Please use this identifier to cite or link to this item:
http://hdl.handle.net/10603/453182
Title: | Some approaches to developing security models for cloud based systems |
Researcher: | Nanda, Manas Kumar |
Guide(s): | Patra, Manas Ranjan |
Keywords: | Computer Science Computer Science Software Engineering Engineering and Technology |
University: | Berhampur University |
Completed Date: | 2022 |
Abstract: | The work embodied in this thesis is a study on the security vulnerabilities of cloud-based newlinesystems and to propose approaches to deal with such intrusive behaviour of malicious users. newlineThe ultimate aim is to develop models for detection and prevention of unauthorized access and newlinemisuse of cloud resources, thereby enhance the trustworthiness of cloud-based systems. newlineFirst, a cloud environment has been simulated and several measurements have been made to newlinestudy the system performance while monitoring packet transmissions involving malicious and newlinenormal ports. The dataset containing system calls generated by the University of New Mexico newline(UNM) system has been used for our experiments and some system calls have been newlinesuccessfully identified as malicious. Second, network packet features have been studied to newlinedetermine those features responsible for network attacks. For the purpose, ranks of different newlinefeatures in the NSL KDDCUP 99 intrusion dataset have been determined using entropy based newlinefeature ranking classifiers. Few features have been recognized that are key to classifying newlinevarious attack types. By eliminating those features it is observed that the accuracy of attack newlineclassification is enhanced to a large extent when compared to the level of accuracy obtained by newlineconsidering all the features. Various classification techniques namely, Random Trees Forest newline(RF), K-Nearest Neighbors (KNN), Decision Tree (J48), C4 (J48), Projective Adaptive Resonance Theory (PART), C4.5 decision tree, Multilayer Perceptron (MLP), Sequential newlineMinimal Optimization (SMO), Naïve Bayes (NB), KStar (KS) etc. have been applied to detect newlineand classify various attack classes of NSL KDDCUP 99 intrusion dataset. newlineFor our experiments we have created virtual machines and simulated packets in a cloud newlineenvironment; to detect and monitor intrusions by checking system performances (like CPU newlineload, Disk load, Network performance), we used PRTG network monitoring tool and analysed newlinepackets transmitted between nodes. |
Pagination: | 194p. |
URI: | http://hdl.handle.net/10603/453182 |
Appears in Departments: | Department of Computer Science |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
01_title.pdf | Attached File | 448.63 kB | Adobe PDF | View/Open |
02_prelim pages.pdf | 900.99 kB | Adobe PDF | View/Open | |
03_contents.pdf | 361.52 kB | Adobe PDF | View/Open | |
04_abstract.pdf | 224.76 kB | Adobe PDF | View/Open | |
05_chapter 1.pdf | 856.97 kB | Adobe PDF | View/Open | |
06_chapter 2.pdf | 678.44 kB | Adobe PDF | View/Open | |
07_chapter 3.pdf | 1.58 MB | Adobe PDF | View/Open | |
08_chapter 4.pdf | 1.09 MB | Adobe PDF | View/Open | |
09_chapter 5.pdf | 1.8 MB | Adobe PDF | View/Open | |
10_chapter 6.pdf | 1.76 MB | Adobe PDF | View/Open | |
11_chapter 7.pdf | 532.58 kB | Adobe PDF | View/Open | |
12_annexures.pdf | 693.57 kB | Adobe PDF | View/Open | |
13_abbreviation.pdf | 284.74 kB | Adobe PDF | View/Open | |
80_recommendation.pdf | 980.83 kB | Adobe PDF | View/Open |
Items in Shodhganga are licensed under Creative Commons Licence Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0).
Altmetric Badge: