Detecting abuse of cloud and public legitimate services as command and control infrastructure using machine learning

dc.contributor.advisorTheodorakopoulos, George
dc.contributor.authorAl lelah, Turki
dc.date.accessioned2025-01-27T06:52:17Z
dc.date.issued2024
dc.description.abstractThe widespread adoption of Cloud and Public Legitimate Services (CPLS) has inadvertently created new opportunities for cybercriminals to establish hidden and robust command-and-control (C&C) communication infrastructure. This abuse represents a major cybersecurity risk, as it allows malicious traffic to seamlessly disguise itself within normal network activities. Traditional detection systems are proving inadequate in accurately identifying such abuses. Therefore, this thesis is motivated by emphasizing the urgent need for more advanced detection techniques that are capable of identifying the C&C activity hidden within legitimate CPLS traffic. To assess the extent of the cyber threat of abusing CPLS, this thesis presents an ex- tensive Systematic Literature Review (SLR) encompassing academic and industry lit- erature. The review provides a comprehensive categorization of the attack techniques utilized to abuse CPLS as C&C infrastructure. The open problems uncovered through the SLR motivate this thesis to propose a novel Detection System (DS) capable of identifying malware that abuse CPLS as C&C communication channels. Furthermore, to evaluate our system robustness against attempts to evade detection, this thesis intro- duces the Replace Misclassified Parameter (RMCP) adversarial attack. The proposed detection system leverages Artificial Intelligence (AI) techniques, combining static and dynamic malware analysis methods to accurately identify CPLS abuse. The effective- ness of the proposed system is validated through extensive experiments, demonstrating its ability to detect novel and sophisticated attacks that evade traditional security measures. The outcomes of this thesis have significant implications for enhancing the security of cloud environments, contributing valuable knowledge and practical solutions to the field of cloud security.
dc.format.extent238
dc.identifier.urihttps://hdl.handle.net/20.500.14154/74755
dc.language.isoen
dc.publisherCardiff University
dc.subjectCloud computing
dc.subjectAccuracy
dc.subjectMachine learning algorithms
dc.subjectComputer viruses
dc.subjectHeuristic algorithms
dc.subjectMachine learning
dc.subjectTelecommunication traffic
dc.subjectFeature extraction
dc.subjectRobustness
dc.subjectResilience
dc.subjectCloud computing security
dc.subjectCommand and control
dc.subjectMalware detection
dc.subjectDynamic analysis
dc.subjectAdversarial machine learning attack
dc.titleDetecting abuse of cloud and public legitimate services as command and control infrastructure using machine learning
dc.typeThesis
sdl.degree.departmentSchaol of Computer Science and Informatics
sdl.degree.disciplineCyber Security
sdl.degree.grantorCardiff University
sdl.degree.nameDoctor of Philosophy

Files

Original bundle

Now showing 1 - 1 of 1
No Thumbnail Available
Name:
ٍSACM-Dissertation.pdf
Size:
11.63 MB
Format:
Adobe Portable Document Format

License bundle

Now showing 1 - 1 of 1
No Thumbnail Available
Name:
license.txt
Size:
1.61 KB
Format:
Item-specific license agreed to upon submission
Description:

Copyright owned by the Saudi Digital Library (SDL) © 2025