IJCOPE Journal

UGC Logo DOI / ISO Logo

International Journal of Creative and Open Research in Engineering and Management

A Peer-Reviewed, Open-Access International Journal Supporting Multidisciplinary Research, Digital Publishing Standards, DOI Registration, and Academic Indexing.
Journal Information
ISSN: 3108-1754 (Online)
Crossref DOI: Available
ISO Certification: 9001:2015
Publication Fee: 599/- INR
Compliance: UGC Journal Norms
License: CC BY 4.0
Peer Review: Double Blind
Volume 02, Issue 04

Published on: April 2026

PRIVILEGE ESCALATION ATTACK DETECTION AND MITIGATION IN CLOUD USING MACHINE LEARNING

N. Soujanya G. Sruthi B. Maneesh Preetham T. Druva Sri S. Sriman

Dr. A.V.H. Sai Prasad

Dept of CSE(DS) CMR Technical Campus Hyderabad Telangana India

Article Status

Plagiarism Passed Peer Reviewed Open Access

Available Documents

Abstract

Because of the recent exponential rise in attack frequency and sophistication, the proliferation of smart things has created significant cyber security challenges. Even though the tremendous changes cloud computing has brought to the business world, its centralization makes it challenging to use distributed services like security systems. Valuable data breaches might occur due to the high volume of data that moves between businesses and cloud service suppliers, both accidental and malicious. Unlike outsiders, insiders possess privileged and proper access to information and resources. In this work, a machine learning-based system for insider threat detection and classification is proposed and developed a systematic approach to identify various anomalous occurrences that may point to anomalies and security problems associated with privilege escalation. By combining many models, ensemble learning enhances machine learning outcomes and enables greater prediction performance. Multiple studies have been presented regarding detecting irregularities and vulnerabilities in network systems to find security flaws or threats involving privilege escalation. But these studies lack the proper identification of the attacks. This study proposes and evaluates ensembles of Machine learning (ML) techniques in this context. This paper implements machine learning algorithms for the classification of insider attacks. A customized dataset from multiple files of the CERT dataset is used. Four machine learning algorithms, i.e., Random Forest (RF), Adaptive boosting(AdaBoost), Extreme Gradient Boosting(XGBoost), and Light Gradient Boosting Machine(LightGBM), are applied to that dataset and analyzed results. Overall, LightGBM performed best.

How to Cite this Paper

Soujanya, N., Sruthi, G., Preetham, B. M., Sri, T. D. & Sriman, S. (2026). Privilege Escalation Attack Detection and Mitigation in Cloud Using Machine Learning. International Journal of Creative and Open Research in Engineering and Management, <i>02</i>(04). https://doi.org/10.55041/ijcope.v2i4.284

Soujanya, N., et al.. "Privilege Escalation Attack Detection and Mitigation in Cloud Using Machine Learning." International Journal of Creative and Open Research in Engineering and Management, vol. 02, no. 04, 2026, pp. . doi:https://doi.org/10.55041/ijcope.v2i4.284.

Soujanya, N.,G. Sruthi,B. Preetham,T. Sri, and S. Sriman. "Privilege Escalation Attack Detection and Mitigation in Cloud Using Machine Learning." International Journal of Creative and Open Research in Engineering and Management 02, no. 04 (2026). https://doi.org/https://doi.org/10.55041/ijcope.v2i4.284.

Search & Index

References

[1] Securing Cloud Environments: A Machine Learning Approach To Privilege Escalation Detection - https://www.ijcnis.org/index.php/ijcnis/article/view/8432/2509?utm_source=chatgpt.com&__cf_chl_tk=9VUAGo3b4M5vCZoo9Q_O8I_F.TYXU0hWfSUH4eHimfE-1774639584-1.0.1.1-QmhOTErei7zfzyAI20LNS1dkXEiy.3gNvm9ugwK0Z3U

[2] Practical Machine Learning for Cloud Intrusion Detection: Challenges and the Way Forward - https://arxiv.org/abs/1709.07095

[3] Machine Learning-Based Insider Threat Detection - https://ieeexplore.ieee.org/document/8737460

[4] Detection and Mitigation of Privilege Escalation Attacks Using ML - https://ijetms.in/Vol-9-issue-2/Vol-9-Issue-2-16.pdf?utm_source=chatgpt.com

[5] ML-Based Intrusion Detection System for Cloud Security - https://www.ijcrt.org/papers/IJCRT24A4367.pdf?utm_source=chatgpt.com

[6] Machine Learning-Driven Privilege Escalation Detection Framework - https://easychair.org/publications/preprint/JHg8/open?utm_source=chatgpt.com

[7] Automating Privilege Escalation with Deep Reinforcement Learning - https://arxiv.org/abs/2110.01362

[8] Machine Learning for Cloud-Based Privilege Escalation Detection - https://turcomat.org/index.php/turkbilmat/article/view/14787

[9] Privilege Escalation Attack Detection and Mitigation in Cloud Using Machine Learning - https://www.researchgate.net/publication/370616797_Privilege_Escalation_Attack_Detection_and_Mitigation_in_Cloud_using_Machine_Learning

Ethical Compliance & Review Process

  • All submissions are screened under plagiarism detection.
  • Review follows editorial policy.
  • Authors retain copyright.
  • Peer Review Type: Double-Blind Peer Review
  • Published on: Apr 12 2026
CCBYNC

This article is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License. You are free to share and adapt this work for non-commercial purposes with proper attribution.

View License
Scroll to Top