TY - GEN
T1 - Brute Force Detection System Based on Machine Learning Classifier Algorithm in Cloud-Based Infrastructure
AU - Wahono, Bari Hade Variant
AU - Asfihani,
AU - Mahfud, Ilyas
AU - Exshadi, Baskworo Yoga Indra
AU - Shiddiqi, Ary Mazharuddin
N1 - Publisher Copyright:
© 2024 IEEE.
PY - 2024
Y1 - 2024
N2 - The increasing adoption of cloud computing across various sectors has led to increased utilization of resources, such as server instances, databases, and microservices. This expansion generates a wide array of log files. The substantial challenge posed by the sheer volume and variety of log files lies in the increasing difficulty of efficiently processing and analyzing them without effective classification. This research focuses on distinguishing brute force attacks from other events in access logs. To achieve this goal, we employ One Hot Encoding for feature extraction and apply machine learning algorithms like Naive Bayes, Decision Tree, Random Forest, and Support Vector Machine. Our findings indicate that Decision Trees and Random Forests are particularly effective, with 87 % accuracy in detecting malicious traffic within log datasets. These results enhance security measures in cloud computing environments and aid in developing more robust and efficient anomaly detection systems.
AB - The increasing adoption of cloud computing across various sectors has led to increased utilization of resources, such as server instances, databases, and microservices. This expansion generates a wide array of log files. The substantial challenge posed by the sheer volume and variety of log files lies in the increasing difficulty of efficiently processing and analyzing them without effective classification. This research focuses on distinguishing brute force attacks from other events in access logs. To achieve this goal, we employ One Hot Encoding for feature extraction and apply machine learning algorithms like Naive Bayes, Decision Tree, Random Forest, and Support Vector Machine. Our findings indicate that Decision Trees and Random Forests are particularly effective, with 87 % accuracy in detecting malicious traffic within log datasets. These results enhance security measures in cloud computing environments and aid in developing more robust and efficient anomaly detection systems.
KW - decision tree
KW - log processing
KW - naive bayes
KW - random forest
KW - support vector machine
UR - http://www.scopus.com/inward/record.url?scp=85190547474&partnerID=8YFLogxK
U2 - 10.1109/ICETSIS61505.2024.10459370
DO - 10.1109/ICETSIS61505.2024.10459370
M3 - Conference contribution
AN - SCOPUS:85190547474
T3 - 2024 ASU International Conference in Emerging Technologies for Sustainability and Intelligent Systems, ICETSIS 2024
SP - 939
EP - 943
BT - 2024 ASU International Conference in Emerging Technologies for Sustainability and Intelligent Systems, ICETSIS 2024
PB - Institute of Electrical and Electronics Engineers Inc.
T2 - 2024 ASU International Conference in Emerging Technologies for Sustainability and Intelligent Systems, ICETSIS 2024
Y2 - 28 January 2024 through 29 January 2024
ER -