenges in using machine learning for
Swann(2017) , Practical security detections in cloud environment.
Machine Learning for Cloud
Authors suggest Machine learning engineers to
Intrusion Detection.
have a discussion with the security domain
https://doi.org/10.1145/31 experts to see if there is any correlation
28572.3140445 between the attacker activity and expected
activity. They states that domain knowledge is
Published: NOV 2017 critical to develop these kind of systems and
suggested some ways to incorporate domain
knowledge like rules and etc. Author track
down that a mixture approach of rules

and machine learning yields better outcomes


and showed how they can be consolidated in
the form of filters, features, or even as one
single machine learning unit. Author shared a
framework for attack disruption as the way
forward and look to the security data science
community for intelligent automation of the
blue team kill chain.

Title:k-Zero Day Safety: A In this paper, they propose a novel security


Network Security Metric metric, k-zero day safety,To address this issue.
for Measuring the Risk of Instead of attempting to rank unknown
Vulnerabilities, our metric counts how many such
Unknown Vulnerabilities vulnerabilities,Would be required for
compromising network assets; a larger Count
Author: Lingyu Wang,Sushil implies more security since the likelihood of
Jajodia,Pengsu Cheng,Steven having more Unknown vulnerabilities available,
Noel applicable, and exploitable all At the same time
will be significantly lower.they formally define the
Metric, analyze the complexity of computing the
metric, devise Heuristic algorithms for intractable
cases, and finally demonstrate Through case
studies that applying the metric to existing
network Security practices may generate
actionable knowledge.

Title: Zero day Attacks


Defense Technique for This paper provides a machine learning based
2018
Protecting System framework to sense network traffic that detects
against Unknown anomalous behavior of the network in order to
Vulnerabilities identify the presence of a zero-day exploit. The
proposed framework uses supervised
Author: Umesh Kumar classification schemes for assessment of
Singh1, Chanchala Joshi2* known classes with the adaptability of
,Suyash Kumar Singh3 unsupervised classification in order to detect
the new dimension of classification.

Title: SECURITY This paper surveys Cloud computing is in


THREATS ON CLOUD continual development in order to make
COMPUTING different levels of on-demand services
VULNERABILITIES available to customers. While people enjoy the
benefits cloud computing brings, security in
Author: Te-Shun Chou clouds is a key challenge. Much vulnerability in
clouds still exists and hackers continue to
exploit these security holes. In order to provide
better quality of service to cloud users, security
flaws must be identified. In this paper, we
examined the security vulnerabilities in clouds
from three perspectives (abuse use of cloud
computational resources, data breaches, and
cloud security attacks), included related real
world exploits, and introduced
countermeasures to those security breaches.

Title :”Cloud Computing This paper reviews have presented security


and Security Issues” issues for cloud models: IaaS, PaaS, and IaaS,
which differ depending on the model. As
Author: Rohan Jathanna*, described in this paper, storage and networks
Dhanamma Jagli** are the biggest security concerns in Cloud
Computing. Virtualization that allows multiple
users to share a physical server is a major
concerns for cloud users.. Virtual networks are
target for some attacks. We have focused on
this distinction, where we consider important to
understand these issues. Another core
element of cloud computing is multi tenancy.

This section provides a survey of artificial


Title:“ Review into state of intelligence techniques that are currently
the art of vulnerability being integrated into vulnerability
assessment using artificial assessment, followed by the identification
intelligence”
and suggestion of knowledge gaps and
Authors:Saad khan , simon future recommendations. The categories
parkinson include machine learning, autonomous
learning and planning and expert systems.
(September 2018) The articles are manually gathered from
renowned research outlets, such as ACM,
IEEE, Springer, Elsevier etc. using Google
Scholar search engine. The keywords used
to search the articles are, for example,
“use of machine learning in vulnerability
assessment”, “vulnerability assessment
expert systems”, “vulnerability assessment
using automated planning techniques”.

Title:”A Survey on This section is a systematic survey on


Security Threats and security concerns with a variety of machine
Defensive Techniques of learning techniques. Specifically, they have
Machine Learning: A Data revisited existing security threats towards
Driven View” machine learning from two aspects, the
training phase and the testing/inferring
Author:QIANG LIU 1 ,
(Member, IEEE), PAN LI1 , phase. Furthermore, they have categorized
WENTAO ZHAO1 , WEI CAI2 , current defensive techniques of machine
(Member, IEEE), SHUI YU 3 , learning into security assessment
(Senior Member, IEEE), AND
VICTOR C. M. LEUNG2 , (Fellow, mechanisms, countermeasures in the
IEEE) training phase, those in the testing or
inferring phase, data security and privacy.
(March 25 2018) After that, they presented five interesting
research topics in this field. Such surveys
can serve as a valuable reference for
researchers in both machine learning and
security fields.

The embracing of cloud technology has become a


TITLE : Cyber Security in game changer for industries, organizations, and
IoT-Based Cloud hackers during the last decade. The advent of
Computing: A modern cloud architectures and high-speed internet
Comprehensive Survey with emerging innovations brought security threats
for cloud computing. This shift to cloud technology
contributed to an organization’s flexibility and
scalability to remain innovative and competitive in
the ever-changing industrial environment. Still,
AUTHORS : Waqas Ahmad concurrently, it made their data less secure and
, Aamir Rasool , Abdul vulnerable to attacks for several reasons. This
Rehman Javed , Thar paper discussed cloud architectures, deployment
Baker and Zunera Jalil models, and common attacks. We then placed
security issues in the cloud in four categories and
discussed the associated issues in each. We also
deliberated various challenges in cloud computing
PUBLISHER : Department of that need to be addressed soon. These challenges
Cyber Security, Air University, also include the limitations that have risen in the AI
Islamabad 44000, Pakistan and DL domain concerning cloud computing.

2019 TITLE : Zero day Attacks Zero day attack exploits zero-day vulnerability
Defense Technique for without any signature . It takes advantage of a
Protecting System against malware before a patch has been created.
Unknown Vulnerabilities That means, for zero-day vulnerability no patch
is readily available, also vendor may or may
not be aware of it. The name ―zero-day‖
shows that it occurs before the vulnerability is
AUTHORS : Umesh Kumar known; the term "zero-day" denotes that
Singh , Chanchala Joshi , developers have had zero days to fix the
Suyash Kumar Singh vulnerability. A zero-day attack exploits a
vulnerability that has not been disclosed
publicly, including vendor of software,
therefore, almost no defense mechanism
Publisher: School of available against zero-day attack. The
Engineering and anti-virus products cannot detect the attack
Technology, Vikram through signature-based scanning and
University, Ujjain, M.P. India because the vulnerability is unknown, the
affected software cannot be patched These
unpatched vulnerabilities are free pass for
attackers to any target they want to attack. All
these facts range the market value of new
vulnerability in $5000 to $250,000

The number of internet-connected devices has


Deep Reinforcement increased significantly. So the need for
Learning for Cyber cyberattack prevention is highly required. They
Security have proposed a machine learning model more
specifically a deep reinforcement learning
model to solve this issue. By including deep
learning algorithms into traditional
Nguyen, T. T., & Reddi, V. J. reinforcement learning it is highly capable of
(2019). Deep reinforcement
solving the cyber defense problem. The
learning for cyber security.
IEEE Transactions on Neural
reinforcement learning method used is Q
Networks and Learning learning based on the Bellman equation. It is
Systems. particularly adaptable and useful in real-time
and adversarial environments. With the
capability of function approximation and
representation learning, deep learning has
been incorporated into Reinforcement Learning
methods.

The Performance of The detection of zero day attack is a difficult


Machine and Deep task. In this paper various machine learning
Learning Classifiers in and deep learning classifiers like Adaptive
Detecting Zero-Day Boosting, Decision tree, Gaussian Naïve
Vulnerabilities Bayes, Linear SVM, Logistic Regression, k
Nearest Neighbours, Quadratic Discriminant
Abri, F., Siami-Namini, S., Analysis, Random Decision forests, Multi-layer
Khanghah, M. A., Soltani, F. perceptron are compared, tested to find how
M., & Namin, A. S. (2019). The well they can be used for detection of zero day
Performance of Machine and attack. It has been found that among all the
Deep Learning Classifiers in
classifiers, random forest classifier gave the
Detecting Zero-Day
Vulnerabilities. arXiv preprint best accuracy and Gaussian Naïve Bayes
arXiv:1911.09586. gave poor accuracy.

TITLE : Can This article focuses on identifying and


Machine/Deep Learning detecting the zero-day vulnerabilities using
Classifiers Detect machine and deep learning classifiers with
Zero-Day Malware with high accuracy. In part of achieving this several
High Accuracy? experiments were conducted.After performing
several experiments it is concluded whether it
effective or not in detecting zero-day attacks
.The more accuracy can be achieved when
AUTHORS : Faranak Abri; standardized data is used with one hidden
Sima Siami-Namini; Mahdi layer(neural network) and deep learning
Adl Khanghah; Fahimeh models and was also told that 100% accuracy
Mirza Soltani; Akbar Siami cannot be attained but it can attain upto
Namin 99.51%.

Publisher: IEEE

12 paper citations

TITLE : Redefining This article integrates AI, cyber security and


Cybersecurity with AI and machine learning. With the increased security
Machine Learning threats ,information security management
alone cannot detect so it focuses on how AI
and machine algorithm redefines cyber
security in preventing the security threats and
AUTHORS : Amol Dhondse identifies security breaches. It actually predicts
before they occur which is way more difficult
Sachchidanand Singh for ISS alone.Some important topics such as
phishing detection and detection of new
classes of malware is discussed.

PUBLISHER : Asian
Journal of Convergence in
Technology

Machine Learning (ML) and Deep Learning


Authors:Hanan Hindy, (DL) have been used for building
Robert Atkinson, Christos Zero-vulnerability system security. The
Tachtatzis, Jean-noel Colin, increase in cyber-attacks poses a
Ethan Bayne, Xavier tremendous challenge for IDS solutions
Bellekens (2020).
that rely on a database of historical attack
Title: ‘Utilizing Deep signatures. Therefore, the industrial pull for
Learning Techniques for robust IDSs that are capable of flagging
Effective Zero-Day Attack zero-day attacks is growing.
Detection’. outlier-based zero-day discovery research
experiences high misleading negative
2020 Publisher: MDPI rates, in this way restricting their
reasonable use and execution. This paper
proposes an autoencoder execution for
distinguishing zero-day assaults. The point
is to construct an IDS model with high
review while keeping the miss rate (false
negatives) to a minimum.
Authors:Umer Ahmed Cloud computing is the most demanding
Butt, Muhammad accessibility of network
Mehmood, Syed Bilal resources,especially in processing power
Hussain Shah, Rashid and data storage. Cc recently created a
Amin, M.Waqas Shaukat, new framework for facilitating and
Syed Mohsan Raza , delivering services over the internet. Cloud
Doug young Suh, and computing has several security challenges
Md. Jalil Piran. that delay the rapid adoption of the
computing model , such as vulnerability for
Title: ‘A Review of clients and associations. In these papers
Machine Learning they review several machine learning
Algorithms for Cloud algorithms that are used to overcome the
Computing Security’ cloud security issues including supervised,
unsupervised, semi-supervised and
Publisher: Mdpi reinforcement learning.
(electronics)

Title: Game theoretic Cloud Computing has been adopted by many


model for cloud security leading organizations for storage, processing,
based on IDS. sharing and to provide other services. It faces
several security challenges from its
Authors: Komal Singh Gill, surroundings in terms of regular and
sophisticated attacks. These challenges
Sharad Saxena, Anju
become worse when the Internet of Things
Sharma. (IoT) devices are connected to it. This is
because of their low-security characteristics.
Publishers:Computer These threats are generally handled using
Science and Engineering techniques such as Intrusion Detection System
Department. (IDS), Honeypots, Firewall, etc. To identify the
best defense strategy in these techniques,
further research is needed. Hence in this
paper, a game-theoretic model GTM-CSec has
been proposed. The proposed model
intelligently selects the most suitable module
out of the signature, anomaly, and honeypot
based detection to detect the attack. The
selection of a particular detection module
instead of using all in parallel not only leads to
the reduction of energy consumption but also
increases the overall efficiency of the defender
system.

In recent times, web application is picking up


Title: The security in web its prevalence in our day-by-day schedule, for
application of cloud and IoT example, banking, web-based shopping,
service. perusing news, and so forth. It is seen that web
application-based cloud administration
Authors: Prasath R, G. experiences certain issues because of its
Tony Santhosh, I. Andrews helpless security highlights. These prompts
Juben Ratchnayaraj, E. summed up loss of data, which influences the
Jemiline. classification in web application cloud workers.
In this paper, the possibility of Elliptical Curve
Publishers: Department of Cryptography to give security into Web
Computer Science Application based cloud administration is
Engineering. demonstrated. It targets giving security to the
cloud client (information, programming) and
cloud worker. The outcome shows that
proposed strategy achieves preferable
outcomes over different strategies as far as its
decreased encryption time, decoding time, and
computational expense.

In this paper, security issues associated


Title: Cloud
Computing with cloud computing are reviewed.
Security Challenges Additionally, the types of cloud and service
models have also been pointed out. Cloud
Authors: Evans computing has ruled the data innovation
Osei-Opoku, industry as of late. Giant data centersthat
MSc Rym Regaieg, PhD provide cloud services are been set up due
Mohamed Koubaa, PhD to the global approval of cloud and
virtualization innovations. Cloud
Publishers: National computing is characterized as a
Engineering School of web-based software service since
Tunis (ENIT), University Information Technology (IT) resources like
of network, server, storage, and so on are
Tunis El Manar, Tunisia based on the Web. Along these lines,
cloud computing
services can be utilized at any place and
whenever on the Personal Computer (PC)
or smart mobile phones. In light of the
on-demand, adaptable and versatile
administration it can
give, a considerable measure of
companies that beforehand deployed
locally has moved their organizations to the
cloud. Although cloud
computing brings a whole lot of
advantages, many security challenges
have been brought up
to both cloud providers and clients.
The generally accepted definition of Cloud
Computing comes from the National
Institute of Standards and Technology
(NIST) (Mell et
al., 2011) which states “Cloud Computing
is a
model for enabling convenient, ondemand
network access to a shared pool of
configurable computing resources (e.g.,
networks, servers,
storage, applications, and services) that
can be rapidly provisioned and released
with minimal
management effort or service provider
interaction”. In short, it means that
end-users
are to utilize parts of bulk resources and
that these resources can be acquired
quickly and easily. Cloud computing is a
standout among the most well-known
topics and quickly
developing an approach in the field of data
innovation.

Cloud computing security or, more simply,


Title: Atilim
university cloud security is an evolving sub-domain of
Software Engineering computer security, network security, and,
department IT security more broadly, information security. It refers
Cloud Computing to a broad set of policies, technologies,
and controls deployed to
Authors: Assoc.
Dr. *Llahm protect data, applications, and the
Omar Faraj Ben Dalla associated infrastructure of cloud
computing. Cloud
Publishers: Self-Lanser Computing is a metaphor for certain parts
Group of the Internet. The IT enterprises and
Research Center individuals are searching for a way to
(SLGRC) reduce the cost of computation, storage
Computer Department. and communication.
Tripoli/LIBYA. Cloud Computing is an internet-based
technology providing "On-Demand"
solutions for addressing these scenarios
that should be flexible enough for
adaptation and responsive
to requirements. The huge amount of
information that resides in the Cloud for
servicing various enterprises and for
making enterprises secure sensitive data
should reside in corporate data centers
whereas the rest can reside in public data
centers. The Cloud manages upgrades
and provides information backup in the
event of a disaster and/or a
System crash. The capital and operational
costs of running data centers are reduced
by Cloud Computing making IT enterprises
focus on strategic projects. In this paper.
Cloud Computing is discussed and the
Various aspects of Cloud Computing
outlined such as advantages, limitations,
problems and solutions, applications with
E-governance, emerging and future trends.
In this paper, a new zero day test method,
proposed by ZSL, is proposed. Frame
measures how ML-based NIDS can detect
subtle attacks using a set of learned semantic
attributesin visual attacks. There are two main
stages of the proposed setup. In the learning
phase of responsibility, models extract and
map network data features to different known
attack attributes. In thinking section, the model
links the relationship between a known attack
and a zero day attack to assist in your attack
discovery and classification as cruel. In
contrast to standard testing methods, the
proposed set is intended ML-based NIDS
testing using a new matrix, called Zero-day
Detection Rate (Z-DR), measures how the
learning model can recreate the divisive
semantics learned in the known attack classes,
finding unknown attack classes. The proposed
Title: From Zero-Shot method is made using a combination of
Machine Learning to two important NIDS data sets, each covering a
Zero-Day Attack wide range of modern attacks, and two widely
Detection used ML models. in the field of research.
Additionally, the results obtained were
Author : Mohanad Sarhan, analyzed using Wasserstein Distance to
Siamak Layeghy, Marcus describe the variation of Z-DR by different
Gallagher and Marius attack groups. The main contribution of this
Portmann paper is ZSL-based problem acceptance set to
propose a reliable ML-based NIDS testing
2021 Published date : 30 Sep method in finding new or invisible types of
2021 attacks, imitating the most likely of the zero
day attacks after shipping.ML-based NIDS
over signature NIDS-based NIDS. Thus, the
large amount of NIDS based on the proposed
ML does not anticipate a possible recurrence
of the zero-day attack, in which a new phase of
attack may emerge. after the learning phase of
the ML model.
Zero-shot Learning (ZSL) is an innovative
method used to test and improve familiarity. of
ML models in new or invisible data classes.
This process follows the assumption that the
training data set may not include the entire set
of classes the ML model can see when in use
the real world. Therefore, ZSL refers to a
growing group of classes that can make it
difficult to collect training samples for each of
them. ZSL involves the recognition of new data
samples taken from previously unprecedented
classes. In the qualifying learning phase, the
model is provided with the differentiating
semantics of the lost class.

The training and testing of machine learning


models is over different data sets. This is
actually necessary to check robustness and
performance of machine learningalgorithms in
real-time situations. Dealing with this error in
recent studies, in this work, we analyze
performance of large-scale machine learning
algorithms with two separate databases,
namely, UNSW and ISOT . Both datasets are
secured through a simulated cloud places. This
is a completely different two different traffic
different data sets serve as a good example for
everyday use of business cloud networks.
Title: Feasibility of Accuracy, we compare retreat, decision trees,
Supervised Machine Naïve Bayes, and support Vector Machines
Learning for Cloud (SVM) Strategies. We have selected these
Security algorithms, as widely used in various fields,
which includes network security and cloud
Author : Raj Jain. Aiman security. First, the models are trained using the
Erbad, Mohammed UNSW training database. The trained models
Samaka, Tara Salman, are then tested using the UNSW and ISOT
Deval Bhamare tests data sets. It should be noted that UNSW
training and test data sets are found using the
Published date : sept 2021 same test site, however, The ISOT database
was obtained using a completely different
application test setup (please refer to Part IV
for details description of data sets). We argue
for a lot of consideration data sets will provide
the necessary understanding for testing ML
models were not yet in the study it works. Such
an examination of the studied models can
provide a sense of durability and performance
of the models studied in real situations. We
present our results to show the need for further
research in the field of surveillance machine
learning and its effectiveness in cloud and
network security.

Title: An Adaptable Deep With all the improvements in ML-based IDs,


Learning-Based Intrusion signature the extraction process even the
Detection System to extraction phase feature of suspicious traffic is
Zero-Day Attacks well processed. However, another problem
remains: Available IDS can only find previously
Author: known attacks. As a result, zero-day attacks
Mahdi Soltani, Behzad remain they can be seen for a long time, and
Ousat, Mahdi Jafari during this time, they can have them major
Siavoshani, Amir Hossein impacts on networks. In, the effects of zeroday
Jahangir attacks are discussed. The authors point out
that zeroday attacks are far more widespread
Published Date: 20 Aug than suspected indicating that, out of their 18
2021 analyzed attacks, 11 (61%) they were
previously unknown. Having this consideration
in mind, an IDS requirement that can detect
the unknown the attack intensifies. Although
there are confusing statistics and ML bases
traces the width of the access point, focusing
on it to distinguish normal traffic from attacks.
As a result, they cannot determine the type of
malicious traffic attack as a valid acquisition
report. Another weakness is this machines the
inability to distinguish new behaviors of correct
traffic embedded in anonymity. Also important
challenge for traditional ML-based finders
(based traditional clustering algorithms) high
size of network flow content. Maximum size of
input is the main reason for use based on
in-depth reading models in intrusion detectors.
The novelty of this paper is to promote in-depth
reading based framework for introducing
intrusion detectors to zero day to attack. The
framework aims to report a specific type of
attack of vicious traffic while considering new
and fresh attacks good flow behavior. Includes
anonymous samples according to the new
corresponding categories. Then, the expert
label these collections, and the framework
updates itself using new classes with label.
This process makes the framework work
renewal over time. Otherwise, the collection
more evidence of new attacks in terms of
analysis and review phases, a traditional
integration algorithm is included with deep
learning-based phases. This combination of
categorization is first used in an access point.
Then, the proposed framework is tested and
compared in four models, including DOC [3],
DOC ++ (which is a newer version of DOC
presented in this paper), Openmax [4], and
compound of the in-depth model of the default
encoder and traditional SVMsWith all the
improvements in ML-based IDs, signature the
extraction process even the extraction phase
feature of suspicious traffic is well processed.
However, another problem remains: Available
IDS can only find I previously known attacks.
Title : A Systematic Review An important factor noted in cloud computing
on Cloud Security Based that resources do not exist permanently
On Machine Learning connected to users. On the contrary, the
resources are rated at the most detailed
Author: JAYA SHARMA, Dr. levelterms of use of resources, while resources
SANJAY SINGH are available used and services are charged
BHADORIYA accordingly their use. The concept of individual
payments seen in the clouds computers have
Published Date: 21/06/2021 significantly reduced investment costs
purchasing stationary services. These features
show that different industries have clearly
changed for cloud-based services. Machine
learning (ML) is one of the different areas of
action intelligence (AI) used to assign
decision-making processes in systems based
on artificial intelligence . Machine learning is an
extension of Convolution Neural Network
(CNN), which does business or a
decision-making process for decision-making
train the system with relevant data and allow it
managing different situations and making wise
decisions. The great advantage of machine
learning is that so that they can easily identify
patterns and styles in them processes that
exist without human intervention. Ku in
addition, the use of machine learning methods
leaves an area of continuous development,
especially if system instability data changes.
The machine learning has been used in many
forms applications facing multidimensional as
well multidimensional data. The latest trend
seen by integration of advanced computer
paradigms as mechanical engineering and
machine learning with cloud computing to
perform various tasks again and again to
improve cloud security. As shown by research
by authors , others research efforts aim to use
algorithms and methods for machine learning
to improve cloud security. I a general meeting
followed during the development a a cloud
security model based on machine learning is to
train the model using marked re-entry abstract
and common behaviors seen in cloud network.
This is done using several standards data sets,
including and output data functions as well
through these activities to learn basic patterns
as well behavior. Other data sets available are
DRAPA, KDD, UNSW and ISOT. Multi-machine
reading strategies and categories (such as
cutting trees, retreat analysis, SVM) and Naive
Bayes classifiers) combined with other safety
measures can improve cloud security.

TITLE: Artificial Intelligence This article demonstrates how AI and critical


and its Application to methodologies associated with it are employed
Information Security in information security and highlights the core
functionalities like analysing millions of events
Management and identifying a variety of threats, ranging
from malware exploiting zero-day
AUTHORS: Oscar O. vulnerabilities to detecting risky behaviour that
Onyango could lead to a phishing attack or the download
of malicious code. These systems improve with
Strathmore University time, leveraging on previous attacks to identify
new sorts of attacks in the present. User,
Nairobi, Kenya asset, and network profiles are created using
behaviour histories, allowing AI to detect and
9 PUBLICATIONS 28 respond to departures from established norms.
CITATIONS

PUBLICATION YEAR: 2021

PUBLICATION MONTH:
APRIL

TITLE: Patching zero-day The ultimate point of this paper is to put forth
vulnerabilities: an empirical the survival model and its impact in the
patching process. Cox regression method is
analysis
used to analyse the vulnerability dataset
obtained from ZDI. sub-analyses is carried out
AUTHOR:Yaman Roumani
using the K–M method, and evaluated the
PUBLICATION DETAILS: robustness of the results. The results
demonstrated that survival analysis is
Received 16 April 2021; significant and useful for assessing patch
revised 1 September 2021; release timing, based on the fit statistics.
accepted 11 November
2021

You might also like