{"title":"Intrusion Classification for Cloud Computing Network: A Step Towards an Intelligent Classification System","authors":"Kanda Alamer, Abdulaziz Aldribi","doi":"10.1109/CICN56167.2022.10008346","DOIUrl":null,"url":null,"abstract":"One of the most rapidly spreading areas of infor-mation technology is cloud computing. However, this raises sig-nificant security issues that entice burglars. This paper presents a machine learning-based framework for intrusion classification for cloud computing networks. It offers new capabilities derived from cloud network flow. By dividing the flow into windows of time, a method known as the Riemann Chunking Scheme computes these features. After experimenting with this dataset, we have extracted 40 features that best describe the problem of anomaly classification and improve the accuracy of the study on multilayer perceptron for anomaly classification in cloud network traffic","PeriodicalId":287589,"journal":{"name":"2022 14th International Conference on Computational Intelligence and Communication Networks (CICN)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-12-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 14th International Conference on Computational Intelligence and Communication Networks (CICN)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CICN56167.2022.10008346","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
One of the most rapidly spreading areas of infor-mation technology is cloud computing. However, this raises sig-nificant security issues that entice burglars. This paper presents a machine learning-based framework for intrusion classification for cloud computing networks. It offers new capabilities derived from cloud network flow. By dividing the flow into windows of time, a method known as the Riemann Chunking Scheme computes these features. After experimenting with this dataset, we have extracted 40 features that best describe the problem of anomaly classification and improve the accuracy of the study on multilayer perceptron for anomaly classification in cloud network traffic