Skip to main content
Top

Privilege Escalation Attack Detection and Mitigation in Cloud Using Machine Learning

  • 2026
  • OriginalPaper
  • Chapter
Published in:

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

This chapter delves into the security challenges posed by cloud computing, with a focus on data breaches and unauthorized access. It explores the role of machine learning in addressing these challenges and highlights the limitations of existing datasets used for security research. The study evaluates the effectiveness of four machine learning algorithms—Random Forest, AdaBoost, XGBoost, and LightGBM—in classifying insider attacks. The system architecture involves data collection, preprocessing, and the application of supervised machine learning algorithms for detection and classification. Feature selection is crucial in identifying relevant features for effective attack detection. The study also discusses the importance of accuracy, precision, recall, and F1 score in evaluating the performance of these algorithms. The results show that LightGBM has the highest accuracy, followed by XGBoost and AdaBoost, with Random Forest having the lowest accuracy. The conclusion emphasizes the importance of protecting information and resources against insider threats and highlights the potential of machine learning in strengthening security measures.

Not a customer yet? Then find out more about our access models now:

Individual Access

Start your personal individual access now. Get instant access to more than 164,000 books and 540 journals – including PDF downloads and new releases.

Starting from 54,00 € per month!    

Get access

Access for Businesses

Utilise Springer Professional in your company and provide your employees with sound specialist knowledge. Request information about corporate access now.

Find out how Springer Professional can uplift your work!

Contact us now
Title
Privilege Escalation Attack Detection and Mitigation in Cloud Using Machine Learning
Authors
T. Kavitha
E. Poojitha
M. Bhavani
K. Sravanthi
Copyright Year
2026
Publisher
Springer Nature Singapore
DOI
https://doi.org/10.1007/978-981-95-0269-1_90
This content is only visible if you are logged in and have the appropriate permissions.