Identifying Cyberattacks in Cloud Computing Service Frameworks Through Correlation-Driven Feature
-
https://doi.org/10.14419/3a4djt23
Received date: May 27, 2025
Accepted date: June 24, 2025
Published date: July 7, 2025
-
Cloud Security; Cyberattack Detection; Feature Engineering, DDoS Defense; and Pearson Correlation Analysis -
Abstract
Cloud computing infrastructures are often targeted by hacktivists due to their relatively insecure service and delivery paradigms. This article addresses common attack vectors, such as ransomware, insider threats, API breaches, and data leaks, that, if ignored, might jeopardize sensitive data and interfere with important work. We provide a new method based on correlation-based feature selection for identifying fraudulent activities in cloud systems. Using Pearson correlation analysis, we drastically cut down on redundant features on the security dataset, yielding promising results for threat identification. Our feature selection method's effectiveness is empirically supported, and we demonstrate that the classification algorithms perform better when using the improved tool of the optimized data set than when using the original feature set. In this research, a unique approach to intelligent data pre-processing for cloud security enhancement is presented.
-
References
- R.M. Аlguliev, F.C. Abdullayeva, “An investigation and analysis of security problems of the cloud computing,” Problems of Information Technol-ogy, 2013, №1(7), pp. 3-14.
- ‘The Treacherous Twelve’ Cloud Computing Top Threats in 2016, https://cloudsecurityalliance.org/artifacts/thetreacherous- twelvecloud- compu-ting-topthreats-in-2016/
- M. Aamir, S.M. Zaidi, “Detecting DDoS attacks using feature engineering, machine learning, the framework, and performance assessment The In-ternational Journal of Information Security, 2019, vol. 18, pp. 761- 785. https://doi.org/10.1007/s10207-019-00434-1.
- IEEE 4-th International Conference on Network and System Security, "Adaptive Clustering with Feature Ranking for DDoS Attacks Detection," L. Zi, J. Yearwood, X.W. Wu, 2010, pp. 282286.
- G. Chandrashekar, F. Sahin, “A survey on feature selection methods,” Computers and Electrical Engineering, 2014, vol. 40, no. 1, pp. 16- 28. https://doi.org/10.1016/j.compeleceng.2013.11.024.
- R.K. Deka, D.K. Bhattacharya, J.K. Kalita, “Active utilizing ranked learning to identify DDoS attacks features,” Computer Communications, 2019, vol. 145, pp. 203-222. https://doi.org/10.1016/j.comcom.2019.06.010.
- F.J. Abdullayeva, “Advanced Cloud computing persistent threat assault detection technique based on softmax regression and autoencoder algo-rithm,” Array, vol. 10, pp. 1-11.
- I. Guyon, A. Elisseeff, “An introduction to variable and feature selection,” Journal of Machine Learning Research, 2003, vol. 3, pp. 1157-1182.
- R. Battiti, “IEEE Transactions on Neural Networks, 1994, Vol. 5, no. 4, pp. Using mutual information to select features in supervised neural net learning 537-550”.r https://doi.org/10.1109/72.298224.
- CSE-CIC-IDS2018 on AWS, https://www.unb.ca/cic/datasets/ids- 2018.html
- HTTP DATASET CSIC 2010, Information Security Institute
- Alaigwu, B. E., & Chiroma, H. (2021). A systematic review of cloud computing security: Issues and challenges. Journal of Network and Computer Applications, 176, 102918.
- Hameed, S., & Khan, F. (2022). A hybrid feature selection approach for intrusion detection in cloud environments. Future Generation Computer Systems, 127, 345–357.
- Moustafa, N., Creech, G., Slay, J., & Turnbull, B. (2020). Big data analytics for intrusion detection: Advances, challenges, and opportunities. Fu-ture Generation Computer Systems, 95, 476 -489.
- Singh, S., Chana, I., & Buyya, R. (2020). Agile cloud security service composition for proactive intrusion detection. IEEE Transactions on Cloud Computing, 9(2), 637–650.
- Zhang, H., & Wu, S. (2021). Zero-day attack detection in cloud environments using ensemble learning techniques. IEEE Access, 9, 78945–78955.
- Shafiq, M. O., Yu, X., Bashir, A. K., & Chaudhry, S. A. (2023). AI-driven DDoS detection using hybrid deep learning models in multi-cloud archi-tectures. Computers & Security, 126, 103013.
- Alsaedi, N., & Moustafa, N. (2021). A novel graph-based feature selection technique for cyberattack detection in cloud networks. Journal of In-formation Security and Applications, 57, 102703.
- Sahu, A. K., Yadav, D. K., & Pateriya, R. K. (2020). A feature selection based ensemble classifier for effective intrusion detection. Procedia Com-puter Science, 167, 2350–2359. https://doi.org/10.1016/j.procs.2020.03.289.
-
Downloads
-
How to Cite
GV, smitha, Khaiyum , D. S. ., S, Y. D. ., N, Y. G. ., Reddy, Y. S. K. ., & S, Y. . (2025). Identifying Cyberattacks in Cloud Computing Service Frameworks Through Correlation-Driven Feature. International Journal of Basic and Applied Sciences, 14(2), 645-650. https://doi.org/10.14419/3a4djt23
