Comparing FTP and SSH password brute force attack detection using k-Nearest neighbour (k-NN) and decision tree in cloud computing.

Cloud computing represents a new epoch in computing. From huge enterprises to individual use, cloud computing always provides an answer. Therefore, cloud computing must be readily accessible and scalable, and customers must pay only for the resources they consume rather than for the entire infrastru...

Full description

Saved in:
Bibliographic Details
Main Authors: Kamarudin Shah, Muhammad Fakrullah, Md-Arshad, Marina, Abdul Samad, Adlina, A.Ghaleb, Fuad
Format: Article
Language:English
Published: Penerbit UTM Press 2023
Subjects:
Online Access:http://eprints.utm.my/108487/1/MuhammadFakrullahKamarudin%20Shah2023_ComparingFTPandSSHPasswordBruteForce.pdf
http://eprints.utm.my/108487/
http://dx.doi.org/10.11113/ijic.v13n1.386
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Universiti Teknologi Malaysia
Language: English
id my.utm.108487
record_format eprints
spelling my.utm.1084872024-11-17T09:33:17Z http://eprints.utm.my/108487/ Comparing FTP and SSH password brute force attack detection using k-Nearest neighbour (k-NN) and decision tree in cloud computing. Kamarudin Shah, Muhammad Fakrullah Md-Arshad, Marina Abdul Samad, Adlina A.Ghaleb, Fuad T58.6-58.62 Management information systems Cloud computing represents a new epoch in computing. From huge enterprises to individual use, cloud computing always provides an answer. Therefore, cloud computing must be readily accessible and scalable, and customers must pay only for the resources they consume rather than for the entire infrastructure. With such conveniences, come with their own threat especially brute force attacks since the resources are available publicly online for the whole world to see. In a brute force attack, the attacker attempts every possible combination of username and password to obtain access to the system. This study aims to examine the performance of the k-Nearest Neighbours (k-NN) and Decision Tree algorithms by contrasting their precision, recall, and F1 score. This research makes use of the CICIDS2017 dataset, which is a labelled dataset produced by the Canada Institute for Cybersecurity. A signature for the brute force attack is utilised with an Intrusion Detection System (IDS) to detect the attack. This strategy, however, is ineffective when a network is being attacked by a novel or unknown attack or signature. At the conclusion of the study, the performance of both algorithms is evaluated by comparing their precision, recall, and f1 score. The results show that Decision Tree performs slightly better than k-NN at classifying FTP and SSH attacks. Penerbit UTM Press 2023-05-30 Article PeerReviewed application/pdf en http://eprints.utm.my/108487/1/MuhammadFakrullahKamarudin%20Shah2023_ComparingFTPandSSHPasswordBruteForce.pdf Kamarudin Shah, Muhammad Fakrullah and Md-Arshad, Marina and Abdul Samad, Adlina and A.Ghaleb, Fuad (2023) Comparing FTP and SSH password brute force attack detection using k-Nearest neighbour (k-NN) and decision tree in cloud computing. International Journal of Innovative Computing, 13 (1). pp. 29-35. ISSN 2180-4370 http://dx.doi.org/10.11113/ijic.v13n1.386 DOI:10.11113/ijic.v13n1.386
institution Universiti Teknologi Malaysia
building UTM Library
collection Institutional Repository
continent Asia
country Malaysia
content_provider Universiti Teknologi Malaysia
content_source UTM Institutional Repository
url_provider http://eprints.utm.my/
language English
topic T58.6-58.62 Management information systems
spellingShingle T58.6-58.62 Management information systems
Kamarudin Shah, Muhammad Fakrullah
Md-Arshad, Marina
Abdul Samad, Adlina
A.Ghaleb, Fuad
Comparing FTP and SSH password brute force attack detection using k-Nearest neighbour (k-NN) and decision tree in cloud computing.
description Cloud computing represents a new epoch in computing. From huge enterprises to individual use, cloud computing always provides an answer. Therefore, cloud computing must be readily accessible and scalable, and customers must pay only for the resources they consume rather than for the entire infrastructure. With such conveniences, come with their own threat especially brute force attacks since the resources are available publicly online for the whole world to see. In a brute force attack, the attacker attempts every possible combination of username and password to obtain access to the system. This study aims to examine the performance of the k-Nearest Neighbours (k-NN) and Decision Tree algorithms by contrasting their precision, recall, and F1 score. This research makes use of the CICIDS2017 dataset, which is a labelled dataset produced by the Canada Institute for Cybersecurity. A signature for the brute force attack is utilised with an Intrusion Detection System (IDS) to detect the attack. This strategy, however, is ineffective when a network is being attacked by a novel or unknown attack or signature. At the conclusion of the study, the performance of both algorithms is evaluated by comparing their precision, recall, and f1 score. The results show that Decision Tree performs slightly better than k-NN at classifying FTP and SSH attacks.
format Article
author Kamarudin Shah, Muhammad Fakrullah
Md-Arshad, Marina
Abdul Samad, Adlina
A.Ghaleb, Fuad
author_facet Kamarudin Shah, Muhammad Fakrullah
Md-Arshad, Marina
Abdul Samad, Adlina
A.Ghaleb, Fuad
author_sort Kamarudin Shah, Muhammad Fakrullah
title Comparing FTP and SSH password brute force attack detection using k-Nearest neighbour (k-NN) and decision tree in cloud computing.
title_short Comparing FTP and SSH password brute force attack detection using k-Nearest neighbour (k-NN) and decision tree in cloud computing.
title_full Comparing FTP and SSH password brute force attack detection using k-Nearest neighbour (k-NN) and decision tree in cloud computing.
title_fullStr Comparing FTP and SSH password brute force attack detection using k-Nearest neighbour (k-NN) and decision tree in cloud computing.
title_full_unstemmed Comparing FTP and SSH password brute force attack detection using k-Nearest neighbour (k-NN) and decision tree in cloud computing.
title_sort comparing ftp and ssh password brute force attack detection using k-nearest neighbour (k-nn) and decision tree in cloud computing.
publisher Penerbit UTM Press
publishDate 2023
url http://eprints.utm.my/108487/1/MuhammadFakrullahKamarudin%20Shah2023_ComparingFTPandSSHPasswordBruteForce.pdf
http://eprints.utm.my/108487/
http://dx.doi.org/10.11113/ijic.v13n1.386
_version_ 1816130059897929728