Secure intrusion detection and attack measure selectionUvaraj Shan
This document proposes NICE, a framework for secure intrusion detection and attack mitigation in virtual network systems. NICE uses distributed agents on cloud servers to monitor traffic, detect vulnerabilities, and generate attack graphs. It profiles virtual machines to identify their state and vulnerabilities. When potential attacks are detected, NICE can quarantine suspicious VMs and inspect their traffic. The attack analyzer correlates alerts, constructs attack graphs, and selects appropriate countermeasures based on the graphs. Evaluations show NICE can effectively detect attacks while minimizing performance overhead for the cloud system.
The document proposes a neural network approach called NNID for detecting intrusions by analyzing user activity patterns. NNID is trained on command histograms collected from user logins over several days to build profiles of normal user behavior. It then analyzes histograms from new logins to detect anomalies that may indicate intrusions. In tests on a system with 10 users, NNID accurately detected 96% of anomalous logins with only a 7% false alarm rate, demonstrating its effectiveness at identifying unusual user behavior.
NICE: Network Intrusion Detection and Countermeasure Selection in Virtual Net...Migrant Systems
The document proposes NICE, a network intrusion detection and countermeasure selection framework for virtual network systems. NICE uses attack graph models to detect multi-step attacks. It deploys lightweight agents on cloud servers to capture traffic and analyze vulnerabilities. Suspicious VMs are put in inspection state, where deep packet inspection and virtual network changes are applied to detect attacks without interrupting services. NICE uses software switching and programmable networking to dynamically configure intrusion detection and isolate compromised VMs. Evaluations show NICE efficiently detects attacks while minimizing overhead on cloud resources.
IRJET- 3 Juncture based Issuer Driven Pull Out System using Distributed ServersIRJET Journal
This document discusses network security visualization and proposes a classification system for network security visualization systems. It begins by introducing the importance of visualizing network security data due to the large quantities of data produced. It then reviews existing network security visualization systems and outlines key aspects they monitor like host/server monitoring, port activity, and intrusion detection. The document proposes a taxonomy to classify network security visualization systems based on their data sources and techniques. It concludes by stating papers were selected for review based on their relevance to network security, novelty of techniques, and inclusion of evaluations.
Evasion Streamline Intruders Using Graph Based Attacker model Analysis and Co...Editor IJCATR
Network Intrusion detection and Countermeasure Election in virtual network systems (NICE) are used to establish a
defense-in-depth intrusion detection framework. For better attack detection, NICE incorporates attack graph analytical procedures into
the intrusion detection processes. We must note that the design of NICE does not intend to improve any of the existing intrusion
detection algorithms; indeed, NICE employs a reconfigurable virtual networking approach to detect and counter the attempts to
compromise VMs, thus preventing zombie VMs. NICE includes two main phases: deploy a lightweight mirroring-based network
intrusion detection agent (NICE-A) on each cloud server to capture and analyze cloud traffic. A NICE-A periodically scans the virtual
system vulnerabilities within a cloud server to establish Scenario Attack Graph (SAGs), and then based on the severity of identified
vulnerability toward the collaborative attack goals, NICE will decide whether or not to put a VM in network inspection state. Once a
VM enters inspection state, Deep Packet Inspection (DPI) is applied, and/or virtual network reconfigurations can be deployed to the
inspecting VM to make the potential attack behaviors prominent.
A system for-denial-of-service-attack-detection-based-on-multivariate-correla...LeMeniz Infotech
A system for-denial-of-service-attack-detection-based-on-multivariate-correlation-analysis.Interconnected systems, such as Web servers, database servers, cloud computing servers etc, are now under threads from network attackers
A wireless intrusion detection system and a new attack model (synopsis)Mumbai Academisc
The document describes a proposed wireless intrusion detection system and new attack model. It begins by outlining vulnerabilities in mobile wireless networks like susceptibility to eavesdropping and interfering attacks. It then discusses the need for intrusion detection as prevention measures alone are insufficient. The proposed system uses a matching algorithm to compare observed network behaviors and detect anomalies indicative of intrusions. It analyzes evidence from multiple nodes to identify intruders, multicasts intruder addresses to neighbors, and routes data along paths free of detected intruders.
Network Intrusion detection and Countermeasure sElection(NICEPranya Prabhakar
The document discusses the NICE (Network Intrusion detection and Countermeasure sElection in virtual network systems) framework. NICE aims to establish a defense-in-depth intrusion detection system for virtual network systems. It incorporates attack graph analysis to improve attack detection. NICE employs a reconfigurable virtual networking approach to detect attacks attempting to compromise VMs and prevent them from being used as "zombie VMs". It models security threats using attack graphs and scenario attack graphs. NICE also proposes a VM protection model using a VM profiler, security indexer, and state monitor to protect VMs based on their security index and connectivity.
To Get any Project for CSE, IT ECE, EEE Contact Me @ 09849539085, 09966235788 or mail us - [email protected]¬m-Visit Our Website: www.finalyearprojects.org
A review of security attacks and intrusion detection schemes in wireless sens...ijwmn
Wireless sensor networks are currently the greatest innovation in the field of telecommunications. WSNs
have a wide range of potential applications, including security and surveillance, control, actuation and
maintenance of complex systems and fine-grain monitoring of indoor and outdoor environments. However
security is one of the major aspects of Wireless sensor networks due to the resource limitations of sensor
nodes. Those networks are facing several threats that affect their functioning and their life. In this paper we
present security attacks in wireless sensor networks, and we focus on comparison and analysis of recent
Intrusion Detection schemes in WSNs.
HYBRID ARCHITECTURE FOR DISTRIBUTED INTRUSION DETECTION SYSTEM IN WIRELESS NE...IJNSA Journal
This document proposes a hybrid architecture for a distributed intrusion detection system using multiple agents. The key aspects of the architecture include:
- Using multiple independent tracker agents that monitor hosts and generate reports sent to monitors and storage.
- Monitors analyze activity and compare to signatures to detect known attacks, or send data to anomaly detectors.
- Anomaly and misuse detectors use classification and pattern matching to detect known and unknown attacks.
- An inference module coordinates entities across hosts to classify new attacks using a knowledge base and signature generator.
- A countermeasure module alerts administrators and can take actions like dropping packets in response to detected attacks.
A New Way of Identifying DOS Attack Using Multivariate Correlation Analysisijceronline
This document summarizes a research paper that proposes a new method for identifying denial of service (DoS) attacks using multivariate correlation analysis (MCA). The method involves three main steps: 1) generating basic features from network traffic, 2) using MCA to extract correlations between features and generate triangle area maps, and 3) using an anomaly-based detection mechanism to distinguish attacks from normal traffic based on differences from pre-generated normal profiles. The researchers evaluate their method on the KDD Cup 99 dataset and achieve moderate detection performance. However, they identify issues related to differences in feature scales that reduce detection of some attacks. They propose using statistical normalization to address this.
This document discusses detection of collision attacks in wireless sensor networks using rule-based packet flow rates. It proposes detection algorithms that monitor the packet flow rate to the base station node. The algorithms aim to have low false detection and tolerance rates and quickly detect attacks. Simulation results show the algorithms achieve these goals. The document also reviews related work on intrusion detection in wireless sensor networks.
a system for denial-of-service attack detection based on multivariate correla...swathi78
The document presents a denial-of-service (DoS) attack detection system based on multivariate correlation analysis. It uses MCA to accurately characterize network traffic by analyzing correlations between traffic features. The system employs anomaly-based detection to recognize both known and unknown attacks by learning only legitimate traffic patterns. It was evaluated on the KDD Cup 99 dataset and outperformed two other state-of-the-art approaches in detection accuracy. The system architecture includes modules for feature normalization, MCA, decision making, and evaluation.
1. The document proposes a threat modeling approach called "randomized seeding attack Model" to prevent attacks that could affect virtual machines in the cloud.
2. The model uses Fibonacci and Lucas number series to represent how attacks could randomly spread from one virtual machine to others in the cloud environment.
3. Key aspects of the model include using random Fibonacci sequences to represent the spreading of attacks, where each new virtual machine affected is represented by the next number in the sequence.
IRJET - A Secure Approach for Intruder Detection using BacktrackingIRJET Journal
This document summarizes a research paper that proposes a secure approach for intruder detection using backtracking. The approach detects intruders by analyzing network traffic and matching it to known attack patterns. If an abnormal behavior or attack is identified, an alert is sent to the administrator. When messages are sent between nodes, the receiver uses backtracking to check the transaction history and identify any differences in node keys that could indicate an intruder. This helps track down the intruder by analyzing previous transactions in the network.
Iaetsd a survey on detecting denial-of-service attacksIaetsd Iaetsd
The document describes a system for detecting denial-of-service (DoS) attacks using multivariate correlation analysis (MCA). The system analyzes network traffic characteristics by studying geometric correlations between traffic features. It employs anomaly-based detection to recognize known and unknown attacks by learning patterns of legitimate network traffic. The system first generates traffic records from basic features, then applies MCA using a triangle area approach to determine correlations between features. It generates normal traffic profiles during training and compares individual traffic records to profiles during testing to detect attacks. The system detects attacks at the individual sample level for more accurate classification compared to group-based detection mechanisms.
A system for denial of-service attack detection based on multivariate correla...IGEEKS TECHNOLOGIES
The document proposes a denial-of-service (DoS) attack detection system using multivariate correlation analysis (MCA) to accurately characterize network traffic. It extracts geometric correlations between network traffic features using triangle area maps. This anomaly-based system can detect both known and unknown DoS attacks by learning patterns in legitimate traffic. Evaluation on the KDD Cup 99 dataset shows it outperforms two previous state-of-the-art methods in detection accuracy.
Review of Security Issues in Mobile Wireless Sensor NetworksEswar Publications
MWSNs are finding applicability in wide range of applications. Applications spread from day to day utilities to military and surveillance, where they may sense information about vehicular movements around border. Considering the importance of data being sent by these nodes, threat of compromising them has also increased. This paper aims to explore various types of attacks and tries to classify them based on some common parameter. Better understanding of various attacks, their style of functioning and point of penetration can help researchers devise better preventive measures.
A DEFENSIVE MECHANISM CROSS LAYER ARCHITECTURE FOR MANETS TO IDENTIFY AND COR...IJNSA Journal
The document proposes a defensive cross-layer architecture for MANETs to identify and correct misbehavior in routing. The architecture has four levels: 1) Network topological level outlines basic node connections; 2) Routing level applies security to routing protocols and individual nodes, using a new Time On Demand Distance Vector (TODV) routing; 3) Detection level encrypts packets and uses acknowledgements to detect tampering; 4) Correction level calculates packet loss ratios to identify alternative routes when attacks are detected. The architecture aims to provide end-to-end security across three layers while maintaining network performance.
This document summarizes an article about intrusion detection systems (IDS) for secure mobile ad hoc networks (MANETs). It discusses the distributed and cooperative architecture of IDS for MANETs, where each node runs an IDS agent to detect intrusions locally and cooperate with other nodes. It describes several IDS approaches for MANETs including the Watchdog technique to detect misbehaving nodes, the Pathrater technique to find routes without those nodes, and the CORE technique which uses a collaborative reputation system. The document concludes that considering these IDS techniques can help make MANETs more secure.
SECURED AODV TO PROTECT WSN AGAINST MALICIOUS INTRUSIONIJNSA Journal
One of the security issues in Wireless Sensor Networks (WSN) is intrusion detection. In this paper, we propose a new defence mechanism based on the Ad hoc On-Demand Vector (AODV) routing protocol. AODV is a reactive protocol designed for ad hoc networks and has excellent flexibility to be adapted to a new secure version. The main objective of the proposed secured AODV routing protocol is to protect WSN against malicious intrusion and defend against adversary attacks. This secured AODV protocol works well with the WSN dynamics and topology changes due to limited available resources. It establishes secure multi-hop routing between sensor nodes with high confidence, integrity, and availability. The secured AODV utilizes an existing intrusion dataset that facilitates new collection from all the exchanged packets in the network. The protocol monitors end to end delay and avoid any additional overhead over message transfer between sensor nodes. The experimental results showed that this secured AODV could be used to fight against malicious attacks such as black hole attacks and avoid caused large transmission delays.
Wireless Sensor Networks: An Overview on Security Issues and ChallengesIJAEMSJORNAL
Wireless Sensor Networks (WSNs) are formed by deploying as large number of sensor nodes in an area for the surveillance of generally remote locations. A typical sensor node is made up of different components to perform the task of sensing, processing and transmitting data. WSNs are used for many applications in diverse forms from indoor deployment to outdoor deployment. The basic requirement of every application is to use the secured network. Providing security to the sensor network is a very challenging issue along with saving its energy. Many security threats may affect the functioning of these networks. WSNs must be secured to keep an attacker from hindering the delivery of sensor information and from forging sensor information as these networks are build for remote surveillance and unauthorized changes in the sensed data may lead to wrong information to the decision makers. This paper gives brief description about various security issues and security threats in WSNs.
A technical review and comparative analysis of machine learning techniques fo...IJECEIAES
Machine learning techniques are being widely used to develop an intrusion detection system (IDS) for detecting and classifying cyber attacks at the network-level and the host-level in a timely and automatic manner. However, Traditional Intrusion Detection Systems (IDS), based on traditional machine learning methods, lacks reliability and accuracy. Instead of the traditional machine learning used in previous researches, we think deep learning has the potential to perform better in extracting features of massive data considering the massive cyber traffic in real life. Generally Mobile Ad Hoc Networks have given the low physical security for mobile devices, because of the properties such as node mobility, lack of centralized management and limited bandwidth. To tackle these security issues, traditional cryptography schemes can-not completely safeguard MANETs in terms of novel threats and vulnerabilities, thus by applying Deep learning methods techniques in IDS are capable of adapting the dynamic environments of MANETs and enables the system to make decisions on intrusion while continuing to learn about their mobile environment. An IDS in MANET is a sensoring mechanism that monitors nodes and network activities in order to detect malicious actions and malicious attempt performed by Intruders. Recently, multiple deep learning approaches have been proposed to enhance the performance of intrusion detection system. In this paper, we made a systematic comparison of three models, Inceprtion architecture convolutional neural network (Inception-CNN), Bidirectional long short-term memory (BLSTM) and deep belief network (DBN) on the deep learning-based intrusion detection systems, using the NSL-KDD dataset containing information about intrusion and regular network connections, the goal is to provide basic guidance on the choice of deep learning models in MANET.
A hierarchical security framework for defending against sophisticated attacks...redpel dot com
A hierarchical security framework for defending against sophisticated attacks on wireless sensor networks in smart cities
for more ieee paper / full abstract / implementation , just visit www.redpel.com
A NOVEL TWO-STAGE ALGORITHM PROTECTING INTERNAL ATTACK FROM WSNSIJCNC
Wireless sensor networks (WSNs) consists of small nodes with constrain capabilities. It enables numerous
applications with distributed network infrastructure. With its nature and application scenario, security of
WSN had drawn a great attention. In malicious environments for a functional WSN, security mechanisms
are essential. Malicious or internal attacker has gained attention as the most challenging attacks to
WSNs. Many works have been done to secure WSN from internal attacks but most of them relay on either
training data set or predefined thresholds. It is a great challenge to find or gain knowledge about the
Malicious. In this paper, we develop the algorithm in two stages. Initially, Abnormal Behaviour
Identification Mechanism (ABIM) which uses cosine similarity. Finally, Dempster-Shafer theory (DST)is
used. Which combine multiple evidences to identify the malicious or internal attacks in a WSN. In this
method we do not need any predefined threshold or tanning data set of the nodes.
Secure intrusion detection and attack measure selection in virtual network sy...Uvaraj Shan
This document proposes NICE, a framework for secure intrusion detection and attack mitigation in virtual network systems. NICE uses distributed agents on cloud servers to monitor traffic, detect vulnerabilities, and generate attack graphs. It profiles virtual machines to identify their state and vulnerabilities. When potential attacks are detected, NICE can quarantine suspicious VMs and inspect their traffic. The attack analyzer correlates alerts, constructs attack graphs, and selects appropriate countermeasures based on the graphs. Evaluations show NICE can effectively detect attacks while minimizing performance overhead for the cloud system.
To Get any Project for CSE, IT ECE, EEE Contact Me @ 09849539085, 09966235788 or mail us - [email protected]¬m-Visit Our Website: www.finalyearprojects.org
A review of security attacks and intrusion detection schemes in wireless sens...ijwmn
Wireless sensor networks are currently the greatest innovation in the field of telecommunications. WSNs
have a wide range of potential applications, including security and surveillance, control, actuation and
maintenance of complex systems and fine-grain monitoring of indoor and outdoor environments. However
security is one of the major aspects of Wireless sensor networks due to the resource limitations of sensor
nodes. Those networks are facing several threats that affect their functioning and their life. In this paper we
present security attacks in wireless sensor networks, and we focus on comparison and analysis of recent
Intrusion Detection schemes in WSNs.
HYBRID ARCHITECTURE FOR DISTRIBUTED INTRUSION DETECTION SYSTEM IN WIRELESS NE...IJNSA Journal
This document proposes a hybrid architecture for a distributed intrusion detection system using multiple agents. The key aspects of the architecture include:
- Using multiple independent tracker agents that monitor hosts and generate reports sent to monitors and storage.
- Monitors analyze activity and compare to signatures to detect known attacks, or send data to anomaly detectors.
- Anomaly and misuse detectors use classification and pattern matching to detect known and unknown attacks.
- An inference module coordinates entities across hosts to classify new attacks using a knowledge base and signature generator.
- A countermeasure module alerts administrators and can take actions like dropping packets in response to detected attacks.
A New Way of Identifying DOS Attack Using Multivariate Correlation Analysisijceronline
This document summarizes a research paper that proposes a new method for identifying denial of service (DoS) attacks using multivariate correlation analysis (MCA). The method involves three main steps: 1) generating basic features from network traffic, 2) using MCA to extract correlations between features and generate triangle area maps, and 3) using an anomaly-based detection mechanism to distinguish attacks from normal traffic based on differences from pre-generated normal profiles. The researchers evaluate their method on the KDD Cup 99 dataset and achieve moderate detection performance. However, they identify issues related to differences in feature scales that reduce detection of some attacks. They propose using statistical normalization to address this.
This document discusses detection of collision attacks in wireless sensor networks using rule-based packet flow rates. It proposes detection algorithms that monitor the packet flow rate to the base station node. The algorithms aim to have low false detection and tolerance rates and quickly detect attacks. Simulation results show the algorithms achieve these goals. The document also reviews related work on intrusion detection in wireless sensor networks.
a system for denial-of-service attack detection based on multivariate correla...swathi78
The document presents a denial-of-service (DoS) attack detection system based on multivariate correlation analysis. It uses MCA to accurately characterize network traffic by analyzing correlations between traffic features. The system employs anomaly-based detection to recognize both known and unknown attacks by learning only legitimate traffic patterns. It was evaluated on the KDD Cup 99 dataset and outperformed two other state-of-the-art approaches in detection accuracy. The system architecture includes modules for feature normalization, MCA, decision making, and evaluation.
1. The document proposes a threat modeling approach called "randomized seeding attack Model" to prevent attacks that could affect virtual machines in the cloud.
2. The model uses Fibonacci and Lucas number series to represent how attacks could randomly spread from one virtual machine to others in the cloud environment.
3. Key aspects of the model include using random Fibonacci sequences to represent the spreading of attacks, where each new virtual machine affected is represented by the next number in the sequence.
IRJET - A Secure Approach for Intruder Detection using BacktrackingIRJET Journal
This document summarizes a research paper that proposes a secure approach for intruder detection using backtracking. The approach detects intruders by analyzing network traffic and matching it to known attack patterns. If an abnormal behavior or attack is identified, an alert is sent to the administrator. When messages are sent between nodes, the receiver uses backtracking to check the transaction history and identify any differences in node keys that could indicate an intruder. This helps track down the intruder by analyzing previous transactions in the network.
Iaetsd a survey on detecting denial-of-service attacksIaetsd Iaetsd
The document describes a system for detecting denial-of-service (DoS) attacks using multivariate correlation analysis (MCA). The system analyzes network traffic characteristics by studying geometric correlations between traffic features. It employs anomaly-based detection to recognize known and unknown attacks by learning patterns of legitimate network traffic. The system first generates traffic records from basic features, then applies MCA using a triangle area approach to determine correlations between features. It generates normal traffic profiles during training and compares individual traffic records to profiles during testing to detect attacks. The system detects attacks at the individual sample level for more accurate classification compared to group-based detection mechanisms.
A system for denial of-service attack detection based on multivariate correla...IGEEKS TECHNOLOGIES
The document proposes a denial-of-service (DoS) attack detection system using multivariate correlation analysis (MCA) to accurately characterize network traffic. It extracts geometric correlations between network traffic features using triangle area maps. This anomaly-based system can detect both known and unknown DoS attacks by learning patterns in legitimate traffic. Evaluation on the KDD Cup 99 dataset shows it outperforms two previous state-of-the-art methods in detection accuracy.
Review of Security Issues in Mobile Wireless Sensor NetworksEswar Publications
MWSNs are finding applicability in wide range of applications. Applications spread from day to day utilities to military and surveillance, where they may sense information about vehicular movements around border. Considering the importance of data being sent by these nodes, threat of compromising them has also increased. This paper aims to explore various types of attacks and tries to classify them based on some common parameter. Better understanding of various attacks, their style of functioning and point of penetration can help researchers devise better preventive measures.
A DEFENSIVE MECHANISM CROSS LAYER ARCHITECTURE FOR MANETS TO IDENTIFY AND COR...IJNSA Journal
The document proposes a defensive cross-layer architecture for MANETs to identify and correct misbehavior in routing. The architecture has four levels: 1) Network topological level outlines basic node connections; 2) Routing level applies security to routing protocols and individual nodes, using a new Time On Demand Distance Vector (TODV) routing; 3) Detection level encrypts packets and uses acknowledgements to detect tampering; 4) Correction level calculates packet loss ratios to identify alternative routes when attacks are detected. The architecture aims to provide end-to-end security across three layers while maintaining network performance.
This document summarizes an article about intrusion detection systems (IDS) for secure mobile ad hoc networks (MANETs). It discusses the distributed and cooperative architecture of IDS for MANETs, where each node runs an IDS agent to detect intrusions locally and cooperate with other nodes. It describes several IDS approaches for MANETs including the Watchdog technique to detect misbehaving nodes, the Pathrater technique to find routes without those nodes, and the CORE technique which uses a collaborative reputation system. The document concludes that considering these IDS techniques can help make MANETs more secure.
SECURED AODV TO PROTECT WSN AGAINST MALICIOUS INTRUSIONIJNSA Journal
One of the security issues in Wireless Sensor Networks (WSN) is intrusion detection. In this paper, we propose a new defence mechanism based on the Ad hoc On-Demand Vector (AODV) routing protocol. AODV is a reactive protocol designed for ad hoc networks and has excellent flexibility to be adapted to a new secure version. The main objective of the proposed secured AODV routing protocol is to protect WSN against malicious intrusion and defend against adversary attacks. This secured AODV protocol works well with the WSN dynamics and topology changes due to limited available resources. It establishes secure multi-hop routing between sensor nodes with high confidence, integrity, and availability. The secured AODV utilizes an existing intrusion dataset that facilitates new collection from all the exchanged packets in the network. The protocol monitors end to end delay and avoid any additional overhead over message transfer between sensor nodes. The experimental results showed that this secured AODV could be used to fight against malicious attacks such as black hole attacks and avoid caused large transmission delays.
Wireless Sensor Networks: An Overview on Security Issues and ChallengesIJAEMSJORNAL
Wireless Sensor Networks (WSNs) are formed by deploying as large number of sensor nodes in an area for the surveillance of generally remote locations. A typical sensor node is made up of different components to perform the task of sensing, processing and transmitting data. WSNs are used for many applications in diverse forms from indoor deployment to outdoor deployment. The basic requirement of every application is to use the secured network. Providing security to the sensor network is a very challenging issue along with saving its energy. Many security threats may affect the functioning of these networks. WSNs must be secured to keep an attacker from hindering the delivery of sensor information and from forging sensor information as these networks are build for remote surveillance and unauthorized changes in the sensed data may lead to wrong information to the decision makers. This paper gives brief description about various security issues and security threats in WSNs.
A technical review and comparative analysis of machine learning techniques fo...IJECEIAES
Machine learning techniques are being widely used to develop an intrusion detection system (IDS) for detecting and classifying cyber attacks at the network-level and the host-level in a timely and automatic manner. However, Traditional Intrusion Detection Systems (IDS), based on traditional machine learning methods, lacks reliability and accuracy. Instead of the traditional machine learning used in previous researches, we think deep learning has the potential to perform better in extracting features of massive data considering the massive cyber traffic in real life. Generally Mobile Ad Hoc Networks have given the low physical security for mobile devices, because of the properties such as node mobility, lack of centralized management and limited bandwidth. To tackle these security issues, traditional cryptography schemes can-not completely safeguard MANETs in terms of novel threats and vulnerabilities, thus by applying Deep learning methods techniques in IDS are capable of adapting the dynamic environments of MANETs and enables the system to make decisions on intrusion while continuing to learn about their mobile environment. An IDS in MANET is a sensoring mechanism that monitors nodes and network activities in order to detect malicious actions and malicious attempt performed by Intruders. Recently, multiple deep learning approaches have been proposed to enhance the performance of intrusion detection system. In this paper, we made a systematic comparison of three models, Inceprtion architecture convolutional neural network (Inception-CNN), Bidirectional long short-term memory (BLSTM) and deep belief network (DBN) on the deep learning-based intrusion detection systems, using the NSL-KDD dataset containing information about intrusion and regular network connections, the goal is to provide basic guidance on the choice of deep learning models in MANET.
A hierarchical security framework for defending against sophisticated attacks...redpel dot com
A hierarchical security framework for defending against sophisticated attacks on wireless sensor networks in smart cities
for more ieee paper / full abstract / implementation , just visit www.redpel.com
A NOVEL TWO-STAGE ALGORITHM PROTECTING INTERNAL ATTACK FROM WSNSIJCNC
Wireless sensor networks (WSNs) consists of small nodes with constrain capabilities. It enables numerous
applications with distributed network infrastructure. With its nature and application scenario, security of
WSN had drawn a great attention. In malicious environments for a functional WSN, security mechanisms
are essential. Malicious or internal attacker has gained attention as the most challenging attacks to
WSNs. Many works have been done to secure WSN from internal attacks but most of them relay on either
training data set or predefined thresholds. It is a great challenge to find or gain knowledge about the
Malicious. In this paper, we develop the algorithm in two stages. Initially, Abnormal Behaviour
Identification Mechanism (ABIM) which uses cosine similarity. Finally, Dempster-Shafer theory (DST)is
used. Which combine multiple evidences to identify the malicious or internal attacks in a WSN. In this
method we do not need any predefined threshold or tanning data set of the nodes.
Secure intrusion detection and attack measure selection in virtual network sy...Uvaraj Shan
This document proposes NICE, a framework for secure intrusion detection and attack mitigation in virtual network systems. NICE uses distributed agents on cloud servers to monitor traffic, detect vulnerabilities, and generate attack graphs. It profiles virtual machines to identify their state and vulnerabilities. When potential attacks are detected, NICE can quarantine suspicious VMs and inspect their traffic. The attack analyzer correlates alerts, constructs attack graphs, and selects appropriate countermeasures based on the graphs. Evaluations show NICE can effectively detect attacks while minimizing performance overhead for the cloud system.
A Survey on Hidden Markov Model (HMM) Based Intention Prediction TechniquesIJERA Editor
This document summarizes a research paper on using hidden Markov models to predict security threats and attacks in cloud computing systems. It discusses two approaches: 1) Integrating ongoing attack detection, automatic prevention actions, and risk measurement into an autonomic cloud intrusion detection framework using a hidden Markov prediction model. 2) Using hidden Markov models to detect sequences of anomalous behaviors in system logs that may indicate an attack plan over a period of time. The document provides background on hidden Markov models and how they can be applied to modeling threat sequences and states in a cloud system to provide early warnings of potential attacks.
A Survey on Hidden Markov Model (HMM) Based Intention Prediction Techniques IJERA Editor
The extensive use of virtualization in implementing cloud infrastructure brings unrivaled security concerns for
cloud tenants or customers and introduces an additional layer that itself must be completely configured and
secured. Intruders can exploit the large amount of cloud resources for their attacks.
This paper discusses two approaches In the first three features namely ongoing attacks, autonomic prevention
actions, and risk measure are Integrated to our Autonomic Cloud Intrusion Detection Framework (ACIDF) as
most of the current security technologies do not provide the essential security features for cloud systems such as
early warnings about future ongoing attacks, autonomic prevention actions, and risk measure. The early
warnings are signaled through a new finite State Hidden Markov prediction model that captures the interaction
between the attackers and cloud assets. The risk assessment model measures the potential impact of a threat on
assets given its occurrence probability. The estimated risk of each security alert is updated dynamically as the
alert is correlated to prior ones. This enables the adaptive risk metric to evaluate the cloud’s overall security
state. The prediction system raises early warnings about potential attacks to the autonomic component,
controller. Thus, the controller can take proactive corrective actions before the attacks pose a serious security
risk to the system.
In another Attack Sequence Detection (ASD) approach as Tasks from different users may be performed on the
same machine. Therefore, one primary security concern is whether user data is secure in cloud. On the other
hand, hacker may facilitate cloud computing to launch larger range of attack, such as a request of port scan in
cloud with multiple virtual machines executing such malicious action. In addition, hacker may perform a
sequence of attacks in order to compromise his target system in cloud, for example, evading an easy-to-exploit
machine in a cloud and then using the previous compromised to attack the target. Such attack plan may be
stealthy or inside the computing environment, so intrusion detection system or firewall has difficulty to identify
it.
Machine learning techniques applied to detect cyber attacks on web applicationsVenkat Projects
This document discusses using machine learning techniques to detect cyber attacks on web applications. It proposes using a graph-based approach and regular expressions to model normal HTTP request behavior during a learning phase. This would establish a baseline for detecting anomalies and potential attacks. Existing approaches are also reviewed that use algorithms like NSG, LSEG and F-Sign to generate signatures for detecting malware based on network traffic patterns or software code. Supervised machine learning methods have also been applied using features extracted from network data and classifiers like k-NN, Naive Bayes and neural networks. The proposed system would adapt this machine learning paradigm to specifically detect attacks on web applications.
Machine learning techniques applied to detect cyber attacks on web applicationsVenkat Projects
Machine learning techniques applied to detect cyber attacks on web applications
The increased usage of cloud services, growing number of web applications users, changes in network infrastructure that connects devices running mobile operating systems and constantly evolving network technology cause novel challenges for cyber security. As a result, to counter arising threats, network security mechanisms, sensors and protection schemes also have to evolve, to address the needs and problems of the users. In this article, we focus on countering emerging application layer cyber attacks since those are listed as top threats and the main challenge for network and cyber security. The major contribution of the article is the proposition of machine learning approach to model normal behaviour of application and to detect cyber attacks. The model consists of patterns (in form of Perl Compatible Regular Expressions (PCRE) regular expressions) that are obtained using graph-based segmentation technique and dynamic programming. The model is based on information obtained from HTTP requests generated by client to a web server. We have evaluated our method on CSIC 2010 HTTP Dataset achieving satisfactory results.
Cyber-Defensive Architecture for Networked Industrial Control SystemsIJEACS
This paper deals with the inevitable consequence of the convenience and efficiency we benefit from the open, networked control system operation of safety-critical applications: vulnerability to such system from cyber-attacks. Even with numerous metrics and methods for intrusion detection and mitigation strategy, a complete detection and deterrence of internal code flaws and outside cyber-attacks has not been found and would not be found anytime soon. Considering the ever incompleteness of detection and prevention and the impact and consequence of mal-functions of the safety-critical operations caused by cyber incidents, this paper proposes a new computer control system architecture which assures resiliency even under compromised situations. The proposed architecture is centered on diversification of hardware systems and unidirectional communication from the proposed system in alerting suspicious activities to upper layers. This paper details the architectural structure of the proposed cyber defensive computer control system architecture for power substation applications and its validation in lab experimentation and on a cybersecurity testbed.
Hybrid Technique for Detection of Denial of Service (DOS) Attack in Wireless ...Eswar Publications
Wireless Sensor Network (WSNs) are deployed at aggressive environments which are vulnerable to various security attacks such as Wormholes, Denial of Attacks and Sybil Attacks. There are various intrusion detection techniques that are used to identify attacks in a network with high accuracy level. This paper has focused on Denial of Service attack, since it is the most common attack that affects the environment severely. Therefore a new hybrid technique combining Hidden Markov Model with Ant Colony Optimization (HMM+ACO) has been
proposed that gives improved performance than the other techniques.
USE OF MARKOV CHAIN FOR EARLY DETECTING DDOS ATTACKSIJNSA Journal
DDoS has a variety of types of mixed attacks. Botnet attackers can chain different types of DDoS attacks to confuse cybersecurity defenders. In this article, the attack type can be represented as the state of the model. Considering the attack type, we use this model to calculate the final attack probability. The final attack probability is then converted into one prediction vector, and the incoming attacks can be detected early before IDS issues an alert. The experiment results have shown that the prediction model that can make multi-vector DDoS detection and analysis easier.
The document discusses security mechanisms for spontaneous networks. It begins with an overview of the growth of mobile communications and challenges in configuring services and providing security in spontaneous networks that imitate human relationships. Key management schemes are needed for node authorization and user authentication in mobile ad hoc networks. Existing methods require initial configuration or external authorities. The proposed system aims to reduce dependence on a central authority for re-authentication to avoid possible attacks, increase performance by reducing server utilization, and implement a workload mechanism for efficient server usage.
The document proposes a security model for wireless sensor networks using zero knowledge protocol. It addresses security threats like cloning attacks, man-in-the-middle attacks, and replay attacks. The model uses a unique fingerprint for each node based on its neighboring nodes to detect cloning. It also uses zero knowledge protocol for sensor nodes to verify authenticity without transmitting cryptographic information, preventing man-in-the-middle and replay attacks. The paper analyzes the performance and security of the proposed model.
Malware Detection in Cloud Computing Infrastructures
malware detection whole design and working in a short ppt effectively explaining the criteria and infrastructure
Supervisory control and data acquisition (SCADA) are applications that collect data from a system in order to automate the monitoring and controlling of its activities. Several industrial fields such as, electric utilities, water supplies and buildings' facilities have already adopted SCADA systems to increase the efficiency and reduce cost. However, the IT community is concerned about the level of security that any applied SCADA system provides. This paper concentrates on the major security threats encountered in SCADA systems. In addition, it discusses a new proposed methodology in order to increase the system security with minimal impact on efficiency. The proposed scheme provides several security services which are mutual authentication, confidentiality, data integrity and accountability.
This document discusses security challenges that arise in virtual machine based computing environments. It identifies issues such as rapid scaling of virtual machines, transience of machines, non-linear software lifecycles due to rolling back machines, and difficulties establishing machine identity. It proposes moving security functions like firewalling and virus scanning from guest operating systems to a ubiquitous virtualization layer to help address problems of scale, mobility and enforcing security policies across diverse and transient virtual machines.
Broadband network virus detection system based on bypass monitorUltraUploader
The document describes a Broadband Network Virus Detection System (VDS) based on bypass monitoring that can detect viruses on high-speed networks. The VDS uses four detection engines to analyze network traffic for viruses based on binary content, URLs, emails, and scripts. It accurately logs statistical information on detected viruses like name, source/target IPs, and spread frequency. The VDS mirrors network traffic to a detection engine in real-time without needing to reassemble packets into files. This allows it to efficiently detect viruses directly in network packets or data streams on gigabit-speed networks.
Vulnerability Analysis of 802.11 Authentications and Encryption Protocols: CV...AM Publications
This paper analysis vulnerability of known attacks on WLAN cipher suite, authentication mechanisms and credentials using common vulnerability scoring system (CVSS).
A Study On Countermeasures Against Computer Virus Propagation Using An Agent-...Sara Perez
This document describes a study that uses an agent-based simulation approach to model the propagation of computer viruses and evaluate potential countermeasures. The study models a computer network as spots that agents (computers) can move between. Computer states include virus infection levels and data/OS status. A simulation tracks the movement of agents and changes in their states over time according to probabilistic infection, detection, and countermeasure scenarios. The simulation aims to analyze virus spread when an infected computer connects to an intranet and evaluate how disconnection or security patches affect protection.
This document summarizes a research paper that models the reliability of a cyber-physical system (CPS) with intrusion detection and response systems. It describes the reference CPS model, which includes mobile sensor nodes and a control unit. It also outlines the security failure models, attack models including persistent, random and insidious attackers, and the host-level and system-level intrusion detection techniques used. These include behavior rule specification and vector similarity specification for host detection, and majority voting for system detection. Parameters for the detection accuracy are defined. The goal is to maximize CPS lifetime by setting detection and response strengths to balance energy usage and intrusion tolerance.
An efficient tree based self-organizing protocol for internet of thingsredpel dot com
An efficient tree based self-organizing protocol for internet of things.
for more ieee paper / full abstract / implementation , just visit www.redpel.com
Validation of pervasive cloud task migration with colored petri netredpel dot com
The document describes a study that used Colored Petri Nets (CPN) to model and simulate task migration in pervasive cloud computing environments. The study made the following contributions:
1) It expanded the semantics of CPN to include context information, creating a new CPN model called CCPN.
2) Using CCPN, it constructed two task migration models - one that considered context and one that did not - to simulate task migration in a pervasive cloud based on the OSGi framework.
3) It simulated the two models in CPN Tools and evaluated them based on metrics like task migration accessibility, integrity of the migration process, and system reliability and stability after migration. It also
Web Service QoS Prediction Based on Adaptive Dynamic Programming Using Fuzzy ...redpel dot com
The document proposes a novel approach for predicting quality of service (QoS) metrics for cloud services. The approach combines fuzzy neural networks and adaptive dynamic programming (ADP) for improved prediction accuracy. Specifically, it uses an adaptive-network-based fuzzy inference system (ANFIS) to extract fuzzy rules from QoS data and employ ADP for online parameter learning of the fuzzy rules. Experimental results on a large QoS dataset demonstrate the prediction accuracy of this approach. The approach also provides a convergence proof to guarantee stability of the neural network weights during training.
Towards a virtual domain based authentication on mapreduceredpel dot com
This document proposes a novel authentication solution for MapReduce (MR) models deployed in public clouds. It begins by describing the MR model and job execution workflow. It then discusses security issues with deploying MR in open environments like clouds. Next, it specifies requirements for an MR authentication service, including entity identification, credential revocation, and authentication of clients, MR components, and data. It analyzes existing MR authentication methods and finds they do not fully address the needs of cloud-based MR deployments. The paper then proposes a new "layered authentication solution" with a "virtual domain based authentication framework" to better satisfy the requirements.
Privacy preserving and delegated access control for cloud applicationsredpel dot com
Privacy preserving and delegated access control for cloud applications
for more ieee paper / full abstract / implementation , just visit www.redpel.com
Performance evaluation and estimation model using regression method for hadoo...redpel dot com
Performance evaluation and estimation model using regression method for hadoop word count.
for more ieee paper / full abstract / implementation , just visit www.redpel.com
Frequency and similarity aware partitioning for cloud storage based on space ...redpel dot com
Frequency and similarity aware partitioning for cloud storage based on space time utility maximization model.
for more ieee paper / full abstract / implementation , just visit www.redpel.com
Multiagent multiobjective interaction game system for service provisoning veh...redpel dot com
Multiagent multiobjective interaction game system for service provisoning vehicular cloud
for more ieee paper / full abstract / implementation , just visit www.redpel.com
Efficient multicast delivery for data redundancy minimization over wireless d...redpel dot com
Efficient multicast delivery for data redundancy minimization over wireless data centers
for more ieee paper / full abstract / implementation , just visit www.redpel.com
Cloud assisted io t-based scada systems security- a review of the state of th...redpel dot com
Cloud assisted io t-based scada systems security- a review of the state of the art and future challenges.
for more ieee paper / full abstract / implementation , just visit www.redpel.com
I-Sieve: An inline High Performance Deduplication System Used in cloud storageredpel dot com
I-Sieve: An inline High Performance Deduplication System Used in cloud storage
for more ieee paper / full abstract / implementation , just visit www.redpel.com
Architecture harmonization between cloud radio access network and fog networkredpel dot com
Architecture harmonization between cloud radio access network and fog network
for more ieee paper / full abstract / implementation , just visit www.redpel.com
A tutorial on secure outsourcing of large scalecomputation for big dataredpel dot com
A tutorial on secure outsourcing of large scalecomputation for big data
for more ieee paper / full abstract / implementation , just visit www.redpel.com
A parallel patient treatment time prediction algorithm and its applications i...redpel dot com
A parallel patient treatment time prediction algorithm and its applications in hospital.
for more ieee paper / full abstract / implementation , just visit www.redpel.com
A distributed video management cloud platform using hadoopredpel dot com
This document describes a distributed video management cloud platform using Hadoop. The platform utilizes Hadoop's parallel processing and flexible storage capabilities to efficiently store and process large amounts of video data. It integrates J2EE, Flex, Red5 streaming media server, and Hadoop to provide a user-friendly interface for managing videos. The platform is evaluated and shown to satisfy the requirements of massive video data management through optimized MapReduce processing of video tasks like encoding, decoding, and background subtraction.
How to Customize Your Financial Reports & Tax Reports With Odoo 17 AccountingCeline George
The Accounting module in Odoo 17 is a complete tool designed to manage all financial aspects of a business. Odoo offers a comprehensive set of tools for generating financial and tax reports, which are crucial for managing a company's finances and ensuring compliance with tax regulations.
How to Set warnings for invoicing specific customers in odooCeline George
Odoo 16 offers a powerful platform for managing sales documents and invoicing efficiently. One of its standout features is the ability to set warnings and block messages for specific customers during the invoicing process.
Geography Sem II Unit 1C Correlation of Geography with other school subjectsProfDrShaikhImran
The correlation of school subjects refers to the interconnectedness and mutual reinforcement between different academic disciplines. This concept highlights how knowledge and skills in one subject can support, enhance, or overlap with learning in another. Recognizing these correlations helps in creating a more holistic and meaningful educational experience.
This presentation was provided by Bill Kasdorf of Kasdorf & Associates LLC and Publishing Technology Partners, during the fifth session of the NISO training series "Accessibility Essentials." Session Five: A Standards Seminar, was held May 1, 2025.
Odoo Inventory Rules and Routes v17 - Odoo SlidesCeline George
Odoo's inventory management system is highly flexible and powerful, allowing businesses to efficiently manage their stock operations through the use of Rules and Routes.
How to Manage Purchase Alternatives in Odoo 18Celine George
Managing purchase alternatives is crucial for ensuring a smooth and cost-effective procurement process. Odoo 18 provides robust tools to handle alternative vendors and products, enabling businesses to maintain flexibility and mitigate supply chain disruptions.
Real GitHub Copilot Exam Dumps for SuccessMark Soia
Download updated GitHub Copilot exam dumps to boost your certification success. Get real exam questions and verified answers for guaranteed performance
Title: A Quick and Illustrated Guide to APA Style Referencing (7th Edition)
This visual and beginner-friendly guide simplifies the APA referencing style (7th edition) for academic writing. Designed especially for commerce students and research beginners, it includes:
✅ Real examples from original research papers
✅ Color-coded diagrams for clarity
✅ Key rules for in-text citation and reference list formatting
✅ Free citation tools like Mendeley & Zotero explained
Whether you're writing a college assignment, dissertation, or academic article, this guide will help you cite your sources correctly, confidently, and consistent.
Created by: Prof. Ishika Ghosh,
Faculty.
📩 For queries or feedback: [email protected]
This chapter provides an in-depth overview of the viscosity of macromolecules, an essential concept in biophysics and medical sciences, especially in understanding fluid behavior like blood flow in the human body.
Key concepts covered include:
✅ Definition and Types of Viscosity: Dynamic vs. Kinematic viscosity, cohesion, and adhesion.
⚙️ Methods of Measuring Viscosity:
Rotary Viscometer
Vibrational Viscometer
Falling Object Method
Capillary Viscometer
🌡️ Factors Affecting Viscosity: Temperature, composition, flow rate.
🩺 Clinical Relevance: Impact of blood viscosity in cardiovascular health.
🌊 Fluid Dynamics: Laminar vs. turbulent flow, Reynolds number.
🔬 Extension Techniques:
Chromatography (adsorption, partition, TLC, etc.)
Electrophoresis (protein/DNA separation)
Sedimentation and Centrifugation methods.
Link your Lead Opportunities into Spreadsheet using odoo CRMCeline George
In Odoo 17 CRM, linking leads and opportunities to a spreadsheet can be done by exporting data or using Odoo’s built-in spreadsheet integration. To export, navigate to the CRM app, filter and select the relevant records, and then export the data in formats like CSV or XLSX, which can be opened in external spreadsheet tools such as Excel or Google Sheets.
How to manage Multiple Warehouses for multiple floors in odoo point of saleCeline George
The need for multiple warehouses and effective inventory management is crucial for companies aiming to optimize their operations, enhance customer satisfaction, and maintain a competitive edge.
Understanding P–N Junction Semiconductors: A Beginner’s GuideGS Virdi
Dive into the fundamentals of P–N junctions, the heart of every diode and semiconductor device. In this concise presentation, Dr. G.S. Virdi (Former Chief Scientist, CSIR-CEERI Pilani) covers:
What Is a P–N Junction? Learn how P-type and N-type materials join to create a diode.
Depletion Region & Biasing: See how forward and reverse bias shape the voltage–current behavior.
V–I Characteristics: Understand the curve that defines diode operation.
Real-World Uses: Discover common applications in rectifiers, signal clipping, and more.
Ideal for electronics students, hobbyists, and engineers seeking a clear, practical introduction to P–N junction semiconductors.
Understanding P–N Junction Semiconductors: A Beginner’s GuideGS Virdi
An anomalous behavior detection model in cloud computing
1. TSINGHUA SCIENCE AND TECHNOLOGY
ISSNll1007-0214ll08/11llpp322–332
Volume 21, Number 3, June 2016
An Anomalous Behavior Detection Model in Cloud Computing
Xiaoming Ye, Xingshu Chen , Haizhou Wang, Xuemei Zeng, Guolin Shao, Xueyuan Yin, and Chun Xu
Abstract: This paper proposes an anomalous behavior detection model based on cloud computing. Virtual
Machines (VMs) are one of the key components of cloud Infrastructure as a Service (IaaS). The security of such
VMs is critical to IaaS security. Many studies have been done on cloud computing security issues, but research into
VM security issues, especially regarding VM network traffic anomalous behavior detection, remains inadequate.
More and more studies show that communication among internal nodes exhibits complex patterns. Communication
among VMs in cloud computing is invisible. Researchers find such issues challenging, and few solutions have
been proposed—leaving cloud computing vulnerable to network attacks. This paper proposes a model that uses
Software-Defined Networks (SDN) to implement traffic redirection. Our model can capture inter-VM traffic, detect
known and unknown anomalous network behaviors, adopt hybrid techniques to analyze VM network behaviors, and
control network systems. The experimental results indicate that the effectiveness of our approach is greater than
90%, and prove the feasibility of the model.
Key words: virtual machine; network behavior; anomaly detection; cloud computing
1 Introduction
Cloud computing infrastructure is a hybrid networking
system, that integrates hybrid technology, hybrid
operating systems, and hybrid hardware. Cloud
computing aims to provide on-demand, low-cost,
high-performance computing resources, and leverages
virtualization technologies to deliver storage, server,
network services, CPU, and memory[1]
.
Cloud computing has to face traditional security
threats and new generations of security threats. Cloud
computing vulnerabilities include core technology
vulnerabilities (e.g., Web applications and services,
virtualization, and cryptography), essential cloud
characteristic vulnerabilities (e.g., unauthorized
Xiaoming Ye, Xingshu Chen, Haizhou Wang, Xuemei
Zeng, Guolin Shao, Xueyuan Yin, and Chun Xu are with
the College of Computer Science, Cybersecurity Research
Institute, Sichuan University, Chengdu 610065, China. E-mail:
[email protected]; [email protected]; whzh.nc@scu.
edu.cn; [email protected]; [email protected]; yinxueyuan@
msn.com; [email protected].
To whom correspondence should be addressed.
Manuscript received: 2016-01-09; accepted: 2016-03-07
access to management interfaces, Internet protocol
vulnerabilities, etc.), and defects in known security
controls, and prevalent vulnerabilities (e.g., injection
vulnerabilities and weak authentication schemes)[2]
.
Attackers find vulnerabilities and use them to undertake
attacks. There have been many attacks against virtual
machines on cloud computing platforms, such as
various port scanning attack, attacks on hypervisors,
attacks on virtualization, backdoor channel attacks,
flooding attacks, user-to-root attacks, and insider
attacks (e.g., internal denial-of-service attacks via
zombies in the cloud)[3]
.
Virtualization technology is a core technology in
cloud computing. Virtual Machines (VMs) are key
components of cloud infrastructure. For example,
virtualization technology enables the execution of
multiple operating system environments, or VM
instances, on a single hardware system. Each VM
owns an operating system and applications. A
VM executes programs like a physical machine.
Cloud computing contains both physical and virtual
networks[4]
. Virtualization creates blind spots of
network traffic, or invisible networks, in the same
server infrastructure. Gartner[5]
represented six of the
www.redpel.com +917620593389
www.redpel.com +917620593389
2. Xiaoming Ye et al.: An Anomalous Behavior Detection Model in Cloud Computing 323
most common virtualization security risks, including
noting that “the lack of visibility and controls
on internal virtual networks created for VM-to-
VM communications blinds existing security policy
enforcement mechanisms”. He said that more than 60%
of virtual machines in production are less secure than
their physical counterparts. VMs are losing their ability
to detect and control this communication. Attacks and
data can move through the VMs without ever going out
to the physical network, which means these attacks will
not be detected by traditional tools. To deal with this
vulnerability, making all VM communications traffic
visible is the first problem that needs to be solved.
Currently, the challenge is how to establish an
effective network behavior detection system for each
VM in a cloud computing network, so that it can
accurately identify deviations from normal network
behavior of the virtual machines, and reduce cloud
security risks.
This paper proposes a model to detect anomaly
behavior for the VMs in cloud computing. This
model is a time-varying system with a number of
network traffic features. Here are the main work and
contributions of this paper:
Communications among VMs in cloud are
invisible. The model uses Software-Defined Networks
(SDN) to build a virtual network, so that the virtual
switch network traffic is through the physical network
card, then to the node where the deployed system
resides.
The model aims to detect known and unknown
anomalous behaviors.
This paper designs a control model, and adopts
hybrid techniques to analyze VM network behaviors
and control network systems.
The remainder of this paper is organized as follows.
Section 2 introduces state machine definitions and
components of the model and methods of state
analysis. Section 3 introduces Snort, data processing,
application behavior analysis, and decision analysis.
The algorithm and technologies used in this paper are
also discussed. Experiments were conducted and the
results are discussed in Section 4. Conclusions and
future work are presented in Section 5.
2 Model Overview
2.1 State definitions
Network behavior has various forms and means of
changing characteristics. We cannot describe and
identify all the anomalous behaviors of networks but
can describe states that characterize a VM under attack.
Before the attack, a malicious user tries to scan VMs
and search for vulnerabilities or ports to find the cloud
computing infrastructure security “holes”. The attacker
then has a planned, purposeful, step-by-step process to
undertake the attack, including an attack action plan,
tests, and a complete attack process. Normal VM
network behavior is a state of dynamic equilibrium.
Network attacks will affect this state, which is defined
as follows:
Definition 1 (Homeostasis, S1): Currently, the
virtual machine is running properly, the network traffic
situation is in dynamic equilibrium. Virtual machines
have vulnerabilities and other security threats, but they
have not been detected or used.
Definition 2 (Before imbalances, S2): Suppose
anomalous behaviors of network traffic are detected,
such as vulnerability scanning. In this state, VM
security threats have been detected, but have not yet
been utilized by an attacker.
Definition 3 (Imbalances early, S3): Suppose
anomalous network traffic behaviors are detected more
than once. An attacker has detected vulnerabilities in
the virtual machine, and exploited them.
Definition 4 (Imbalance, S4): Network traffic
anomalies are repeatedly detected. The VM is under
continuous cyber-attacks.
Figure 1 depicts the transition of virtual machine
states under attack. The sequence starts at state S1.
Attack behaviors make VM state S1 activate states
S2, S3, and S4. When anomalous behavior has been
controlled, the VM state returns to a state of dynamic
equilibrium.
Fig. 1 VM state transition.
www.redpel.com +917620593389
www.redpel.com +917620593389
3. 324 Tsinghua Science and Technology, June 2016, 21(3): 322–332
Through application behavior analysis, the model
determines whether or not application behavior deviates
from normal. According to this, the model can be used
to describe VM state transitions. The details of its
algorithm will be given in Section 2:3.
2.2 Components
This paper proposes a cloud computing anomalous
behavior detection model. The model can detect known
and unknown anomalous behaviors. Hybrid techniques
are used to detect anomalies. The model determines
whether the network behavior of a virtual machine
deviates from normal.
Figure 2 describes the model components and
detection processes. This model consists of VM
profiles, Snort, data processing, application behavior
analysis, state analysis modules, and decision analysis.
The VM profile module is a dataset used to store
and manage VM profiles based on traffic analysis.
Application behavior states are used to build a set of
VM profiles. The information includes the services, the
software version number, open port, IP address, MAC
address, and rules. In addition, it also includes rules for
communication among virtual machines, and between
virtual machines and physical machines. These profiles
include VM security rules among other features.
VM network traffic passes through Snort first. This
module is used to detect known anomalous behaviors.
Fig. 2 Model components.
Snort uses detection rules based on signature. The
model first executes a Snort module, which provides
known anomaly detection, improves the detection rate,
and reduces the computational cost. Then network
traffic flows into the next detection module. The Snort
model not only uses the known anomaly behavior rule
base, but also reduces the volume of traffic that must be
processed in the next module.
The model then performs application behavior
analysis. This module has two parts. In the first
part, traffic classification is performed to identify
applications. This part manipulates the training
examples and produces multiple classifiers to improve
the application classification accuracy. In the second
part, the application behavior analysis module uses
time series to build a baseline for each application.
Considering the normal network behavior of VMs,
time series analysis is used. For example, people
work during the day and rest at night. People work
from Monday to Friday and rest on Saturday and
Sunday. Other regular behaviors include data backup,
“application heartbeat”, and periodic behaviors that
are repeated. This module aims to detect unknown
anomalous behaviors. So the properties of applications
for each VM are stored. The algorithm of this module
is given below.
Finally, the results of detection from Snort and
the application behavior analysis module are saved
as anomaly records. In order to improve detection
accuracy, the decision analysis module uses the records
for in-depth analysis. The algorithm is below.
After the application behavior analysis, the VM
profile information is updated. According to this, the
model can describe the states of the VMs in cloud. The
formulas are described below.
2.3 State analysis
VM profiles have summary information about each VM
in the cloud collected from traffic. For each application,
detection results from Snort and behavior analysis are
added to the VM profiles. Other information includes
number of services, open port number, number of flows,
number of outgoing connections, number of incoming
connections, maximum value of each connection,
and duration. In addition, it also includes rules for
communication between virtual machines, as well as for
communication between virtual machines and physical
machines.
Ak represents the anomalous performance of the k-
www.redpel.com +917620593389
www.redpel.com +917620593389
4. Xiaoming Ye et al.: An Anomalous Behavior Detection Model in Cloud Computing 325
th VM in the cloud as discussed in Section 2.1. In this
method, the state of each VM is shown in three forms
A.1/
, A.2/
, and A.3/
. Its value is calculated by Eq. (1),
where n.t/ is the random noise, and r1, r2, and r3 are
parameters. vmk denotes the weight of the k-th VM
using Eq. (20). A.1/
represents the degree of deviation
of traffic periodicity of the VM using Eq. (6). A.2/
denotes the anomalous status of known applications
(app) using Eq. (11). A.3/
denotes anomalous status
of unknown applications (uapp) using Eq. (12).
The anomalous performance of VMs is
Ak D vmk.r1A.1/
C r2A.2/
C r3A.3/
/ C n.t/ (1)
Here’s how to compute A.1/
. A VM profile is a time-
varying matrix with network traffic features that can
describe the state of network traffic. A time series is
a sequence of data usually at regular intervals of time
during a specific period. The most important feature
of this type of data is that neighboring observations are
dependent on each other. This paper takes into account
history data before time T .T1, T2, and T3 are three
adjacent time before detection time T ), but also last
week’s value WT, last month’s value MT, and last years
value YT at each observing time as shown in Fig. 2.
Thus, in Eq. (2), here are six values associated with
given time, where m represents the total number of
observation characteristics. Create a time matrix Stvm
as follows:
Stvm D
0
B
@
w11 : : : w16
:::
:::
:::
wm1 : : : wm6
1
C
A (2)
Build a vector base on each time window Wi at
time t, where W1 represents T1, W2 represents T2, W3
represents T3, W4 represents WT, W5 represents MT,
and W6 represents YT.
Wi D .w1i ; w2i ; :::; wmi /T
(3)
Stvm D .W1; W2; W3; W4; W5; W6/ (4)
The model then uses Euclidean distance to measure
the transformation. It means the likelihood of an
anomalous VM state performance can be expressed by
the distance spanned by the time window vector. The
Euclidean distance can be expressed as
dist.Wi ; Wj / D
v
u
u
t
mX
kD1
.wki wkj /2 (5)
A weight ˇi is associated with each time window to
express its importance in relation to time T.
A.1/
D
1
6
6X
iD1
.ˇi dist.WT ; Wi // (6)
Here’s how to compute A.2/
. In the following
equations appi represents the i-th application. The
likelihood of anomalous application performance can
be expressed in detail by considering factors such as the
probability of presence of the application in traffic:
Fi DPrfappi g Prfanomalyjappi g D
Prfappi g fappi is suspiciousjappi g
Prfappi is anonalousjappi is suspiciousg D
F1i F2i F3i D
3Y
j D1
Fji (7)
In Eq. (7), Fi denotes the status of the i-th
application, which consists of three viewpoints F1i ,
F2i , and F3i . F1i represents the probability of the i-
th application in traffic, F2i represents the probability
of a detected anomaly in Snort or application behavior
analysis in the i-th application, but not in the results
of the decision analysis module. F3i represents the
probability of an anomaly being found in the decision
analysis module. F1i , F2i , and F3i can be calculated
by Eqs. (8) – (10).
F1i D
Number of connections to appi
Total number of connections
(8)
F2i D
Number of anomaly alert appi
Number of connections to appi
(9)
F3i D
Number of anomaly appi
Number of anomaly alert appi
(10)
A weight is associated with the importance of the
appi . k represents the number of the applications. The
normalized A.2/
from Eqs. (8) – (10) can be given as
A.2/
D
1
1 C e
kP
iD1
i
3Q
jD1
Fji
(11)
Below is the formula for computing A.3/
. The
likelihood of anomalous behavior in unknown
applications (uapp) can be expressed by considering
factors such as the probability of presence of the
unknown applications in traffic:
A.3/
D Prfuappg Prfanomalyjuappg D N1 N2
(12)
N1 D
Number of connections to uapp
Total number of connections
(13)
N2 D
Number of alerts to uapp
Total number of alerts
(14)
So the anomalous performance of the k-th VM from
www.redpel.com +917620593389
www.redpel.com +917620593389
5. 326 Tsinghua Science and Technology, June 2016, 21(3): 322–332
Eqs. (6), (11), and (12) can be calculated by Eq. (15).
Ak Dvmk
r1
n
nX
iD1
.ˇi dist.Wt ; Wi //C
r2
1 C e
kP
iD1
i
Q3
jD1 Fji
C r3
2Y
iD1
Ni
!
C n.t/ (15)
Even a single VM is considered important in the cloud
if it is connected to many VMs, which multiply the
impact of each VM. vmk is an impact factor associated
with the VM’s importance in the cloud. Now we show
how to compute vmk.
Figure 3 shows a sample connection graph. Each
node represents a VM, where Vk denotes the k-th VM,
and Pj denotes the j-th port of the VM. A connection
between V1 and V3 exists if a flow record having these
addresses is observed. Between nodes V1 and V3 there
are three edges representing three flow records from IP
address V1 to IP address V3 with different port numbers.
According to given sample, there are three edges
between V1 and V3. The vector V.k/
represents the
connections of the k-th VM with other VMs, where
V.1/
, V.2/
, and V.3/
can be expressed by Eqs. (16) –
(18). The matrix V3 3 denoting the connections of the
three VMs, is expressed by Eq. (19).
V.1/
D . 0 0 3 /T
(16)
V.2/
D . 0 0 2 /T
(17)
V.3/
D . 3 2 0 /T
(18)
V3 3 D .V.1/
; V.2/
; V.3/
/ D
0
B
@
0 0 3
0 0 2
3 2 0
1
C
A (19)
The normalized vmk can be calculated by Eq. (20),
where u represents the total number of VMs.
Fig. 3 Flow record sample for VMs connection graph.
vmk D sum .V.W; k//
uX
iD1
sum .V.W; i// (20)
The method proposed here can be used to describe
the anomalous performance of VMs. Estimating the
anomalous performance of VMs involves evaluating the
situation and trend of the states of the VMs in the cloud.
3 Model Methodology
3.1 Snort
Most security concerns have been addressed, and
applying traditional security can prevent most
intrusions by setting up defenses for each VM[6]
.
Deploying Intrusion Detection Systems (IDS) on the
critical network flow entry is also a feasible solution[7]
.
Traditional IDS[8, 9]
, intrusion prevention systems,
and firewalls can be used to detect attacks in cloud
computing.
Snort[10]
is a free and open source Network Intrusion
Prevention System (NIPS) and a Network Intrusion
Detection System (NIDS). Snort has the ability to
analyze traffic in real time and log packets. Based on
different configurations, Snort has a sniffer mode, a
packet logger mode, and a network intrusion detection
system mode[11]
.
We propose using a Bayesian classifier and Snort
to detect network intrusions in cloud computing
environments (see also closely related work in
Ref. [12]). This approach has few false positives
and affordable computational cost. An OpenFlow
and Snort-based Intrusion Prevention System
(IPS) is integrated to detect intrusions and deploy
countermeasures by reconfiguring cloud computing.
Our experimental results demonstrate the feasibility
of this approach (see also closely related work in
Ref. [13]).
3.2 Data processing
3.2.1 OpenFlow
OpenFlow is an open protocol to program a flow
table to deploy new protocols, without changing any
networking devices, and it implements programmable
networks. It thus makes it possible to experiment on
production networks, without danger to operations.
McKeown et al.[14]
pioneered the control and
forwarding separation architecture of OpenFlow.
OpenFlow maintains a FlowTable in various switches
and routers. The FlowTable includes packet-forwarding
www.redpel.com +917620593389
www.redpel.com +917620593389
6. Xiaoming Ye et al.: An Anomalous Behavior Detection Model in Cloud Computing 327
rules. According to the FlowTable, when a packet
arrives at the network device, the rule set determines
the packet forwarding. With programmable features,
OpenFlow enables networks to reconfigure based
on new rules. The paper proposed a new framework
that implements network security monitoring using
OpenFlow in cloud computing (see also closely related
work in Ref. [15]).
3.2.2 Traffic redirection
Internal virtual networks are invisible in cloud
computing because their communication traffic does not
flow in the same physical machine. Insider threats could
increase the chance of malware infection of internal
VMs and hosts from unknown neighbor applications.
Therefore, a large volume of traffic is out of control.
This model employs OpenFlow to build a virtual
network, so that the virtual switch network traffic runs
through the physical network card, and the network
traffic flows to the deployed system with our programs.
OpenFlow then allows all the network flows to be
inspected.
Figure 4 shows the virtual machine network traffic
redirection. The model makes use of OpenFlow
technology. OpenFlow can redirect the network traffic
of VMs in the same physical machine to the deployed
system. This solves the problem that the inter-VM
traffic cannot be monitored and managed. And then the
model employs OpenFlow to reconfigure control rules
to prevent attacks.
3.2.3 Algorithm
We designed Algorithm 1 to get information from
flows or packets. The data processing module includes
data packet parsing, reorganization of flow session,
packet statistics, flow statistics, and a data access
interface. NPC is the captured network package
collection, which cannot use Snort to detect anomalous
Fig. 4 Traffic redirection.
Algorithm 1: Data Processing
Input Data: NPC
Output Data: F, G, Mp, Mf
1: While NPC is not null
2: Get packet p from NPC;
3: Add data packet p to queue p
0
;
4: pi get data packet from queue p
0
;
5: if (p not null) then
6: gi parse the header fields of data packet pi ;
7: add gi to G;
8: mi compute statistic vector of data packet gi ;
9: add mi to Mp;
10: if(pi 2 flow fi ) then
11: add pi to flow fi ;
12: fi update attributes of flow fi ;
13: if (pi is the last packet of flow fi ) then
14: ni compute statistic vector of flow fi ;
15: add ni to Mf;
16: end if
17: else
18: create fi ;
19: add pi to flow fi ;
20: fi initialize attributes of flow fi ;
21: add fi to F ;
22: end if
23: end if
24: end while
network behaviors; F is a flow attribute vector set; and
fi is a property of the flow. G is a data packet attributes
vector set and gi is an attribute of a packet. Mp is a
vector of statistical properties of a packet. Mf is a vector
of statistical properties of the flow.
A function of the data processing module is to
prepare the dataset used by other modules. The system
provides a uniform data access interface in order to
perform quick and effective behavior detection.
3.3 Application behavior analysis
3.3.1 Application classification
The variety of network applications in cloud computing
has dramatically increased along with the growth of
users. Accurate application traffic identification and
classification is important for anomaly detection. This
paper represents four goals of traffic classification,
one of which is detecting unknown application or
malicious flows[16]
. Based on different grained
features of network traffic, our research focuses on
packet and flow data for traffic classification. At the
packet level, the information is collected from packet
headers and, optionally, parts of the payload. The
www.redpel.com +917620593389
www.redpel.com +917620593389
7. 328 Tsinghua Science and Technology, June 2016, 21(3): 322–332
IP quintuple of transport protocol, source IP address,
destination IP address, source port, and destination
port are common properties of a flow. At the flow
level, the information can be collected from flow
statistics. Network traffic classification has attracted
many researchers over the past few years[17–20]
. We
focus on behaviors of applications when they deviate
from normal behavior. This is a motivation of the work
presented in this paper.
The main characteristics of the network traffic used
to identify the application are number of packets or
bytes per second, number of packets payload (only one
byte), number of packets payload (greater than one
byte), sequence of number of byte on the first five
packets payload, Dstatis of packets payload, Dstatis of
packets interval, and Dstatis of TTL. Dstatis represents
the statistical value of one characteristic, which contains
minimum, maximum, variance, mean, median, and
deviation.
Application behavior analysis consists of two
steps. The first step aims to identify applications.
This module manipulates the training examples and
produces multiple classifiers to improve the application
classification accuracy. The second step aims to detect
anomalous behaviors of the application. This paper
adopts the AdaBoost algorithm given in Ref. [21].
AdaBoost produces a sequence of k classifiers, such as
K-Means, Support Vector Machines (SVM), etc. The
weight for all training examples is equal at beginning.
In each iteration, the error of the previous classifier is
calculated. If it is too large, delete the iteration and
exit. Training examples that are incorrectly classified
by the previous classifiers are given higher weights for
the next classifier[22]
. The iteration stops until the error
rate reaches a predetermined value.
Figure 5 shows the process of application
classification. A application classifier is learned
from the labelled training samples during the training
phase and then the class label of every application is
obtained from the trained classifier in the classification
phase. Traffic samples that contain various applications
(such as HTTP, QQ, PPLIVE, DNS, SSH, MSN, POP3,
etc.) are collected. The module then uses time series
technology to analyze applications. As mentioned
previously, each module will get information from the
data processing module. After identifying applications,
this module gets various applications as input and then
we use time series analysis method to detect anomalies
based on application behaviors.
Fig. 5 Classification processing.
3.3.2 Time series analysis
The characteristics of networking behaviors are also
closely correlated with history data (T1, T2, T3, WT,
MT, and YT using Eq. (21)) as mentioned in Section
2.3. The time series is defined as in Ref. [23].
TS D fT1; T2; T3; WT; MT; YTg (21)
C D .C1; C2; :::; Cm/ represents the value of the time
T , where m is the total number of the application
characteristics, and Ci represents the value of the
i-th feature can be any characteristic of a network
application (such as byte counts, packet counts, number
of connection requests, source mask bits, destination
mask bits, incoming and outgoing traffic, duration,
average connection duration, protocol, packet rate,
maximum or average packet, etc.). OC is the predicted
value at time T. Â determines whether the application
behavior deviates from normal. This means that some
deviation between the forecast values and the values can
be observed. This deviation is given by Eq. (22).
Â.T / D C.T / OC.T / D .Â1; Â2; :::; Âm/ (22)
Here’s how to compute OC using Eq. (23). jTSj
denotes the size of the set TS.
OCi D
1
jTSj
sum .Ci .t// D
1
jTSj
.Ci .T1/ C Ci .T2/C
Ci .T3/ C Ci .MT/ C Ci .YT// (23)
However, if the detection time is too short, you
cannot show a regularity; if the time is too long you
will have a lot of historical data as a basis, which is the
next key issue to be resolved, along with determining
threshold Â.
3.4 Decision analysis
In order to improve detection accuracy, the decision
analysis module uses the anomaly records for in-depth
www.redpel.com +917620593389
www.redpel.com +917620593389
8. Xiaoming Ye et al.: An Anomalous Behavior Detection Model in Cloud Computing 329
analysis, where the various computation processes
are described in Algorithm 2. This module uses
a self-training algorithm, which is an incremental
algorithm. The known and unknown records of
anomalous behaviors are used to construct a sample
library. In this module, a Naive Bayesian classifier[22]
is trained with the labeled set, which is applied to
classify the unlabeled set. Then, the highest-confidence
samples are added to the labeled samples. This process
iterates until all the unlabeled samples are added to
the labeled samples.
The features A D .A1; A2; :::; Am/ are extracted
from anomaly records, which are used to construct a
sample library. If a number of labeled samples meet
the condition, the system will get results through self-
learning. The number of labeled samples will affect
the final result, which is the next problem to be
solved. Naive Bayesian is a classifier F. The task of
classification can be regarded as estimating the class
posterior probabilities. In this module, there are two
classes. One is anomalous behaviors, the other is normal
behaviors.
Each sample is assigned to its most probable
class. The self-training algorithm[22]
is given. Z is
labeled samples, .a1; a2; :::; am/ represents observed
attributes. Using label samples Z, train Naive Bayesian
Algorithm 2: Decision Analysis
Input Data: Features of Network Traffic
Output Data: y D fyes, nog
1: Train classifier F use labeled samples Z;
2: While unlabelled samples is not null
3: F.Q/;
4: for r 1 to jQj do
5: Compute per class Pr.C D cj /
6: Compute per feature Pr.Ai D ai jC D cj /
7: c1 D Pr.c D yes/
jAjQ
iD1
Pr.A D ˛i jc D yes/
8: c2 D Pr.c D no/
jAjQ
iD1
Pr.A D ˛i jc D no/
9: if (c1 > c2 and c1 > ") then
10: q:y D yes;
11: end if
12: if (c2 > c1 and c2 > ") then
13: q:y D no;
14: end if
15: Add q:y to Z;
16: remove q from Q;
17: end for
18: end while
classifiers F. This classification is then used to classify
the unlabeled sample Q; then the highest confidence
samples are added to the labeled samples. This process
iterates until all the unlabeled data have been given class
labels. This module aims to find out which applications
have anomalous behaviors.
4 Experiments
The approach is able to establish a behavioral baseline
of normal network activity for each service, and
then when network activity deviates from a baseline,
anomalous activity will be detected. Zhao et al.[24]
proposed detection botnets for classifying network
traffic behavior, and that it is possible to identify
the presence of existing and unknown botnet activity
with high accuracy. Lin et al.[25]
proposed a behavior-
based approach that can detect known and even
unknown malware. Koch et al.[26]
used behavior-
based techniques to detect intrusions in encrypted
environments. Behavior profiles of each VM and
service are used to detect cooperative anomalous
behavior in our approach.
In order to detect anomalous network behaviors in
cloud computing, we propose the model presented in
Fig. 2. For illustration purposes, a cloud environment
with several nodes is set up and we have used
this platform to develop the security architecture for
IaaS[27]
. We deploy an experimental cloud computing
platform based on a QEMU emulator v2.0.0 (Debian
2.0.0+dfsg-2ubuntu1), OpenStack IceHouse, and Open-
Flow v1.3.
We use the KDD-99 dataset as training data, which is
used for the Third International Knowledge Discovery
and Data Mining Tools Competition[28]
. It contains
4 898 431 network connections with 41 network traffic
features. There are seven discrete-valued features,
and others are continuous-valued features. KDD-99
is well-known and widely used for network attack
detection[29–31]
. The system will first preprocess some
text features into numeric features. As shown in Table
1, the service type “UDP” is mapped to 2. Then
the system transforms continuous-valued features into
discrete-valued features.
KDD-99 is partitioned into ten equal-size disjoint
subsets as training data, including six services in Table
1. For testing purposes, our system focuses on the
same types of application traffic. Table 2 shows data
distribution of connection records on six services, and
www.redpel.com +917620593389
www.redpel.com +917620593389
9. 330 Tsinghua Science and Technology, June 2016, 21(3): 322–332
Table 1 Data transformation.
Types Class Value
Protocol
TCP 1
UDP 2
ICMP 3
Service
login 1
http 2
shell 3
smtp 4
ssh 5
telnet 6
average accuracy of classification.
In this experiment, the dataset is partitioned into ten
equal-size disjoint subsets. The 10-fold cross-validation
method is used. As shown in Fig. 6, this approach
is able to classify almost one hundred percent of
normal traffic. Detection of attack traffic decreases by
approximate 3%-8% when the dataset is unbalanced for
each class, which is left for future work. The results
show that the proposed algorithms are able to classify a
majority of the attack traffic. The experimental results
indicate that the effectiveness of our approach is more
than 90%, and the model can detect attacks accurately.
A Receiver Operating Characteristic (ROC) curve is
used to evaluate classification results. We aggregate the
classification results, and demonstrate the effectiveness
of this model. Figure 7 shows ROC curves for six
Table 2 Data distribution on six services.
Service type Attack (%) Accuracy (%) Attack precision (%)
login 100.0000 99.9020 99.9899
http 0.6491 99.6813 95.8351
shell 99.5243 99.7106 99.7106
smtp 1.2252 99.8299 92.7589
ssh 99.3488 99.8095 99.9900
telnet 47.9308 92.1981 90.6363
services. Considering some acceptable behaviors can be
classified as unacceptable, we plan to further evaluate
the proposed approach using false negative analysis in
the future. In terms of the per-service attack sample rate,
“login”, “shell”, and “ssh” have the best classification
performance across all services, due to the existence
of large and long-duration attack flows in the training
data. The effectiveness of the algorithms are evaluated
in terms of its ability to distinguish attack traffic from
normal traffic. We focus on the six services in this work
and leave other types of services for future work. The
experimental results show the feasibility and accuracy
of our proposed approach.
5 Conclusion
This paper presents an anomalous behavior detection
model in cloud computing that takes into account hybrid
data sources and hybrid approaches. Our proposed
detection model can deal with both discrete and
continuous attributes. Experimental results show that
it has high precision values and low recall values. The
model uses SDN programmable technology to solve
the inter-VM network traffic that cannot be monitored.
The VM states are analyzed to propose efficient
countermeasures to fuse several analysis approaches for
preventing and handling the anomalous traffic of VMs.
A good direction for future work would be to study
weights of samples and optimizing parameters of the
proposed algorithm. We also hope to combine a deep
learning algorithm and genetic algorithms to improve
the accuracy of the model.
Acknowledgment
This work was supported by the National Natural Science
Foundation of China (No. 61272447) and the National
Fig. 6 Classification precision on ten subsets.
www.redpel.com +917620593389
www.redpel.com +917620593389
10. Xiaoming Ye et al.: An Anomalous Behavior Detection Model in Cloud Computing 331
Fig. 7 ROC curves of six services.
Key Technologies Research and Development Program of
China (No. 2012BAH18B05).
References
[1] N. Antonopoulos and L. Gillam, Cloud Computing:
Principles, Systems and Applications. Springer Science
Business Media, 2010.
[2] B. Grobauer, T. Walloschek, and E. Stocker, Understanding
cloud computing vulnerabilities, IEEE Security & Privacy,
vol. 9, no. 2, pp. 50–57, 2011.
[3] U. Oktay and O. K. Sahingoz, Attack types and
intrusion detection systems in cloud computing, in
2013 6th
International Information Security & Cryptology
Conference, 2013, pp. 71–76.
[4] R. George, Cloud Application Architectures: Building
Applications and Infrastructure in the Cloud. O’Reilly
Media, Inc., 2009.
[5] Gartner Press Release, Gartnesr says 60 percent
of virtualized servers will be less secure than the
physical servers they replace through 2012, http://
www.gartner.com/newsroom/id/1322414, 2015.
[6] J. H. Lee, M. W. Park, J. H. Eom, and T. M. Chung,
Multilevel intrusion detection system and log management
in cloud computing, in Advanced Communication
Technology (ICACT), 2011 13th International Conference
on. IEEE, 2011, pp. 552–555.
[7] U. Tupakula, V. Varadharajan, and N. Akku, Intrusion
detection techniques for infrastructure as a service
cloud, in Dependable Dependable, Autonomic and Secure
Computing (DASC), 2011 IEEE Ninth International
Conference on, 2011, pp. 744–751.
[8] P. Casas, J. Mazel, P. Owezarski, P. Casas, and J.
Mazel, Unsupervised network intrusion detection systems:
Detecting the unknown without knowledge, Computer
Communications, vol. 35, no. 7, pp. 772–783, 2012.
[9] L. Koc, T. A. Mazzuchi, and S. Sarkani, A network
intrusion detection system based on a hidden na¨ıve Bayes
multiclass classifier, Expert Systems with Applications, vol.
39, no. 18, pp. 13492–13500, 2012.
[10] Snort, https://www.snort.org, 2015.
[11] Snort Users Manual, http://manual.snort.org, 2015.
[12] C. N. Modi, D. R. Patel, A. Patel, and R. Muttukrishnan,
Bayesian classifier and Snort based network intrusion
detection system in cloud computing, in Computing
Communication & Networking Technologies (ICCCNT),
2012 Third International Conference on, 2012, pp. 1–7.
[13] T. Xing, D. Huang, L. Xu, C. J. Chung, and P. Khatkar,
Snortflow: A openflow-based intrusion prevention system
in cloud environment, in Research and Educational
Experiment Workshop (GREE), 2013 Second GENI, 2013,
pp. 89–92.
[14] N. McKeown, T. Anderson, H. Balakrishnan, G. Parulkar,
L. Peterson, J. Rexford, S. Shenker, and J. Turner,
OpenFlow: Enabling innovation in campus networks,
Computer Communication Review, vol. 38, no. 2, pp. 69–
74, 2008.
[15] S. Shin and G. Gu, CloudWatcher: Network security
monitoring using OpenFlow in dynamic cloud networks
(or: How to provide security monitoring as a service in
clouds?), in Network Protocols (ICNP), 2012 20th IEEE
International Conference on, 2012, pp. 1–6.
[16] A. Callado, C. Kamienski, G. Szabo, B. P. Ger, J.
Kelner, S. Fernandes, and D. Sadok, A survey on internet
traffic identification, IEEE Communications Surveys and
Tutorials - COMSUR, vol. 11, no. 3, pp. 37–52, 2009.
[17] J. Zhang, Y. Xiang, W. Zhou, and Y. Wang, Unsupervised
traffic classification using flow statistical properties and IP
packet payload, Journal of Computer and System Sciences,
vol. 79, no. 5, pp. 573–585, 2013.
[18] J. Zhang, Y. Xiang, Y. Wang, W. Zhou, Y. Xiang, and
Y. Guan, Network traffic classification using
www.redpel.com +917620593389
www.redpel.com +917620593389
11. 332 Tsinghua Science and Technology, June 2016, 21(3): 322–332
correlation information, IEEE Transactions on Parallel
and Distributed Systems, vol. 24, no. 1, pp. 104–117, 2013.
[19] Y. Jin, N. Duffield, J. Erman, P. Haffner, S. Sen, and Z.
Zhang, A modular machine learning system for flow-level
traffic classification in large networks, ACM Transactions
on Knowledge Discovery From Data (TKDD), vol. 6, no.1,
p. 4, 2012.
[20] A. Tongaonkar, R. Torres, M. Iliofotou, R. Keralapura,
and A. Nucci, Towards self adaptive network traffic
classification, Computer Communications, vol. 56, no. 1,
pp. 35–46, 2015.
[21] Y. Freund and R. E. Schapire, Experiments with a new
boosting algorithm, in Int’l Conf. Machine Learning
(ICML), 1996, pp. 148–156.
[22] B. Liu, M. J. Carey, and S. Ceri, Web Data Mining.
Springer, 2011.
[23] G. E. P. Box, G. M. Jenkins, and G. C. Reinsel, Time Series
Analysis: Forecasting and Control. John Wiley & Sons,
2008.
[24] D. Zhao, I. Traore, B. Sayed, W. Lu, S. Saad, A. Ghorbani,
and D. Garant, Botnet detection based on traffic behavior
analysis and flow intervals, Computers & Security, vol. 39,
pp. 2–16, 2013.
[25] Y. D. Lin, Y. C. Lai, C. N. Lu, P. K. Hsu, and
C. Y. Lee, Three-phase behavior-based detection and
classification of known and unknown malware, Security
and Communication Networks, vol. 8, no. 11, pp. 2004–
2015, 2015.
[26] R. Koch, M. Golling, and G. D. Rodosek, Behavior-
based intrusion detection in encrypted environments,
Communications Magazine, vol. 52, no. 7, pp. 124–131,
2014.
[27] L. Chen, X. S. Chen, J. F. Jiang, X. Y. Yin, and G. L.
Shao, Research and practice of dynamic network security
architecture for IaaS platforms, Tsinghua Science and
Technology, vol. 19, no. 5, pp. 496–507, 2014.
[28] KDD Cup 1999 Data, http://kdd.ics.uci.edu/databases/
kddcup99/kddcup99.html, 2015.
[29] P. A. R. Kumar and S. Selvakumar, Detection of distributed
denial of service attacks using an ensemble of adaptive and
hybrid neuro-fuzzy systems, Computer Communications,
vol. 36, no. 3, pp. 303–319, 2013.
[30] S. S. Sathya, R. G. Ramani, and K. Sivaselvi, Discriminant
analysis based feature selection in kdd intrusion dataset,
International Journal of Computer Applications, vol. 31,
no. 11, pp. 1–7, 2011.
[31] P. Casas, J. Mazel, and P. Owezarski, Unsupervised
network intrusion detection systems: Detecting the
unknown without knowledge, Computer Communications,
vol. 35, no. 7, pp. 772–783, 2011.
Xiaoming Ye is a PhD candidate at
College of Computer Science of Sichuan
University. She got the BE degree from
College of Information Engineering of
Jiangnan University in 2005 and MS
degree from College of Computer Science
of Sichuan University in 2008. Her
research interests include cyber security
and big data analytics.
Xingshu Chen received the PhD degree
from Sichuan University in 2004. She
is now a professor of the College of
Computer Science and Cybersecurity
Research Institute of Sichuan University.
She is the member of China Information
Security Standardization Technical
Committee. Her research interests include
cloud computing, cloud security, distributed file system, big
data processing, network protocol analysis, and new media
supervision.
Haizhou Wang received the BE degree
and PhD degree from College of Computer
Science, Sichuan University, China, in
2008 and 2014, respectively. From 2013
to 2014, he visited University of Toronto.
He is currently a lecturer in the College
of Computer Science, Sichuan University,
China. His research interests include peer-
to-peer streaming system, information security, and network
measurement.
Xuemei Zeng is a PhD candidate at
College of Computer Science of Sichuan
University. She received the MS degree
from Computer Science College of Sichuan
University in 2004. Her current research
interests include computer and network
security, big data, and cloud computing
security.
Guolin Shao is a PhD candidate of
College of Computer Science of Sichuan
University. He got the BE degree from
Sichuan University in 2013. His general
research interests lie in cyber security.
Xueyuan Yin is a PhD candidate at
College of Computer Science of Sichuan
University. He got the BE degree from
Sichuan University in 2008. His research
interests mainly focus on computer
network and information security.
Chun Xu received the PhD degree from
Sichuan University in 2008. He is now
an associate professor of the College
of Cybersecurity Research Institute of
Sichuan University. His research interests
mainly focus on computer network and
information security.
www.redpel.com +917620593389
www.redpel.com +917620593389