Please use this identifier to cite or link to this item: http://hdl.handle.net/10603/453182
Title: Some approaches to developing security models for cloud based systems
Researcher: Nanda, Manas Kumar
Guide(s): Patra, Manas Ranjan
Keywords: Computer Science
Computer Science Software Engineering
Engineering and Technology
University: Berhampur University
Completed Date: 2022
Abstract: The work embodied in this thesis is a study on the security vulnerabilities of cloud-based newlinesystems and to propose approaches to deal with such intrusive behaviour of malicious users. newlineThe ultimate aim is to develop models for detection and prevention of unauthorized access and newlinemisuse of cloud resources, thereby enhance the trustworthiness of cloud-based systems. newlineFirst, a cloud environment has been simulated and several measurements have been made to newlinestudy the system performance while monitoring packet transmissions involving malicious and newlinenormal ports. The dataset containing system calls generated by the University of New Mexico newline(UNM) system has been used for our experiments and some system calls have been newlinesuccessfully identified as malicious. Second, network packet features have been studied to newlinedetermine those features responsible for network attacks. For the purpose, ranks of different newlinefeatures in the NSL KDDCUP 99 intrusion dataset have been determined using entropy based newlinefeature ranking classifiers. Few features have been recognized that are key to classifying newlinevarious attack types. By eliminating those features it is observed that the accuracy of attack newlineclassification is enhanced to a large extent when compared to the level of accuracy obtained by newlineconsidering all the features. Various classification techniques namely, Random Trees Forest newline(RF), K-Nearest Neighbors (KNN), Decision Tree (J48), C4 (J48), Projective Adaptive Resonance Theory (PART), C4.5 decision tree, Multilayer Perceptron (MLP), Sequential newlineMinimal Optimization (SMO), Naïve Bayes (NB), KStar (KS) etc. have been applied to detect newlineand classify various attack classes of NSL KDDCUP 99 intrusion dataset. newlineFor our experiments we have created virtual machines and simulated packets in a cloud newlineenvironment; to detect and monitor intrusions by checking system performances (like CPU newlineload, Disk load, Network performance), we used PRTG network monitoring tool and analysed newlinepackets transmitted between nodes.
Pagination: 194p.
URI: http://hdl.handle.net/10603/453182
Appears in Departments:Department of Computer Science

Files in This Item:
File Description SizeFormat 
01_title.pdfAttached File448.63 kBAdobe PDFView/Open
02_prelim pages.pdf900.99 kBAdobe PDFView/Open
03_contents.pdf361.52 kBAdobe PDFView/Open
04_abstract.pdf224.76 kBAdobe PDFView/Open
05_chapter 1.pdf856.97 kBAdobe PDFView/Open
06_chapter 2.pdf678.44 kBAdobe PDFView/Open
07_chapter 3.pdf1.58 MBAdobe PDFView/Open
08_chapter 4.pdf1.09 MBAdobe PDFView/Open
09_chapter 5.pdf1.8 MBAdobe PDFView/Open
10_chapter 6.pdf1.76 MBAdobe PDFView/Open
11_chapter 7.pdf532.58 kBAdobe PDFView/Open
12_annexures.pdf693.57 kBAdobe PDFView/Open
13_abbreviation.pdf284.74 kBAdobe PDFView/Open
80_recommendation.pdf980.83 kBAdobe PDFView/Open
Show full item record


Items in Shodhganga are licensed under Creative Commons Licence Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0).

Altmetric Badge: