Graph-based Attack Detection in Cloud using KDD CUP 99 Dataset
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Open Access | Fully Refereed | Peer Reviewed International Journal

ISSN: 2319-7064

Downloads: 108

Research Paper | Computer Science & Engineering | India | Volume 3 Issue 8, August 2014

Graph-based Attack Detection in Cloud using KDD CUP 99 Dataset

Swapnali G. Game, S. B. Natikar

In the area of research and development effort for cloud computing, Cloud security is considered as one of challenging issues. Most commonly faced attacks are Distributed Denial-of-Service (DDoS) attacks. DDoS attacks are variation of DOS attack at distributed and large-scale level. Firstly attacker tries to discover the vulnerabilities or we can say loopholes of a cloud system and takes control over the virtual machines. And then gets success in deploying DDoS at large scale. Such attacks includes certain actions at initial stage such as exploitation in multiple steps, scanning for uncommon or less occurring vulnerabilities, identified vulnerabilities are utilized against virtual machines to use them as zombies and finally DDOS is achieved through these compromised zombies. To avoid vulnerable virtual machines from being compromised in the cloud system, proposed approach uses multiphase vulnerability detection at distributed level, measurement, countermeasure selection mechanism called as NICE, which is based on attack graph based models and reconfigurable virtual network based countermeasures. Use of standard dataset KDD Cup 99 dataset helps to cover most of the types of intrusion signatures and features. There is a need of processing encrypted traffic also together with plain traffic flowing through the cloud system. As included in the proposed system, host-based intrusion detection system implementation gives more benefits as compare to NIDS based implementation.

Keywords: DDos, IDS, Attack Graph, KDD Cup 99 Dataset, Zombie

Edition: Volume 3 Issue 8, August 2014

Pages: 511 - 516

Share this Article

How to Cite this Article?

Swapnali G. Game, S. B. Natikar, "Graph-based Attack Detection in Cloud using KDD CUP 99 Dataset", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=2015161, Volume 3 Issue 8, August 2014, 511 - 516

Enter Your Email Address




Similar Articles with Keyword 'DDos'

Downloads: 37 | Monthly Hits: ⮙18

Research Paper, Computer Science & Engineering, Sri Lanka, Volume 10 Issue 4, April 2021

Pages: 139 - 144

Analysis onto the Evolving Cyber-Attack Trends during COVID-19 Pandemic

Senthuran Nallainathan

Share this Article

Downloads: 101

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 5, May 2015

Pages: 2832 - 2836

Minimization of DDoS Attack using Firecol an Intrusion Prevention System

Bhagyashri Kotame, Shrinivas Sonkar

Share this Article

Downloads: 102

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 2, February 2015

Pages: 1809 - 1812

Efficient Flow Marking IP Traceback System

Sonali H. Mane, S. Pratap Singh

Share this Article

Downloads: 102

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 10, October 2015

Pages: 1612 - 1616

Survey Paper on Mitigation Mechanisms for Distributed Denial of Service Attacks

Vishal Mahale, Deepali Gothawal

Share this Article

Downloads: 103

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 1368 - 1371

Spam and Zombie Detection System with Machine Learned Spot Algorithm

Manishankar.S, Sobin E. S

Share this Article

Similar Articles with Keyword 'IDS'

Downloads: 70 | Weekly Hits: ⮙2 | Monthly Hits: ⮙16

Research Paper, Computer Science & Engineering, India, Volume 9 Issue 12, December 2020

Pages: 1317 - 1319

A Survey on Usage of Artificial Intelligence Algorithm in Efficiency of WSN

Chaitanya Sharma

Share this Article

Downloads: 102

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 7, July 2015

Pages: 2294 - 2298

Effective Approach for Localizing Jammers in Wireless Sensor Network

Ashwini S. Chimankar, V. S. Nandedkar

Share this Article

Downloads: 103

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 5, May 2015

Pages: 2025 - 2030

Detection And Mitigation of Distributed Denial of Service Attack by Signature based Intrusion Detection System

Hardik M. Shingala, Mukesh Sakle

Share this Article

Downloads: 103

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1666 - 1668

Survey Paper on Cube Computation Techniques

Amar Sawant, Madhav Ingle

Share this Article

Downloads: 103

Review Papers, Computer Science & Engineering, India, Volume 7 Issue 5, May 2018

Pages: 1579 - 1580

A Review of Incremental Data Load on Premises to Azure

Tejaswee Poya, Rahul Mishra

Share this Article

Similar Articles with Keyword 'Attack Graph'

Downloads: 107

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 7, July 2015

Pages: 1689 - 1692

ISRV: Intrusion Detection, Selection of Counter Measures and Recovery of Virtual Network Systems

Vinod Kumar, Syeda Asra, Yallappa Meti

Share this Article

Downloads: 108

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 8, August 2014

Pages: 511 - 516

Graph-based Attack Detection in Cloud using KDD CUP 99 Dataset

Swapnali G. Game, S. B. Natikar

Share this Article

Downloads: 110 | Weekly Hits: ⮙1 | Monthly Hits: ⮙9

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 2373 - 2377

A Review of Network Intrusion Detection and Countermeasure Selection in Virtual Network Systems

Trupti Dange, Pankaj Bhalerao

Share this Article

Downloads: 110

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 2662 - 2666

Host Based Network Intrusion Detection System in Virtual Machine

Rupali Pravin Adhau, Saba Siraj

Share this Article

Downloads: 113

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 1209 - 1212

NICE-D: A Modified Approach for Cloud Security

Nikita T. Ramteke, Dr. Yashwant V. Chavan

Share this Article

Similar Articles with Keyword 'Zombie'

Downloads: 103

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 1368 - 1371

Spam and Zombie Detection System with Machine Learned Spot Algorithm

Manishankar.S, Sobin E. S

Share this Article

Downloads: 107

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 7, July 2015

Pages: 1689 - 1692

ISRV: Intrusion Detection, Selection of Counter Measures and Recovery of Virtual Network Systems

Vinod Kumar, Syeda Asra, Yallappa Meti

Share this Article

Downloads: 108

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 8, August 2014

Pages: 511 - 516

Graph-based Attack Detection in Cloud using KDD CUP 99 Dataset

Swapnali G. Game, S. B. Natikar

Share this Article

Downloads: 110 | Weekly Hits: ⮙1 | Monthly Hits: ⮙9

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 2373 - 2377

A Review of Network Intrusion Detection and Countermeasure Selection in Virtual Network Systems

Trupti Dange, Pankaj Bhalerao

Share this Article

Downloads: 110

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 2662 - 2666

Host Based Network Intrusion Detection System in Virtual Machine

Rupali Pravin Adhau, Saba Siraj

Share this Article



Top