A comparative study of machine learning tools for detecting Trojan horse infections in cloud computing environments

Hasan Kanaker, Monther Tarawneh, Nader Abdel Karim, Adeeb Alsaaidah, Maher Abuhamdeh, Osama Qtaish, Essam Alhroob, Zaid Alhalhouli

Abstract


Cloud computing offers several advantages, including cost savings and easy access to resources, it is also could be vulnerable to serious security attacks such as cloud Trojan horse infection attacks. To address this issue, machine learning is a promising approach for detecting these threats. Thus, different machine learning tools and models have been employed to detect Trojan horse infection such as Weka and Python Colab. This study aims to compare the performance of Weka and Python Colab, as popular tools for building machine learning models. This study evaluates the recall, accuracy, and F1-score of machine learning models built with Weka and Python Colab and compares their computational resources required employing several machine learning algorithms. The dataset collected and analyzed using dynamic analysis of Trojan horse infection in control lab environment. The findings of this study can help determine the decision about which tool to use to detect Trojan horse infections and provide insights into the strengths and limitations of Weka and Python Colab for building machine-learning models in general.

Keywords


Cloud computing; Control lab; Cybersecurity; Machine learning; Python; Trojan horse infection; Weka

Full Text:

PDF


DOI: http://doi.org/10.11591/ijece.v14i6.pp6642-6655

Creative Commons License
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.

International Journal of Electrical and Computer Engineering (IJECE)
p-ISSN 2088-8708, e-ISSN 2722-2578

This journal is published by the Institute of Advanced Engineering and Science (IAES) in collaboration with Intelektual Pustaka Media Utama (IPMU).