SlideShare a Scribd company logo
1 of 11
Download to read offline
TSINGHUA SCIENCE AND TECHNOLOGY
ISSNll1007-0214ll08/11llpp322–332
Volume 21, Number 3, June 2016
An Anomalous Behavior Detection Model in Cloud Computing
Xiaoming Ye, Xingshu Chen , Haizhou Wang, Xuemei Zeng, Guolin Shao, Xueyuan Yin, and Chun Xu
Abstract: This paper proposes an anomalous behavior detection model based on cloud computing. Virtual
Machines (VMs) are one of the key components of cloud Infrastructure as a Service (IaaS). The security of such
VMs is critical to IaaS security. Many studies have been done on cloud computing security issues, but research into
VM security issues, especially regarding VM network traffic anomalous behavior detection, remains inadequate.
More and more studies show that communication among internal nodes exhibits complex patterns. Communication
among VMs in cloud computing is invisible. Researchers find such issues challenging, and few solutions have
been proposed—leaving cloud computing vulnerable to network attacks. This paper proposes a model that uses
Software-Defined Networks (SDN) to implement traffic redirection. Our model can capture inter-VM traffic, detect
known and unknown anomalous network behaviors, adopt hybrid techniques to analyze VM network behaviors, and
control network systems. The experimental results indicate that the effectiveness of our approach is greater than
90%, and prove the feasibility of the model.
Key words: virtual machine; network behavior; anomaly detection; cloud computing
1 Introduction
Cloud computing infrastructure is a hybrid networking
system, that integrates hybrid technology, hybrid
operating systems, and hybrid hardware. Cloud
computing aims to provide on-demand, low-cost,
high-performance computing resources, and leverages
virtualization technologies to deliver storage, server,
network services, CPU, and memory[1]
.
Cloud computing has to face traditional security
threats and new generations of security threats. Cloud
computing vulnerabilities include core technology
vulnerabilities (e.g., Web applications and services,
virtualization, and cryptography), essential cloud
characteristic vulnerabilities (e.g., unauthorized
Xiaoming Ye, Xingshu Chen, Haizhou Wang, Xuemei
Zeng, Guolin Shao, Xueyuan Yin, and Chun Xu are with
the College of Computer Science, Cybersecurity Research
Institute, Sichuan University, Chengdu 610065, China. E-mail:
yexm.edu@gmail.com; chenxsh@scu.edu.cn; whzh.nc@scu.
edu.cn; zengxm@scu.edu.cn; sgllearn@163.com; yinxueyuan@
msn.com; xchun@scu.edu.cn.
To whom correspondence should be addressed.
Manuscript received: 2016-01-09; accepted: 2016-03-07
access to management interfaces, Internet protocol
vulnerabilities, etc.), and defects in known security
controls, and prevalent vulnerabilities (e.g., injection
vulnerabilities and weak authentication schemes)[2]
.
Attackers find vulnerabilities and use them to undertake
attacks. There have been many attacks against virtual
machines on cloud computing platforms, such as
various port scanning attack, attacks on hypervisors,
attacks on virtualization, backdoor channel attacks,
flooding attacks, user-to-root attacks, and insider
attacks (e.g., internal denial-of-service attacks via
zombies in the cloud)[3]
.
Virtualization technology is a core technology in
cloud computing. Virtual Machines (VMs) are key
components of cloud infrastructure. For example,
virtualization technology enables the execution of
multiple operating system environments, or VM
instances, on a single hardware system. Each VM
owns an operating system and applications. A
VM executes programs like a physical machine.
Cloud computing contains both physical and virtual
networks[4]
. Virtualization creates blind spots of
network traffic, or invisible networks, in the same
server infrastructure. Gartner[5]
represented six of the
www.redpel.com +917620593389
www.redpel.com +917620593389
Xiaoming Ye et al.: An Anomalous Behavior Detection Model in Cloud Computing 323
most common virtualization security risks, including
noting that “the lack of visibility and controls
on internal virtual networks created for VM-to-
VM communications blinds existing security policy
enforcement mechanisms”. He said that more than 60%
of virtual machines in production are less secure than
their physical counterparts. VMs are losing their ability
to detect and control this communication. Attacks and
data can move through the VMs without ever going out
to the physical network, which means these attacks will
not be detected by traditional tools. To deal with this
vulnerability, making all VM communications traffic
visible is the first problem that needs to be solved.
Currently, the challenge is how to establish an
effective network behavior detection system for each
VM in a cloud computing network, so that it can
accurately identify deviations from normal network
behavior of the virtual machines, and reduce cloud
security risks.
This paper proposes a model to detect anomaly
behavior for the VMs in cloud computing. This
model is a time-varying system with a number of
network traffic features. Here are the main work and
contributions of this paper:
Communications among VMs in cloud are
invisible. The model uses Software-Defined Networks
(SDN) to build a virtual network, so that the virtual
switch network traffic is through the physical network
card, then to the node where the deployed system
resides.
The model aims to detect known and unknown
anomalous behaviors.
This paper designs a control model, and adopts
hybrid techniques to analyze VM network behaviors
and control network systems.
The remainder of this paper is organized as follows.
Section 2 introduces state machine definitions and
components of the model and methods of state
analysis. Section 3 introduces Snort, data processing,
application behavior analysis, and decision analysis.
The algorithm and technologies used in this paper are
also discussed. Experiments were conducted and the
results are discussed in Section 4. Conclusions and
future work are presented in Section 5.
2 Model Overview
2.1 State definitions
Network behavior has various forms and means of
changing characteristics. We cannot describe and
identify all the anomalous behaviors of networks but
can describe states that characterize a VM under attack.
Before the attack, a malicious user tries to scan VMs
and search for vulnerabilities or ports to find the cloud
computing infrastructure security “holes”. The attacker
then has a planned, purposeful, step-by-step process to
undertake the attack, including an attack action plan,
tests, and a complete attack process. Normal VM
network behavior is a state of dynamic equilibrium.
Network attacks will affect this state, which is defined
as follows:
Definition 1 (Homeostasis, S1): Currently, the
virtual machine is running properly, the network traffic
situation is in dynamic equilibrium. Virtual machines
have vulnerabilities and other security threats, but they
have not been detected or used.
Definition 2 (Before imbalances, S2): Suppose
anomalous behaviors of network traffic are detected,
such as vulnerability scanning. In this state, VM
security threats have been detected, but have not yet
been utilized by an attacker.
Definition 3 (Imbalances early, S3): Suppose
anomalous network traffic behaviors are detected more
than once. An attacker has detected vulnerabilities in
the virtual machine, and exploited them.
Definition 4 (Imbalance, S4): Network traffic
anomalies are repeatedly detected. The VM is under
continuous cyber-attacks.
Figure 1 depicts the transition of virtual machine
states under attack. The sequence starts at state S1.
Attack behaviors make VM state S1 activate states
S2, S3, and S4. When anomalous behavior has been
controlled, the VM state returns to a state of dynamic
equilibrium.
Fig. 1 VM state transition.
www.redpel.com +917620593389
www.redpel.com +917620593389
324 Tsinghua Science and Technology, June 2016, 21(3): 322–332
Through application behavior analysis, the model
determines whether or not application behavior deviates
from normal. According to this, the model can be used
to describe VM state transitions. The details of its
algorithm will be given in Section 2:3.
2.2 Components
This paper proposes a cloud computing anomalous
behavior detection model. The model can detect known
and unknown anomalous behaviors. Hybrid techniques
are used to detect anomalies. The model determines
whether the network behavior of a virtual machine
deviates from normal.
Figure 2 describes the model components and
detection processes. This model consists of VM
profiles, Snort, data processing, application behavior
analysis, state analysis modules, and decision analysis.
The VM profile module is a dataset used to store
and manage VM profiles based on traffic analysis.
Application behavior states are used to build a set of
VM profiles. The information includes the services, the
software version number, open port, IP address, MAC
address, and rules. In addition, it also includes rules for
communication among virtual machines, and between
virtual machines and physical machines. These profiles
include VM security rules among other features.
VM network traffic passes through Snort first. This
module is used to detect known anomalous behaviors.
Fig. 2 Model components.
Snort uses detection rules based on signature. The
model first executes a Snort module, which provides
known anomaly detection, improves the detection rate,
and reduces the computational cost. Then network
traffic flows into the next detection module. The Snort
model not only uses the known anomaly behavior rule
base, but also reduces the volume of traffic that must be
processed in the next module.
The model then performs application behavior
analysis. This module has two parts. In the first
part, traffic classification is performed to identify
applications. This part manipulates the training
examples and produces multiple classifiers to improve
the application classification accuracy. In the second
part, the application behavior analysis module uses
time series to build a baseline for each application.
Considering the normal network behavior of VMs,
time series analysis is used. For example, people
work during the day and rest at night. People work
from Monday to Friday and rest on Saturday and
Sunday. Other regular behaviors include data backup,
“application heartbeat”, and periodic behaviors that
are repeated. This module aims to detect unknown
anomalous behaviors. So the properties of applications
for each VM are stored. The algorithm of this module
is given below.
Finally, the results of detection from Snort and
the application behavior analysis module are saved
as anomaly records. In order to improve detection
accuracy, the decision analysis module uses the records
for in-depth analysis. The algorithm is below.
After the application behavior analysis, the VM
profile information is updated. According to this, the
model can describe the states of the VMs in cloud. The
formulas are described below.
2.3 State analysis
VM profiles have summary information about each VM
in the cloud collected from traffic. For each application,
detection results from Snort and behavior analysis are
added to the VM profiles. Other information includes
number of services, open port number, number of flows,
number of outgoing connections, number of incoming
connections, maximum value of each connection,
and duration. In addition, it also includes rules for
communication between virtual machines, as well as for
communication between virtual machines and physical
machines.
Ak represents the anomalous performance of the k-
www.redpel.com +917620593389
www.redpel.com +917620593389
Xiaoming Ye et al.: An Anomalous Behavior Detection Model in Cloud Computing 325
th VM in the cloud as discussed in Section 2.1. In this
method, the state of each VM is shown in three forms
A.1/
, A.2/
, and A.3/
. Its value is calculated by Eq. (1),
where n.t/ is the random noise, and r1, r2, and r3 are
parameters. vmk denotes the weight of the k-th VM
using Eq. (20). A.1/
represents the degree of deviation
of traffic periodicity of the VM using Eq. (6). A.2/
denotes the anomalous status of known applications
(app) using Eq. (11). A.3/
denotes anomalous status
of unknown applications (uapp) using Eq. (12).
The anomalous performance of VMs is
Ak D vmk.r1A.1/
C r2A.2/
C r3A.3/
/ C n.t/ (1)
Here’s how to compute A.1/
. A VM profile is a time-
varying matrix with network traffic features that can
describe the state of network traffic. A time series is
a sequence of data usually at regular intervals of time
during a specific period. The most important feature
of this type of data is that neighboring observations are
dependent on each other. This paper takes into account
history data before time T .T1, T2, and T3 are three
adjacent time before detection time T ), but also last
week’s value WT, last month’s value MT, and last years
value YT at each observing time as shown in Fig. 2.
Thus, in Eq. (2), here are six values associated with
given time, where m represents the total number of
observation characteristics. Create a time matrix Stvm
as follows:
Stvm D
0
B
@
w11 : : : w16
:::
:::
:::
wm1 : : : wm6
1
C
A (2)
Build a vector base on each time window Wi at
time t, where W1 represents T1, W2 represents T2, W3
represents T3, W4 represents WT, W5 represents MT,
and W6 represents YT.
Wi D .w1i ; w2i ; :::; wmi /T
(3)
Stvm D .W1; W2; W3; W4; W5; W6/ (4)
The model then uses Euclidean distance to measure
the transformation. It means the likelihood of an
anomalous VM state performance can be expressed by
the distance spanned by the time window vector. The
Euclidean distance can be expressed as
dist.Wi ; Wj / D
v
u
u
t
mX
kD1
.wki wkj /2 (5)
A weight ˇi is associated with each time window to
express its importance in relation to time T.
A.1/
D
1
6
6X
iD1
.ˇi dist.WT ; Wi // (6)
Here’s how to compute A.2/
. In the following
equations appi represents the i-th application. The
likelihood of anomalous application performance can
be expressed in detail by considering factors such as the
probability of presence of the application in traffic:
Fi DPrfappi g Prfanomalyjappi g D
Prfappi g fappi is suspiciousjappi g
Prfappi is anonalousjappi is suspiciousg D
F1i F2i F3i D
3Y
j D1
Fji (7)
In Eq. (7), Fi denotes the status of the i-th
application, which consists of three viewpoints F1i ,
F2i , and F3i . F1i represents the probability of the i-
th application in traffic, F2i represents the probability
of a detected anomaly in Snort or application behavior
analysis in the i-th application, but not in the results
of the decision analysis module. F3i represents the
probability of an anomaly being found in the decision
analysis module. F1i , F2i , and F3i can be calculated
by Eqs. (8) – (10).
F1i D
Number of connections to appi
Total number of connections
(8)
F2i D
Number of anomaly alert appi
Number of connections to appi
(9)
F3i D
Number of anomaly appi
Number of anomaly alert appi
(10)
A weight is associated with the importance of the
appi . k represents the number of the applications. The
normalized A.2/
from Eqs. (8) – (10) can be given as
A.2/
D
1
1 C e
kP
iD1
i
3Q
jD1
Fji
(11)
Below is the formula for computing A.3/
. The
likelihood of anomalous behavior in unknown
applications (uapp) can be expressed by considering
factors such as the probability of presence of the
unknown applications in traffic:
A.3/
D Prfuappg Prfanomalyjuappg D N1 N2
(12)
N1 D
Number of connections to uapp
Total number of connections
(13)
N2 D
Number of alerts to uapp
Total number of alerts
(14)
So the anomalous performance of the k-th VM from
www.redpel.com +917620593389
www.redpel.com +917620593389
326 Tsinghua Science and Technology, June 2016, 21(3): 322–332
Eqs. (6), (11), and (12) can be calculated by Eq. (15).
Ak Dvmk
r1
n
nX
iD1
.ˇi dist.Wt ; Wi //C
r2
1 C e
kP
iD1
i
Q3
jD1 Fji
C r3
2Y
iD1
Ni
!
C n.t/ (15)
Even a single VM is considered important in the cloud
if it is connected to many VMs, which multiply the
impact of each VM. vmk is an impact factor associated
with the VM’s importance in the cloud. Now we show
how to compute vmk.
Figure 3 shows a sample connection graph. Each
node represents a VM, where Vk denotes the k-th VM,
and Pj denotes the j-th port of the VM. A connection
between V1 and V3 exists if a flow record having these
addresses is observed. Between nodes V1 and V3 there
are three edges representing three flow records from IP
address V1 to IP address V3 with different port numbers.
According to given sample, there are three edges
between V1 and V3. The vector V.k/
represents the
connections of the k-th VM with other VMs, where
V.1/
, V.2/
, and V.3/
can be expressed by Eqs. (16) –
(18). The matrix V3 3 denoting the connections of the
three VMs, is expressed by Eq. (19).
V.1/
D . 0 0 3 /T
(16)
V.2/
D . 0 0 2 /T
(17)
V.3/
D . 3 2 0 /T
(18)
V3 3 D .V.1/
; V.2/
; V.3/
/ D
0
B
@
0 0 3
0 0 2
3 2 0
1
C
A (19)
The normalized vmk can be calculated by Eq. (20),
where u represents the total number of VMs.
Fig. 3 Flow record sample for VMs connection graph.
vmk D sum .V.W; k//
uX
iD1
sum .V.W; i// (20)
The method proposed here can be used to describe
the anomalous performance of VMs. Estimating the
anomalous performance of VMs involves evaluating the
situation and trend of the states of the VMs in the cloud.
3 Model Methodology
3.1 Snort
Most security concerns have been addressed, and
applying traditional security can prevent most
intrusions by setting up defenses for each VM[6]
.
Deploying Intrusion Detection Systems (IDS) on the
critical network flow entry is also a feasible solution[7]
.
Traditional IDS[8, 9]
, intrusion prevention systems,
and firewalls can be used to detect attacks in cloud
computing.
Snort[10]
is a free and open source Network Intrusion
Prevention System (NIPS) and a Network Intrusion
Detection System (NIDS). Snort has the ability to
analyze traffic in real time and log packets. Based on
different configurations, Snort has a sniffer mode, a
packet logger mode, and a network intrusion detection
system mode[11]
.
We propose using a Bayesian classifier and Snort
to detect network intrusions in cloud computing
environments (see also closely related work in
Ref. [12]). This approach has few false positives
and affordable computational cost. An OpenFlow
and Snort-based Intrusion Prevention System
(IPS) is integrated to detect intrusions and deploy
countermeasures by reconfiguring cloud computing.
Our experimental results demonstrate the feasibility
of this approach (see also closely related work in
Ref. [13]).
3.2 Data processing
3.2.1 OpenFlow
OpenFlow is an open protocol to program a flow
table to deploy new protocols, without changing any
networking devices, and it implements programmable
networks. It thus makes it possible to experiment on
production networks, without danger to operations.
McKeown et al.[14]
pioneered the control and
forwarding separation architecture of OpenFlow.
OpenFlow maintains a FlowTable in various switches
and routers. The FlowTable includes packet-forwarding
www.redpel.com +917620593389
www.redpel.com +917620593389
Xiaoming Ye et al.: An Anomalous Behavior Detection Model in Cloud Computing 327
rules. According to the FlowTable, when a packet
arrives at the network device, the rule set determines
the packet forwarding. With programmable features,
OpenFlow enables networks to reconfigure based
on new rules. The paper proposed a new framework
that implements network security monitoring using
OpenFlow in cloud computing (see also closely related
work in Ref. [15]).
3.2.2 Traffic redirection
Internal virtual networks are invisible in cloud
computing because their communication traffic does not
flow in the same physical machine. Insider threats could
increase the chance of malware infection of internal
VMs and hosts from unknown neighbor applications.
Therefore, a large volume of traffic is out of control.
This model employs OpenFlow to build a virtual
network, so that the virtual switch network traffic runs
through the physical network card, and the network
traffic flows to the deployed system with our programs.
OpenFlow then allows all the network flows to be
inspected.
Figure 4 shows the virtual machine network traffic
redirection. The model makes use of OpenFlow
technology. OpenFlow can redirect the network traffic
of VMs in the same physical machine to the deployed
system. This solves the problem that the inter-VM
traffic cannot be monitored and managed. And then the
model employs OpenFlow to reconfigure control rules
to prevent attacks.
3.2.3 Algorithm
We designed Algorithm 1 to get information from
flows or packets. The data processing module includes
data packet parsing, reorganization of flow session,
packet statistics, flow statistics, and a data access
interface. NPC is the captured network package
collection, which cannot use Snort to detect anomalous
Fig. 4 Traffic redirection.
Algorithm 1: Data Processing
Input Data: NPC
Output Data: F, G, Mp, Mf
1: While NPC is not null
2: Get packet p from NPC;
3: Add data packet p to queue p
0
;
4: pi get data packet from queue p
0
;
5: if (p not null) then
6: gi parse the header fields of data packet pi ;
7: add gi to G;
8: mi compute statistic vector of data packet gi ;
9: add mi to Mp;
10: if(pi 2 flow fi ) then
11: add pi to flow fi ;
12: fi update attributes of flow fi ;
13: if (pi is the last packet of flow fi ) then
14: ni compute statistic vector of flow fi ;
15: add ni to Mf;
16: end if
17: else
18: create fi ;
19: add pi to flow fi ;
20: fi initialize attributes of flow fi ;
21: add fi to F ;
22: end if
23: end if
24: end while
network behaviors; F is a flow attribute vector set; and
fi is a property of the flow. G is a data packet attributes
vector set and gi is an attribute of a packet. Mp is a
vector of statistical properties of a packet. Mf is a vector
of statistical properties of the flow.
A function of the data processing module is to
prepare the dataset used by other modules. The system
provides a uniform data access interface in order to
perform quick and effective behavior detection.
3.3 Application behavior analysis
3.3.1 Application classification
The variety of network applications in cloud computing
has dramatically increased along with the growth of
users. Accurate application traffic identification and
classification is important for anomaly detection. This
paper represents four goals of traffic classification,
one of which is detecting unknown application or
malicious flows[16]
. Based on different grained
features of network traffic, our research focuses on
packet and flow data for traffic classification. At the
packet level, the information is collected from packet
headers and, optionally, parts of the payload. The
www.redpel.com +917620593389
www.redpel.com +917620593389
328 Tsinghua Science and Technology, June 2016, 21(3): 322–332
IP quintuple of transport protocol, source IP address,
destination IP address, source port, and destination
port are common properties of a flow. At the flow
level, the information can be collected from flow
statistics. Network traffic classification has attracted
many researchers over the past few years[17–20]
. We
focus on behaviors of applications when they deviate
from normal behavior. This is a motivation of the work
presented in this paper.
The main characteristics of the network traffic used
to identify the application are number of packets or
bytes per second, number of packets payload (only one
byte), number of packets payload (greater than one
byte), sequence of number of byte on the first five
packets payload, Dstatis of packets payload, Dstatis of
packets interval, and Dstatis of TTL. Dstatis represents
the statistical value of one characteristic, which contains
minimum, maximum, variance, mean, median, and
deviation.
Application behavior analysis consists of two
steps. The first step aims to identify applications.
This module manipulates the training examples and
produces multiple classifiers to improve the application
classification accuracy. The second step aims to detect
anomalous behaviors of the application. This paper
adopts the AdaBoost algorithm given in Ref. [21].
AdaBoost produces a sequence of k classifiers, such as
K-Means, Support Vector Machines (SVM), etc. The
weight for all training examples is equal at beginning.
In each iteration, the error of the previous classifier is
calculated. If it is too large, delete the iteration and
exit. Training examples that are incorrectly classified
by the previous classifiers are given higher weights for
the next classifier[22]
. The iteration stops until the error
rate reaches a predetermined value.
Figure 5 shows the process of application
classification. A application classifier is learned
from the labelled training samples during the training
phase and then the class label of every application is
obtained from the trained classifier in the classification
phase. Traffic samples that contain various applications
(such as HTTP, QQ, PPLIVE, DNS, SSH, MSN, POP3,
etc.) are collected. The module then uses time series
technology to analyze applications. As mentioned
previously, each module will get information from the
data processing module. After identifying applications,
this module gets various applications as input and then
we use time series analysis method to detect anomalies
based on application behaviors.
Fig. 5 Classification processing.
3.3.2 Time series analysis
The characteristics of networking behaviors are also
closely correlated with history data (T1, T2, T3, WT,
MT, and YT using Eq. (21)) as mentioned in Section
2.3. The time series is defined as in Ref. [23].
TS D fT1; T2; T3; WT; MT; YTg (21)
C D .C1; C2; :::; Cm/ represents the value of the time
T , where m is the total number of the application
characteristics, and Ci represents the value of the
i-th feature can be any characteristic of a network
application (such as byte counts, packet counts, number
of connection requests, source mask bits, destination
mask bits, incoming and outgoing traffic, duration,
average connection duration, protocol, packet rate,
maximum or average packet, etc.). OC is the predicted
value at time T. Â determines whether the application
behavior deviates from normal. This means that some
deviation between the forecast values and the values can
be observed. This deviation is given by Eq. (22).
Â.T / D C.T / OC.T / D .Â1; Â2; :::; Âm/ (22)
Here’s how to compute OC using Eq. (23). jTSj
denotes the size of the set TS.
OCi D
1
jTSj
sum .Ci .t// D
1
jTSj
.Ci .T1/ C Ci .T2/C
Ci .T3/ C Ci .MT/ C Ci .YT// (23)
However, if the detection time is too short, you
cannot show a regularity; if the time is too long you
will have a lot of historical data as a basis, which is the
next key issue to be resolved, along with determining
threshold Â.
3.4 Decision analysis
In order to improve detection accuracy, the decision
analysis module uses the anomaly records for in-depth
www.redpel.com +917620593389
www.redpel.com +917620593389
Xiaoming Ye et al.: An Anomalous Behavior Detection Model in Cloud Computing 329
analysis, where the various computation processes
are described in Algorithm 2. This module uses
a self-training algorithm, which is an incremental
algorithm. The known and unknown records of
anomalous behaviors are used to construct a sample
library. In this module, a Naive Bayesian classifier[22]
is trained with the labeled set, which is applied to
classify the unlabeled set. Then, the highest-confidence
samples are added to the labeled samples. This process
iterates until all the unlabeled samples are added to
the labeled samples.
The features A D .A1; A2; :::; Am/ are extracted
from anomaly records, which are used to construct a
sample library. If a number of labeled samples meet
the condition, the system will get results through self-
learning. The number of labeled samples will affect
the final result, which is the next problem to be
solved. Naive Bayesian is a classifier F. The task of
classification can be regarded as estimating the class
posterior probabilities. In this module, there are two
classes. One is anomalous behaviors, the other is normal
behaviors.
Each sample is assigned to its most probable
class. The self-training algorithm[22]
is given. Z is
labeled samples, .a1; a2; :::; am/ represents observed
attributes. Using label samples Z, train Naive Bayesian
Algorithm 2: Decision Analysis
Input Data: Features of Network Traffic
Output Data: y D fyes, nog
1: Train classifier F use labeled samples Z;
2: While unlabelled samples is not null
3: F.Q/;
4: for r 1 to jQj do
5: Compute per class Pr.C D cj /
6: Compute per feature Pr.Ai D ai jC D cj /
7: c1 D Pr.c D yes/
jAjQ
iD1
Pr.A D ˛i jc D yes/
8: c2 D Pr.c D no/
jAjQ
iD1
Pr.A D ˛i jc D no/
9: if (c1 > c2 and c1 > ") then
10: q:y D yes;
11: end if
12: if (c2 > c1 and c2 > ") then
13: q:y D no;
14: end if
15: Add q:y to Z;
16: remove q from Q;
17: end for
18: end while
classifiers F. This classification is then used to classify
the unlabeled sample Q; then the highest confidence
samples are added to the labeled samples. This process
iterates until all the unlabeled data have been given class
labels. This module aims to find out which applications
have anomalous behaviors.
4 Experiments
The approach is able to establish a behavioral baseline
of normal network activity for each service, and
then when network activity deviates from a baseline,
anomalous activity will be detected. Zhao et al.[24]
proposed detection botnets for classifying network
traffic behavior, and that it is possible to identify
the presence of existing and unknown botnet activity
with high accuracy. Lin et al.[25]
proposed a behavior-
based approach that can detect known and even
unknown malware. Koch et al.[26]
used behavior-
based techniques to detect intrusions in encrypted
environments. Behavior profiles of each VM and
service are used to detect cooperative anomalous
behavior in our approach.
In order to detect anomalous network behaviors in
cloud computing, we propose the model presented in
Fig. 2. For illustration purposes, a cloud environment
with several nodes is set up and we have used
this platform to develop the security architecture for
IaaS[27]
. We deploy an experimental cloud computing
platform based on a QEMU emulator v2.0.0 (Debian
2.0.0+dfsg-2ubuntu1), OpenStack IceHouse, and Open-
Flow v1.3.
We use the KDD-99 dataset as training data, which is
used for the Third International Knowledge Discovery
and Data Mining Tools Competition[28]
. It contains
4 898 431 network connections with 41 network traffic
features. There are seven discrete-valued features,
and others are continuous-valued features. KDD-99
is well-known and widely used for network attack
detection[29–31]
. The system will first preprocess some
text features into numeric features. As shown in Table
1, the service type “UDP” is mapped to 2. Then
the system transforms continuous-valued features into
discrete-valued features.
KDD-99 is partitioned into ten equal-size disjoint
subsets as training data, including six services in Table
1. For testing purposes, our system focuses on the
same types of application traffic. Table 2 shows data
distribution of connection records on six services, and
www.redpel.com +917620593389
www.redpel.com +917620593389
330 Tsinghua Science and Technology, June 2016, 21(3): 322–332
Table 1 Data transformation.
Types Class Value
Protocol
TCP 1
UDP 2
ICMP 3
Service
login 1
http 2
shell 3
smtp 4
ssh 5
telnet 6
average accuracy of classification.
In this experiment, the dataset is partitioned into ten
equal-size disjoint subsets. The 10-fold cross-validation
method is used. As shown in Fig. 6, this approach
is able to classify almost one hundred percent of
normal traffic. Detection of attack traffic decreases by
approximate 3%-8% when the dataset is unbalanced for
each class, which is left for future work. The results
show that the proposed algorithms are able to classify a
majority of the attack traffic. The experimental results
indicate that the effectiveness of our approach is more
than 90%, and the model can detect attacks accurately.
A Receiver Operating Characteristic (ROC) curve is
used to evaluate classification results. We aggregate the
classification results, and demonstrate the effectiveness
of this model. Figure 7 shows ROC curves for six
Table 2 Data distribution on six services.
Service type Attack (%) Accuracy (%) Attack precision (%)
login 100.0000 99.9020 99.9899
http 0.6491 99.6813 95.8351
shell 99.5243 99.7106 99.7106
smtp 1.2252 99.8299 92.7589
ssh 99.3488 99.8095 99.9900
telnet 47.9308 92.1981 90.6363
services. Considering some acceptable behaviors can be
classified as unacceptable, we plan to further evaluate
the proposed approach using false negative analysis in
the future. In terms of the per-service attack sample rate,
“login”, “shell”, and “ssh” have the best classification
performance across all services, due to the existence
of large and long-duration attack flows in the training
data. The effectiveness of the algorithms are evaluated
in terms of its ability to distinguish attack traffic from
normal traffic. We focus on the six services in this work
and leave other types of services for future work. The
experimental results show the feasibility and accuracy
of our proposed approach.
5 Conclusion
This paper presents an anomalous behavior detection
model in cloud computing that takes into account hybrid
data sources and hybrid approaches. Our proposed
detection model can deal with both discrete and
continuous attributes. Experimental results show that
it has high precision values and low recall values. The
model uses SDN programmable technology to solve
the inter-VM network traffic that cannot be monitored.
The VM states are analyzed to propose efficient
countermeasures to fuse several analysis approaches for
preventing and handling the anomalous traffic of VMs.
A good direction for future work would be to study
weights of samples and optimizing parameters of the
proposed algorithm. We also hope to combine a deep
learning algorithm and genetic algorithms to improve
the accuracy of the model.
Acknowledgment
This work was supported by the National Natural Science
Foundation of China (No. 61272447) and the National
Fig. 6 Classification precision on ten subsets.
www.redpel.com +917620593389
www.redpel.com +917620593389
Xiaoming Ye et al.: An Anomalous Behavior Detection Model in Cloud Computing 331
Fig. 7 ROC curves of six services.
Key Technologies Research and Development Program of
China (No. 2012BAH18B05).
References
[1] N. Antonopoulos and L. Gillam, Cloud Computing:
Principles, Systems and Applications. Springer Science
Business Media, 2010.
[2] B. Grobauer, T. Walloschek, and E. Stocker, Understanding
cloud computing vulnerabilities, IEEE Security & Privacy,
vol. 9, no. 2, pp. 50–57, 2011.
[3] U. Oktay and O. K. Sahingoz, Attack types and
intrusion detection systems in cloud computing, in
2013 6th
International Information Security & Cryptology
Conference, 2013, pp. 71–76.
[4] R. George, Cloud Application Architectures: Building
Applications and Infrastructure in the Cloud. O’Reilly
Media, Inc., 2009.
[5] Gartner Press Release, Gartnesr says 60 percent
of virtualized servers will be less secure than the
physical servers they replace through 2012, http://
www.gartner.com/newsroom/id/1322414, 2015.
[6] J. H. Lee, M. W. Park, J. H. Eom, and T. M. Chung,
Multilevel intrusion detection system and log management
in cloud computing, in Advanced Communication
Technology (ICACT), 2011 13th International Conference
on. IEEE, 2011, pp. 552–555.
[7] U. Tupakula, V. Varadharajan, and N. Akku, Intrusion
detection techniques for infrastructure as a service
cloud, in Dependable Dependable, Autonomic and Secure
Computing (DASC), 2011 IEEE Ninth International
Conference on, 2011, pp. 744–751.
[8] P. Casas, J. Mazel, P. Owezarski, P. Casas, and J.
Mazel, Unsupervised network intrusion detection systems:
Detecting the unknown without knowledge, Computer
Communications, vol. 35, no. 7, pp. 772–783, 2012.
[9] L. Koc, T. A. Mazzuchi, and S. Sarkani, A network
intrusion detection system based on a hidden na¨ıve Bayes
multiclass classifier, Expert Systems with Applications, vol.
39, no. 18, pp. 13492–13500, 2012.
[10] Snort, https://www.snort.org, 2015.
[11] Snort Users Manual, http://manual.snort.org, 2015.
[12] C. N. Modi, D. R. Patel, A. Patel, and R. Muttukrishnan,
Bayesian classifier and Snort based network intrusion
detection system in cloud computing, in Computing
Communication & Networking Technologies (ICCCNT),
2012 Third International Conference on, 2012, pp. 1–7.
[13] T. Xing, D. Huang, L. Xu, C. J. Chung, and P. Khatkar,
Snortflow: A openflow-based intrusion prevention system
in cloud environment, in Research and Educational
Experiment Workshop (GREE), 2013 Second GENI, 2013,
pp. 89–92.
[14] N. McKeown, T. Anderson, H. Balakrishnan, G. Parulkar,
L. Peterson, J. Rexford, S. Shenker, and J. Turner,
OpenFlow: Enabling innovation in campus networks,
Computer Communication Review, vol. 38, no. 2, pp. 69–
74, 2008.
[15] S. Shin and G. Gu, CloudWatcher: Network security
monitoring using OpenFlow in dynamic cloud networks
(or: How to provide security monitoring as a service in
clouds?), in Network Protocols (ICNP), 2012 20th IEEE
International Conference on, 2012, pp. 1–6.
[16] A. Callado, C. Kamienski, G. Szabo, B. P. Ger, J.
Kelner, S. Fernandes, and D. Sadok, A survey on internet
traffic identification, IEEE Communications Surveys and
Tutorials - COMSUR, vol. 11, no. 3, pp. 37–52, 2009.
[17] J. Zhang, Y. Xiang, W. Zhou, and Y. Wang, Unsupervised
traffic classification using flow statistical properties and IP
packet payload, Journal of Computer and System Sciences,
vol. 79, no. 5, pp. 573–585, 2013.
[18] J. Zhang, Y. Xiang, Y. Wang, W. Zhou, Y. Xiang, and
Y. Guan, Network traffic classification using
www.redpel.com +917620593389
www.redpel.com +917620593389
332 Tsinghua Science and Technology, June 2016, 21(3): 322–332
correlation information, IEEE Transactions on Parallel
and Distributed Systems, vol. 24, no. 1, pp. 104–117, 2013.
[19] Y. Jin, N. Duffield, J. Erman, P. Haffner, S. Sen, and Z.
Zhang, A modular machine learning system for flow-level
traffic classification in large networks, ACM Transactions
on Knowledge Discovery From Data (TKDD), vol. 6, no.1,
p. 4, 2012.
[20] A. Tongaonkar, R. Torres, M. Iliofotou, R. Keralapura,
and A. Nucci, Towards self adaptive network traffic
classification, Computer Communications, vol. 56, no. 1,
pp. 35–46, 2015.
[21] Y. Freund and R. E. Schapire, Experiments with a new
boosting algorithm, in Int’l Conf. Machine Learning
(ICML), 1996, pp. 148–156.
[22] B. Liu, M. J. Carey, and S. Ceri, Web Data Mining.
Springer, 2011.
[23] G. E. P. Box, G. M. Jenkins, and G. C. Reinsel, Time Series
Analysis: Forecasting and Control. John Wiley & Sons,
2008.
[24] D. Zhao, I. Traore, B. Sayed, W. Lu, S. Saad, A. Ghorbani,
and D. Garant, Botnet detection based on traffic behavior
analysis and flow intervals, Computers & Security, vol. 39,
pp. 2–16, 2013.
[25] Y. D. Lin, Y. C. Lai, C. N. Lu, P. K. Hsu, and
C. Y. Lee, Three-phase behavior-based detection and
classification of known and unknown malware, Security
and Communication Networks, vol. 8, no. 11, pp. 2004–
2015, 2015.
[26] R. Koch, M. Golling, and G. D. Rodosek, Behavior-
based intrusion detection in encrypted environments,
Communications Magazine, vol. 52, no. 7, pp. 124–131,
2014.
[27] L. Chen, X. S. Chen, J. F. Jiang, X. Y. Yin, and G. L.
Shao, Research and practice of dynamic network security
architecture for IaaS platforms, Tsinghua Science and
Technology, vol. 19, no. 5, pp. 496–507, 2014.
[28] KDD Cup 1999 Data, http://kdd.ics.uci.edu/databases/
kddcup99/kddcup99.html, 2015.
[29] P. A. R. Kumar and S. Selvakumar, Detection of distributed
denial of service attacks using an ensemble of adaptive and
hybrid neuro-fuzzy systems, Computer Communications,
vol. 36, no. 3, pp. 303–319, 2013.
[30] S. S. Sathya, R. G. Ramani, and K. Sivaselvi, Discriminant
analysis based feature selection in kdd intrusion dataset,
International Journal of Computer Applications, vol. 31,
no. 11, pp. 1–7, 2011.
[31] P. Casas, J. Mazel, and P. Owezarski, Unsupervised
network intrusion detection systems: Detecting the
unknown without knowledge, Computer Communications,
vol. 35, no. 7, pp. 772–783, 2011.
Xiaoming Ye is a PhD candidate at
College of Computer Science of Sichuan
University. She got the BE degree from
College of Information Engineering of
Jiangnan University in 2005 and MS
degree from College of Computer Science
of Sichuan University in 2008. Her
research interests include cyber security
and big data analytics.
Xingshu Chen received the PhD degree
from Sichuan University in 2004. She
is now a professor of the College of
Computer Science and Cybersecurity
Research Institute of Sichuan University.
She is the member of China Information
Security Standardization Technical
Committee. Her research interests include
cloud computing, cloud security, distributed file system, big
data processing, network protocol analysis, and new media
supervision.
Haizhou Wang received the BE degree
and PhD degree from College of Computer
Science, Sichuan University, China, in
2008 and 2014, respectively. From 2013
to 2014, he visited University of Toronto.
He is currently a lecturer in the College
of Computer Science, Sichuan University,
China. His research interests include peer-
to-peer streaming system, information security, and network
measurement.
Xuemei Zeng is a PhD candidate at
College of Computer Science of Sichuan
University. She received the MS degree
from Computer Science College of Sichuan
University in 2004. Her current research
interests include computer and network
security, big data, and cloud computing
security.
Guolin Shao is a PhD candidate of
College of Computer Science of Sichuan
University. He got the BE degree from
Sichuan University in 2013. His general
research interests lie in cyber security.
Xueyuan Yin is a PhD candidate at
College of Computer Science of Sichuan
University. He got the BE degree from
Sichuan University in 2008. His research
interests mainly focus on computer
network and information security.
Chun Xu received the PhD degree from
Sichuan University in 2008. He is now
an associate professor of the College
of Cybersecurity Research Institute of
Sichuan University. His research interests
mainly focus on computer network and
information security.
www.redpel.com +917620593389
www.redpel.com +917620593389

More Related Content

What's hot

Nice network intrusion detection and countermeasure
Nice network intrusion detection and countermeasureNice network intrusion detection and countermeasure
Nice network intrusion detection and countermeasureIEEEFINALYEARPROJECTS
 
A review of security attacks and intrusion detection schemes in wireless sens...
A review of security attacks and intrusion detection schemes in wireless sens...A review of security attacks and intrusion detection schemes in wireless sens...
A review of security attacks and intrusion detection schemes in wireless sens...ijwmn
 
HYBRID ARCHITECTURE FOR DISTRIBUTED INTRUSION DETECTION SYSTEM IN WIRELESS NE...
HYBRID ARCHITECTURE FOR DISTRIBUTED INTRUSION DETECTION SYSTEM IN WIRELESS NE...HYBRID ARCHITECTURE FOR DISTRIBUTED INTRUSION DETECTION SYSTEM IN WIRELESS NE...
HYBRID ARCHITECTURE FOR DISTRIBUTED INTRUSION DETECTION SYSTEM IN WIRELESS NE...IJNSA Journal
 
A New Way of Identifying DOS Attack Using Multivariate Correlation Analysis
A New Way of Identifying DOS Attack Using Multivariate Correlation AnalysisA New Way of Identifying DOS Attack Using Multivariate Correlation Analysis
A New Way of Identifying DOS Attack Using Multivariate Correlation Analysisijceronline
 
a system for denial-of-service attack detection based on multivariate correla...
a system for denial-of-service attack detection based on multivariate correla...a system for denial-of-service attack detection based on multivariate correla...
a system for denial-of-service attack detection based on multivariate correla...swathi78
 
a system for denial-of-service attack detection based on multivariate correla...
a system for denial-of-service attack detection based on multivariate correla...a system for denial-of-service attack detection based on multivariate correla...
a system for denial-of-service attack detection based on multivariate correla...swathi78
 
IRJET - A Secure Approach for Intruder Detection using Backtracking
IRJET -  	  A Secure Approach for Intruder Detection using BacktrackingIRJET -  	  A Secure Approach for Intruder Detection using Backtracking
IRJET - A Secure Approach for Intruder Detection using BacktrackingIRJET Journal
 
Iaetsd a survey on detecting denial-of-service attacks
Iaetsd a survey on detecting denial-of-service attacksIaetsd a survey on detecting denial-of-service attacks
Iaetsd a survey on detecting denial-of-service attacksIaetsd Iaetsd
 
A system for denial of-service attack detection based on multivariate correla...
A system for denial of-service attack detection based on multivariate correla...A system for denial of-service attack detection based on multivariate correla...
A system for denial of-service attack detection based on multivariate correla...IGEEKS TECHNOLOGIES
 
Review of Security Issues in Mobile Wireless Sensor Networks
Review of Security Issues in Mobile Wireless Sensor NetworksReview of Security Issues in Mobile Wireless Sensor Networks
Review of Security Issues in Mobile Wireless Sensor NetworksEswar Publications
 
A DEFENSIVE MECHANISM CROSS LAYER ARCHITECTURE FOR MANETS TO IDENTIFY AND COR...
A DEFENSIVE MECHANISM CROSS LAYER ARCHITECTURE FOR MANETS TO IDENTIFY AND COR...A DEFENSIVE MECHANISM CROSS LAYER ARCHITECTURE FOR MANETS TO IDENTIFY AND COR...
A DEFENSIVE MECHANISM CROSS LAYER ARCHITECTURE FOR MANETS TO IDENTIFY AND COR...IJNSA Journal
 
SECURED AODV TO PROTECT WSN AGAINST MALICIOUS INTRUSION
SECURED AODV TO PROTECT WSN AGAINST MALICIOUS INTRUSIONSECURED AODV TO PROTECT WSN AGAINST MALICIOUS INTRUSION
SECURED AODV TO PROTECT WSN AGAINST MALICIOUS INTRUSIONIJNSA Journal
 
Wireless Sensor Networks: An Overview on Security Issues and Challenges
Wireless Sensor Networks: An Overview on Security Issues and ChallengesWireless Sensor Networks: An Overview on Security Issues and Challenges
Wireless Sensor Networks: An Overview on Security Issues and ChallengesIJAEMSJORNAL
 
A technical review and comparative analysis of machine learning techniques fo...
A technical review and comparative analysis of machine learning techniques fo...A technical review and comparative analysis of machine learning techniques fo...
A technical review and comparative analysis of machine learning techniques fo...IJECEIAES
 
A hierarchical security framework for defending against sophisticated attacks...
A hierarchical security framework for defending against sophisticated attacks...A hierarchical security framework for defending against sophisticated attacks...
A hierarchical security framework for defending against sophisticated attacks...redpel dot com
 
A NOVEL TWO-STAGE ALGORITHM PROTECTING INTERNAL ATTACK FROM WSNS
A NOVEL TWO-STAGE ALGORITHM PROTECTING  INTERNAL ATTACK FROM WSNSA NOVEL TWO-STAGE ALGORITHM PROTECTING  INTERNAL ATTACK FROM WSNS
A NOVEL TWO-STAGE ALGORITHM PROTECTING INTERNAL ATTACK FROM WSNSIJCNC
 

What's hot (19)

Nice network intrusion detection and countermeasure
Nice network intrusion detection and countermeasureNice network intrusion detection and countermeasure
Nice network intrusion detection and countermeasure
 
A review of security attacks and intrusion detection schemes in wireless sens...
A review of security attacks and intrusion detection schemes in wireless sens...A review of security attacks and intrusion detection schemes in wireless sens...
A review of security attacks and intrusion detection schemes in wireless sens...
 
HYBRID ARCHITECTURE FOR DISTRIBUTED INTRUSION DETECTION SYSTEM IN WIRELESS NE...
HYBRID ARCHITECTURE FOR DISTRIBUTED INTRUSION DETECTION SYSTEM IN WIRELESS NE...HYBRID ARCHITECTURE FOR DISTRIBUTED INTRUSION DETECTION SYSTEM IN WIRELESS NE...
HYBRID ARCHITECTURE FOR DISTRIBUTED INTRUSION DETECTION SYSTEM IN WIRELESS NE...
 
A New Way of Identifying DOS Attack Using Multivariate Correlation Analysis
A New Way of Identifying DOS Attack Using Multivariate Correlation AnalysisA New Way of Identifying DOS Attack Using Multivariate Correlation Analysis
A New Way of Identifying DOS Attack Using Multivariate Correlation Analysis
 
Ar34261268
Ar34261268Ar34261268
Ar34261268
 
a system for denial-of-service attack detection based on multivariate correla...
a system for denial-of-service attack detection based on multivariate correla...a system for denial-of-service attack detection based on multivariate correla...
a system for denial-of-service attack detection based on multivariate correla...
 
H1803025360
H1803025360H1803025360
H1803025360
 
a system for denial-of-service attack detection based on multivariate correla...
a system for denial-of-service attack detection based on multivariate correla...a system for denial-of-service attack detection based on multivariate correla...
a system for denial-of-service attack detection based on multivariate correla...
 
IRJET - A Secure Approach for Intruder Detection using Backtracking
IRJET -  	  A Secure Approach for Intruder Detection using BacktrackingIRJET -  	  A Secure Approach for Intruder Detection using Backtracking
IRJET - A Secure Approach for Intruder Detection using Backtracking
 
Iaetsd a survey on detecting denial-of-service attacks
Iaetsd a survey on detecting denial-of-service attacksIaetsd a survey on detecting denial-of-service attacks
Iaetsd a survey on detecting denial-of-service attacks
 
A system for denial of-service attack detection based on multivariate correla...
A system for denial of-service attack detection based on multivariate correla...A system for denial of-service attack detection based on multivariate correla...
A system for denial of-service attack detection based on multivariate correla...
 
Review of Security Issues in Mobile Wireless Sensor Networks
Review of Security Issues in Mobile Wireless Sensor NetworksReview of Security Issues in Mobile Wireless Sensor Networks
Review of Security Issues in Mobile Wireless Sensor Networks
 
A DEFENSIVE MECHANISM CROSS LAYER ARCHITECTURE FOR MANETS TO IDENTIFY AND COR...
A DEFENSIVE MECHANISM CROSS LAYER ARCHITECTURE FOR MANETS TO IDENTIFY AND COR...A DEFENSIVE MECHANISM CROSS LAYER ARCHITECTURE FOR MANETS TO IDENTIFY AND COR...
A DEFENSIVE MECHANISM CROSS LAYER ARCHITECTURE FOR MANETS TO IDENTIFY AND COR...
 
M026075079
M026075079M026075079
M026075079
 
SECURED AODV TO PROTECT WSN AGAINST MALICIOUS INTRUSION
SECURED AODV TO PROTECT WSN AGAINST MALICIOUS INTRUSIONSECURED AODV TO PROTECT WSN AGAINST MALICIOUS INTRUSION
SECURED AODV TO PROTECT WSN AGAINST MALICIOUS INTRUSION
 
Wireless Sensor Networks: An Overview on Security Issues and Challenges
Wireless Sensor Networks: An Overview on Security Issues and ChallengesWireless Sensor Networks: An Overview on Security Issues and Challenges
Wireless Sensor Networks: An Overview on Security Issues and Challenges
 
A technical review and comparative analysis of machine learning techniques fo...
A technical review and comparative analysis of machine learning techniques fo...A technical review and comparative analysis of machine learning techniques fo...
A technical review and comparative analysis of machine learning techniques fo...
 
A hierarchical security framework for defending against sophisticated attacks...
A hierarchical security framework for defending against sophisticated attacks...A hierarchical security framework for defending against sophisticated attacks...
A hierarchical security framework for defending against sophisticated attacks...
 
A NOVEL TWO-STAGE ALGORITHM PROTECTING INTERNAL ATTACK FROM WSNS
A NOVEL TWO-STAGE ALGORITHM PROTECTING  INTERNAL ATTACK FROM WSNSA NOVEL TWO-STAGE ALGORITHM PROTECTING  INTERNAL ATTACK FROM WSNS
A NOVEL TWO-STAGE ALGORITHM PROTECTING INTERNAL ATTACK FROM WSNS
 

Similar to An anomalous behavior detection model in cloud computing

Secure intrusion detection and attack measure selection in virtual network sy...
Secure intrusion detection and attack measure selection in virtual network sy...Secure intrusion detection and attack measure selection in virtual network sy...
Secure intrusion detection and attack measure selection in virtual network sy...Uvaraj Shan
 
2014 IEEE DOTNET PARALLEL DISTRIBUTED PROJECT A system-for-denial-of-service-...
2014 IEEE DOTNET PARALLEL DISTRIBUTED PROJECT A system-for-denial-of-service-...2014 IEEE DOTNET PARALLEL DISTRIBUTED PROJECT A system-for-denial-of-service-...
2014 IEEE DOTNET PARALLEL DISTRIBUTED PROJECT A system-for-denial-of-service-...IEEEGLOBALSOFTSTUDENTSPROJECTS
 
IEEE 2014 DOTNET PARALLEL DISTRIBUTED PROJECTS A system-for-denial-of-service...
IEEE 2014 DOTNET PARALLEL DISTRIBUTED PROJECTS A system-for-denial-of-service...IEEE 2014 DOTNET PARALLEL DISTRIBUTED PROJECTS A system-for-denial-of-service...
IEEE 2014 DOTNET PARALLEL DISTRIBUTED PROJECTS A system-for-denial-of-service...IEEEMEMTECHSTUDENTPROJECTS
 
A Survey on Hidden Markov Model (HMM) Based Intention Prediction Techniques
A Survey on Hidden Markov Model (HMM) Based Intention Prediction TechniquesA Survey on Hidden Markov Model (HMM) Based Intention Prediction Techniques
A Survey on Hidden Markov Model (HMM) Based Intention Prediction TechniquesIJERA Editor
 
A Survey on Hidden Markov Model (HMM) Based Intention Prediction Techniques
A Survey on Hidden Markov Model (HMM) Based Intention Prediction Techniques A Survey on Hidden Markov Model (HMM) Based Intention Prediction Techniques
A Survey on Hidden Markov Model (HMM) Based Intention Prediction Techniques IJERA Editor
 
Machine learning techniques applied to detect cyber attacks on web applications
Machine learning techniques applied to detect cyber attacks on web applicationsMachine learning techniques applied to detect cyber attacks on web applications
Machine learning techniques applied to detect cyber attacks on web applicationsVenkat Projects
 
Machine learning techniques applied to detect cyber attacks on web applications
Machine learning techniques applied to detect cyber attacks on web applicationsMachine learning techniques applied to detect cyber attacks on web applications
Machine learning techniques applied to detect cyber attacks on web applicationsVenkat Projects
 
Cyber-Defensive Architecture for Networked Industrial Control Systems
Cyber-Defensive Architecture for Networked Industrial Control SystemsCyber-Defensive Architecture for Networked Industrial Control Systems
Cyber-Defensive Architecture for Networked Industrial Control SystemsIJEACS
 
Hybrid Technique for Detection of Denial of Service (DOS) Attack in Wireless ...
Hybrid Technique for Detection of Denial of Service (DOS) Attack in Wireless ...Hybrid Technique for Detection of Denial of Service (DOS) Attack in Wireless ...
Hybrid Technique for Detection of Denial of Service (DOS) Attack in Wireless ...Eswar Publications
 
USE OF MARKOV CHAIN FOR EARLY DETECTING DDOS ATTACKS
USE OF MARKOV CHAIN FOR EARLY DETECTING DDOS ATTACKSUSE OF MARKOV CHAIN FOR EARLY DETECTING DDOS ATTACKS
USE OF MARKOV CHAIN FOR EARLY DETECTING DDOS ATTACKSIJNSA Journal
 
Broadband network virus detection system based on bypass monitor
Broadband network virus detection system based on bypass monitorBroadband network virus detection system based on bypass monitor
Broadband network virus detection system based on bypass monitorUltraUploader
 
Vulnerability Analysis of 802.11 Authentications and Encryption Protocols: CV...
Vulnerability Analysis of 802.11 Authentications and Encryption Protocols: CV...Vulnerability Analysis of 802.11 Authentications and Encryption Protocols: CV...
Vulnerability Analysis of 802.11 Authentications and Encryption Protocols: CV...AM Publications
 
A Study On Countermeasures Against Computer Virus Propagation Using An Agent-...
A Study On Countermeasures Against Computer Virus Propagation Using An Agent-...A Study On Countermeasures Against Computer Virus Propagation Using An Agent-...
A Study On Countermeasures Against Computer Virus Propagation Using An Agent-...Sara Perez
 
Mitchell-TR12-slide.pptx
Mitchell-TR12-slide.pptxMitchell-TR12-slide.pptx
Mitchell-TR12-slide.pptxMahmoudElsisi11
 
SECURING MOBILE AGENTS IN MANET AGAINST ATTACKS USING TRUST
SECURING MOBILE AGENTS IN MANET AGAINST ATTACKS USING TRUSTSECURING MOBILE AGENTS IN MANET AGAINST ATTACKS USING TRUST
SECURING MOBILE AGENTS IN MANET AGAINST ATTACKS USING TRUSTIJNSA Journal
 

Similar to An anomalous behavior detection model in cloud computing (20)

Secure intrusion detection and attack measure selection in virtual network sy...
Secure intrusion detection and attack measure selection in virtual network sy...Secure intrusion detection and attack measure selection in virtual network sy...
Secure intrusion detection and attack measure selection in virtual network sy...
 
2014 IEEE DOTNET PARALLEL DISTRIBUTED PROJECT A system-for-denial-of-service-...
2014 IEEE DOTNET PARALLEL DISTRIBUTED PROJECT A system-for-denial-of-service-...2014 IEEE DOTNET PARALLEL DISTRIBUTED PROJECT A system-for-denial-of-service-...
2014 IEEE DOTNET PARALLEL DISTRIBUTED PROJECT A system-for-denial-of-service-...
 
IEEE 2014 DOTNET PARALLEL DISTRIBUTED PROJECTS A system-for-denial-of-service...
IEEE 2014 DOTNET PARALLEL DISTRIBUTED PROJECTS A system-for-denial-of-service...IEEE 2014 DOTNET PARALLEL DISTRIBUTED PROJECTS A system-for-denial-of-service...
IEEE 2014 DOTNET PARALLEL DISTRIBUTED PROJECTS A system-for-denial-of-service...
 
A Survey on Hidden Markov Model (HMM) Based Intention Prediction Techniques
A Survey on Hidden Markov Model (HMM) Based Intention Prediction TechniquesA Survey on Hidden Markov Model (HMM) Based Intention Prediction Techniques
A Survey on Hidden Markov Model (HMM) Based Intention Prediction Techniques
 
A Survey on Hidden Markov Model (HMM) Based Intention Prediction Techniques
A Survey on Hidden Markov Model (HMM) Based Intention Prediction Techniques A Survey on Hidden Markov Model (HMM) Based Intention Prediction Techniques
A Survey on Hidden Markov Model (HMM) Based Intention Prediction Techniques
 
Machine learning techniques applied to detect cyber attacks on web applications
Machine learning techniques applied to detect cyber attacks on web applicationsMachine learning techniques applied to detect cyber attacks on web applications
Machine learning techniques applied to detect cyber attacks on web applications
 
Machine learning techniques applied to detect cyber attacks on web applications
Machine learning techniques applied to detect cyber attacks on web applicationsMachine learning techniques applied to detect cyber attacks on web applications
Machine learning techniques applied to detect cyber attacks on web applications
 
Cyber-Defensive Architecture for Networked Industrial Control Systems
Cyber-Defensive Architecture for Networked Industrial Control SystemsCyber-Defensive Architecture for Networked Industrial Control Systems
Cyber-Defensive Architecture for Networked Industrial Control Systems
 
Hybrid Technique for Detection of Denial of Service (DOS) Attack in Wireless ...
Hybrid Technique for Detection of Denial of Service (DOS) Attack in Wireless ...Hybrid Technique for Detection of Denial of Service (DOS) Attack in Wireless ...
Hybrid Technique for Detection of Denial of Service (DOS) Attack in Wireless ...
 
USE OF MARKOV CHAIN FOR EARLY DETECTING DDOS ATTACKS
USE OF MARKOV CHAIN FOR EARLY DETECTING DDOS ATTACKSUSE OF MARKOV CHAIN FOR EARLY DETECTING DDOS ATTACKS
USE OF MARKOV CHAIN FOR EARLY DETECTING DDOS ATTACKS
 
Secure final
Secure finalSecure final
Secure final
 
A05510105
A05510105A05510105
A05510105
 
Seminar
SeminarSeminar
Seminar
 
Utilization of Encryption for Security in SCADA Networks
Utilization of Encryption for Security in SCADA NetworksUtilization of Encryption for Security in SCADA Networks
Utilization of Encryption for Security in SCADA Networks
 
Sattt
SatttSattt
Sattt
 
Broadband network virus detection system based on bypass monitor
Broadband network virus detection system based on bypass monitorBroadband network virus detection system based on bypass monitor
Broadband network virus detection system based on bypass monitor
 
Vulnerability Analysis of 802.11 Authentications and Encryption Protocols: CV...
Vulnerability Analysis of 802.11 Authentications and Encryption Protocols: CV...Vulnerability Analysis of 802.11 Authentications and Encryption Protocols: CV...
Vulnerability Analysis of 802.11 Authentications and Encryption Protocols: CV...
 
A Study On Countermeasures Against Computer Virus Propagation Using An Agent-...
A Study On Countermeasures Against Computer Virus Propagation Using An Agent-...A Study On Countermeasures Against Computer Virus Propagation Using An Agent-...
A Study On Countermeasures Against Computer Virus Propagation Using An Agent-...
 
Mitchell-TR12-slide.pptx
Mitchell-TR12-slide.pptxMitchell-TR12-slide.pptx
Mitchell-TR12-slide.pptx
 
SECURING MOBILE AGENTS IN MANET AGAINST ATTACKS USING TRUST
SECURING MOBILE AGENTS IN MANET AGAINST ATTACKS USING TRUSTSECURING MOBILE AGENTS IN MANET AGAINST ATTACKS USING TRUST
SECURING MOBILE AGENTS IN MANET AGAINST ATTACKS USING TRUST
 

More from redpel dot com

An efficient tree based self-organizing protocol for internet of things
An efficient tree based self-organizing protocol for internet of thingsAn efficient tree based self-organizing protocol for internet of things
An efficient tree based self-organizing protocol for internet of thingsredpel dot com
 
Validation of pervasive cloud task migration with colored petri net
Validation of pervasive cloud task migration with colored petri netValidation of pervasive cloud task migration with colored petri net
Validation of pervasive cloud task migration with colored petri netredpel dot com
 
Web Service QoS Prediction Based on Adaptive Dynamic Programming Using Fuzzy ...
Web Service QoS Prediction Based on Adaptive Dynamic Programming Using Fuzzy ...Web Service QoS Prediction Based on Adaptive Dynamic Programming Using Fuzzy ...
Web Service QoS Prediction Based on Adaptive Dynamic Programming Using Fuzzy ...redpel dot com
 
Towards a virtual domain based authentication on mapreduce
Towards a virtual domain based authentication on mapreduceTowards a virtual domain based authentication on mapreduce
Towards a virtual domain based authentication on mapreduceredpel dot com
 
Toward a real time framework in cloudlet-based architecture
Toward a real time framework in cloudlet-based architectureToward a real time framework in cloudlet-based architecture
Toward a real time framework in cloudlet-based architectureredpel dot com
 
Protection of big data privacy
Protection of big data privacyProtection of big data privacy
Protection of big data privacyredpel dot com
 
Privacy preserving and delegated access control for cloud applications
Privacy preserving and delegated access control for cloud applicationsPrivacy preserving and delegated access control for cloud applications
Privacy preserving and delegated access control for cloud applicationsredpel dot com
 
Performance evaluation and estimation model using regression method for hadoo...
Performance evaluation and estimation model using regression method for hadoo...Performance evaluation and estimation model using regression method for hadoo...
Performance evaluation and estimation model using regression method for hadoo...redpel dot com
 
Frequency and similarity aware partitioning for cloud storage based on space ...
Frequency and similarity aware partitioning for cloud storage based on space ...Frequency and similarity aware partitioning for cloud storage based on space ...
Frequency and similarity aware partitioning for cloud storage based on space ...redpel dot com
 
Multiagent multiobjective interaction game system for service provisoning veh...
Multiagent multiobjective interaction game system for service provisoning veh...Multiagent multiobjective interaction game system for service provisoning veh...
Multiagent multiobjective interaction game system for service provisoning veh...redpel dot com
 
Efficient multicast delivery for data redundancy minimization over wireless d...
Efficient multicast delivery for data redundancy minimization over wireless d...Efficient multicast delivery for data redundancy minimization over wireless d...
Efficient multicast delivery for data redundancy minimization over wireless d...redpel dot com
 
Cloud assisted io t-based scada systems security- a review of the state of th...
Cloud assisted io t-based scada systems security- a review of the state of th...Cloud assisted io t-based scada systems security- a review of the state of th...
Cloud assisted io t-based scada systems security- a review of the state of th...redpel dot com
 
I-Sieve: An inline High Performance Deduplication System Used in cloud storage
I-Sieve: An inline High Performance Deduplication System Used in cloud storageI-Sieve: An inline High Performance Deduplication System Used in cloud storage
I-Sieve: An inline High Performance Deduplication System Used in cloud storageredpel dot com
 
Bayes based arp attack detection algorithm for cloud centers
Bayes based arp attack detection algorithm for cloud centersBayes based arp attack detection algorithm for cloud centers
Bayes based arp attack detection algorithm for cloud centersredpel dot com
 
Architecture harmonization between cloud radio access network and fog network
Architecture harmonization between cloud radio access network and fog networkArchitecture harmonization between cloud radio access network and fog network
Architecture harmonization between cloud radio access network and fog networkredpel dot com
 
Analysis of classical encryption techniques in cloud computing
Analysis of classical encryption techniques in cloud computingAnalysis of classical encryption techniques in cloud computing
Analysis of classical encryption techniques in cloud computingredpel dot com
 
A tutorial on secure outsourcing of large scalecomputation for big data
A tutorial on secure outsourcing of large scalecomputation for big dataA tutorial on secure outsourcing of large scalecomputation for big data
A tutorial on secure outsourcing of large scalecomputation for big dataredpel dot com
 
A parallel patient treatment time prediction algorithm and its applications i...
A parallel patient treatment time prediction algorithm and its applications i...A parallel patient treatment time prediction algorithm and its applications i...
A parallel patient treatment time prediction algorithm and its applications i...redpel dot com
 
A mobile offloading game against smart attacks
A mobile offloading game against smart attacksA mobile offloading game against smart attacks
A mobile offloading game against smart attacksredpel dot com
 
A distributed video management cloud platform using hadoop
A distributed video management cloud platform using hadoopA distributed video management cloud platform using hadoop
A distributed video management cloud platform using hadoopredpel dot com
 

More from redpel dot com (20)

An efficient tree based self-organizing protocol for internet of things
An efficient tree based self-organizing protocol for internet of thingsAn efficient tree based self-organizing protocol for internet of things
An efficient tree based self-organizing protocol for internet of things
 
Validation of pervasive cloud task migration with colored petri net
Validation of pervasive cloud task migration with colored petri netValidation of pervasive cloud task migration with colored petri net
Validation of pervasive cloud task migration with colored petri net
 
Web Service QoS Prediction Based on Adaptive Dynamic Programming Using Fuzzy ...
Web Service QoS Prediction Based on Adaptive Dynamic Programming Using Fuzzy ...Web Service QoS Prediction Based on Adaptive Dynamic Programming Using Fuzzy ...
Web Service QoS Prediction Based on Adaptive Dynamic Programming Using Fuzzy ...
 
Towards a virtual domain based authentication on mapreduce
Towards a virtual domain based authentication on mapreduceTowards a virtual domain based authentication on mapreduce
Towards a virtual domain based authentication on mapreduce
 
Toward a real time framework in cloudlet-based architecture
Toward a real time framework in cloudlet-based architectureToward a real time framework in cloudlet-based architecture
Toward a real time framework in cloudlet-based architecture
 
Protection of big data privacy
Protection of big data privacyProtection of big data privacy
Protection of big data privacy
 
Privacy preserving and delegated access control for cloud applications
Privacy preserving and delegated access control for cloud applicationsPrivacy preserving and delegated access control for cloud applications
Privacy preserving and delegated access control for cloud applications
 
Performance evaluation and estimation model using regression method for hadoo...
Performance evaluation and estimation model using regression method for hadoo...Performance evaluation and estimation model using regression method for hadoo...
Performance evaluation and estimation model using regression method for hadoo...
 
Frequency and similarity aware partitioning for cloud storage based on space ...
Frequency and similarity aware partitioning for cloud storage based on space ...Frequency and similarity aware partitioning for cloud storage based on space ...
Frequency and similarity aware partitioning for cloud storage based on space ...
 
Multiagent multiobjective interaction game system for service provisoning veh...
Multiagent multiobjective interaction game system for service provisoning veh...Multiagent multiobjective interaction game system for service provisoning veh...
Multiagent multiobjective interaction game system for service provisoning veh...
 
Efficient multicast delivery for data redundancy minimization over wireless d...
Efficient multicast delivery for data redundancy minimization over wireless d...Efficient multicast delivery for data redundancy minimization over wireless d...
Efficient multicast delivery for data redundancy minimization over wireless d...
 
Cloud assisted io t-based scada systems security- a review of the state of th...
Cloud assisted io t-based scada systems security- a review of the state of th...Cloud assisted io t-based scada systems security- a review of the state of th...
Cloud assisted io t-based scada systems security- a review of the state of th...
 
I-Sieve: An inline High Performance Deduplication System Used in cloud storage
I-Sieve: An inline High Performance Deduplication System Used in cloud storageI-Sieve: An inline High Performance Deduplication System Used in cloud storage
I-Sieve: An inline High Performance Deduplication System Used in cloud storage
 
Bayes based arp attack detection algorithm for cloud centers
Bayes based arp attack detection algorithm for cloud centersBayes based arp attack detection algorithm for cloud centers
Bayes based arp attack detection algorithm for cloud centers
 
Architecture harmonization between cloud radio access network and fog network
Architecture harmonization between cloud radio access network and fog networkArchitecture harmonization between cloud radio access network and fog network
Architecture harmonization between cloud radio access network and fog network
 
Analysis of classical encryption techniques in cloud computing
Analysis of classical encryption techniques in cloud computingAnalysis of classical encryption techniques in cloud computing
Analysis of classical encryption techniques in cloud computing
 
A tutorial on secure outsourcing of large scalecomputation for big data
A tutorial on secure outsourcing of large scalecomputation for big dataA tutorial on secure outsourcing of large scalecomputation for big data
A tutorial on secure outsourcing of large scalecomputation for big data
 
A parallel patient treatment time prediction algorithm and its applications i...
A parallel patient treatment time prediction algorithm and its applications i...A parallel patient treatment time prediction algorithm and its applications i...
A parallel patient treatment time prediction algorithm and its applications i...
 
A mobile offloading game against smart attacks
A mobile offloading game against smart attacksA mobile offloading game against smart attacks
A mobile offloading game against smart attacks
 
A distributed video management cloud platform using hadoop
A distributed video management cloud platform using hadoopA distributed video management cloud platform using hadoop
A distributed video management cloud platform using hadoop
 

Recently uploaded

AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfAMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfphamnguyenenglishnb
 
Gas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxGas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxDr.Ibrahim Hassaan
 
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONTHEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONHumphrey A Beña
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...Nguyen Thanh Tu Collection
 
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...Postal Advocate Inc.
 
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxBarangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxCarlos105
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceSamikshaHamane
 
How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17Celine George
 
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfLike-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfMr Bounab Samir
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Celine George
 
ENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomnelietumpap1
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTiammrhaywood
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designMIPLM
 
Judging the Relevance and worth of ideas part 2.pptx
Judging the Relevance  and worth of ideas part 2.pptxJudging the Relevance  and worth of ideas part 2.pptx
Judging the Relevance and worth of ideas part 2.pptxSherlyMaeNeri
 
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSGRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSJoshuaGantuangco2
 

Recently uploaded (20)

AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfAMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
 
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptxYOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
 
Gas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxGas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptx
 
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONTHEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
 
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
 
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxBarangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in Pharmacovigilance
 
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptxLEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
 
How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17
 
OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...
 
Raw materials used in Herbal Cosmetics.pptx
Raw materials used in Herbal Cosmetics.pptxRaw materials used in Herbal Cosmetics.pptx
Raw materials used in Herbal Cosmetics.pptx
 
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfLike-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17
 
ENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choom
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
 
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptxYOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-design
 
Judging the Relevance and worth of ideas part 2.pptx
Judging the Relevance  and worth of ideas part 2.pptxJudging the Relevance  and worth of ideas part 2.pptx
Judging the Relevance and worth of ideas part 2.pptx
 
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSGRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
 

An anomalous behavior detection model in cloud computing

  • 1. TSINGHUA SCIENCE AND TECHNOLOGY ISSNll1007-0214ll08/11llpp322–332 Volume 21, Number 3, June 2016 An Anomalous Behavior Detection Model in Cloud Computing Xiaoming Ye, Xingshu Chen , Haizhou Wang, Xuemei Zeng, Guolin Shao, Xueyuan Yin, and Chun Xu Abstract: This paper proposes an anomalous behavior detection model based on cloud computing. Virtual Machines (VMs) are one of the key components of cloud Infrastructure as a Service (IaaS). The security of such VMs is critical to IaaS security. Many studies have been done on cloud computing security issues, but research into VM security issues, especially regarding VM network traffic anomalous behavior detection, remains inadequate. More and more studies show that communication among internal nodes exhibits complex patterns. Communication among VMs in cloud computing is invisible. Researchers find such issues challenging, and few solutions have been proposed—leaving cloud computing vulnerable to network attacks. This paper proposes a model that uses Software-Defined Networks (SDN) to implement traffic redirection. Our model can capture inter-VM traffic, detect known and unknown anomalous network behaviors, adopt hybrid techniques to analyze VM network behaviors, and control network systems. The experimental results indicate that the effectiveness of our approach is greater than 90%, and prove the feasibility of the model. Key words: virtual machine; network behavior; anomaly detection; cloud computing 1 Introduction Cloud computing infrastructure is a hybrid networking system, that integrates hybrid technology, hybrid operating systems, and hybrid hardware. Cloud computing aims to provide on-demand, low-cost, high-performance computing resources, and leverages virtualization technologies to deliver storage, server, network services, CPU, and memory[1] . Cloud computing has to face traditional security threats and new generations of security threats. Cloud computing vulnerabilities include core technology vulnerabilities (e.g., Web applications and services, virtualization, and cryptography), essential cloud characteristic vulnerabilities (e.g., unauthorized Xiaoming Ye, Xingshu Chen, Haizhou Wang, Xuemei Zeng, Guolin Shao, Xueyuan Yin, and Chun Xu are with the College of Computer Science, Cybersecurity Research Institute, Sichuan University, Chengdu 610065, China. E-mail: yexm.edu@gmail.com; chenxsh@scu.edu.cn; whzh.nc@scu. edu.cn; zengxm@scu.edu.cn; sgllearn@163.com; yinxueyuan@ msn.com; xchun@scu.edu.cn. To whom correspondence should be addressed. Manuscript received: 2016-01-09; accepted: 2016-03-07 access to management interfaces, Internet protocol vulnerabilities, etc.), and defects in known security controls, and prevalent vulnerabilities (e.g., injection vulnerabilities and weak authentication schemes)[2] . Attackers find vulnerabilities and use them to undertake attacks. There have been many attacks against virtual machines on cloud computing platforms, such as various port scanning attack, attacks on hypervisors, attacks on virtualization, backdoor channel attacks, flooding attacks, user-to-root attacks, and insider attacks (e.g., internal denial-of-service attacks via zombies in the cloud)[3] . Virtualization technology is a core technology in cloud computing. Virtual Machines (VMs) are key components of cloud infrastructure. For example, virtualization technology enables the execution of multiple operating system environments, or VM instances, on a single hardware system. Each VM owns an operating system and applications. A VM executes programs like a physical machine. Cloud computing contains both physical and virtual networks[4] . Virtualization creates blind spots of network traffic, or invisible networks, in the same server infrastructure. Gartner[5] represented six of the www.redpel.com +917620593389 www.redpel.com +917620593389
  • 2. Xiaoming Ye et al.: An Anomalous Behavior Detection Model in Cloud Computing 323 most common virtualization security risks, including noting that “the lack of visibility and controls on internal virtual networks created for VM-to- VM communications blinds existing security policy enforcement mechanisms”. He said that more than 60% of virtual machines in production are less secure than their physical counterparts. VMs are losing their ability to detect and control this communication. Attacks and data can move through the VMs without ever going out to the physical network, which means these attacks will not be detected by traditional tools. To deal with this vulnerability, making all VM communications traffic visible is the first problem that needs to be solved. Currently, the challenge is how to establish an effective network behavior detection system for each VM in a cloud computing network, so that it can accurately identify deviations from normal network behavior of the virtual machines, and reduce cloud security risks. This paper proposes a model to detect anomaly behavior for the VMs in cloud computing. This model is a time-varying system with a number of network traffic features. Here are the main work and contributions of this paper: Communications among VMs in cloud are invisible. The model uses Software-Defined Networks (SDN) to build a virtual network, so that the virtual switch network traffic is through the physical network card, then to the node where the deployed system resides. The model aims to detect known and unknown anomalous behaviors. This paper designs a control model, and adopts hybrid techniques to analyze VM network behaviors and control network systems. The remainder of this paper is organized as follows. Section 2 introduces state machine definitions and components of the model and methods of state analysis. Section 3 introduces Snort, data processing, application behavior analysis, and decision analysis. The algorithm and technologies used in this paper are also discussed. Experiments were conducted and the results are discussed in Section 4. Conclusions and future work are presented in Section 5. 2 Model Overview 2.1 State definitions Network behavior has various forms and means of changing characteristics. We cannot describe and identify all the anomalous behaviors of networks but can describe states that characterize a VM under attack. Before the attack, a malicious user tries to scan VMs and search for vulnerabilities or ports to find the cloud computing infrastructure security “holes”. The attacker then has a planned, purposeful, step-by-step process to undertake the attack, including an attack action plan, tests, and a complete attack process. Normal VM network behavior is a state of dynamic equilibrium. Network attacks will affect this state, which is defined as follows: Definition 1 (Homeostasis, S1): Currently, the virtual machine is running properly, the network traffic situation is in dynamic equilibrium. Virtual machines have vulnerabilities and other security threats, but they have not been detected or used. Definition 2 (Before imbalances, S2): Suppose anomalous behaviors of network traffic are detected, such as vulnerability scanning. In this state, VM security threats have been detected, but have not yet been utilized by an attacker. Definition 3 (Imbalances early, S3): Suppose anomalous network traffic behaviors are detected more than once. An attacker has detected vulnerabilities in the virtual machine, and exploited them. Definition 4 (Imbalance, S4): Network traffic anomalies are repeatedly detected. The VM is under continuous cyber-attacks. Figure 1 depicts the transition of virtual machine states under attack. The sequence starts at state S1. Attack behaviors make VM state S1 activate states S2, S3, and S4. When anomalous behavior has been controlled, the VM state returns to a state of dynamic equilibrium. Fig. 1 VM state transition. www.redpel.com +917620593389 www.redpel.com +917620593389
  • 3. 324 Tsinghua Science and Technology, June 2016, 21(3): 322–332 Through application behavior analysis, the model determines whether or not application behavior deviates from normal. According to this, the model can be used to describe VM state transitions. The details of its algorithm will be given in Section 2:3. 2.2 Components This paper proposes a cloud computing anomalous behavior detection model. The model can detect known and unknown anomalous behaviors. Hybrid techniques are used to detect anomalies. The model determines whether the network behavior of a virtual machine deviates from normal. Figure 2 describes the model components and detection processes. This model consists of VM profiles, Snort, data processing, application behavior analysis, state analysis modules, and decision analysis. The VM profile module is a dataset used to store and manage VM profiles based on traffic analysis. Application behavior states are used to build a set of VM profiles. The information includes the services, the software version number, open port, IP address, MAC address, and rules. In addition, it also includes rules for communication among virtual machines, and between virtual machines and physical machines. These profiles include VM security rules among other features. VM network traffic passes through Snort first. This module is used to detect known anomalous behaviors. Fig. 2 Model components. Snort uses detection rules based on signature. The model first executes a Snort module, which provides known anomaly detection, improves the detection rate, and reduces the computational cost. Then network traffic flows into the next detection module. The Snort model not only uses the known anomaly behavior rule base, but also reduces the volume of traffic that must be processed in the next module. The model then performs application behavior analysis. This module has two parts. In the first part, traffic classification is performed to identify applications. This part manipulates the training examples and produces multiple classifiers to improve the application classification accuracy. In the second part, the application behavior analysis module uses time series to build a baseline for each application. Considering the normal network behavior of VMs, time series analysis is used. For example, people work during the day and rest at night. People work from Monday to Friday and rest on Saturday and Sunday. Other regular behaviors include data backup, “application heartbeat”, and periodic behaviors that are repeated. This module aims to detect unknown anomalous behaviors. So the properties of applications for each VM are stored. The algorithm of this module is given below. Finally, the results of detection from Snort and the application behavior analysis module are saved as anomaly records. In order to improve detection accuracy, the decision analysis module uses the records for in-depth analysis. The algorithm is below. After the application behavior analysis, the VM profile information is updated. According to this, the model can describe the states of the VMs in cloud. The formulas are described below. 2.3 State analysis VM profiles have summary information about each VM in the cloud collected from traffic. For each application, detection results from Snort and behavior analysis are added to the VM profiles. Other information includes number of services, open port number, number of flows, number of outgoing connections, number of incoming connections, maximum value of each connection, and duration. In addition, it also includes rules for communication between virtual machines, as well as for communication between virtual machines and physical machines. Ak represents the anomalous performance of the k- www.redpel.com +917620593389 www.redpel.com +917620593389
  • 4. Xiaoming Ye et al.: An Anomalous Behavior Detection Model in Cloud Computing 325 th VM in the cloud as discussed in Section 2.1. In this method, the state of each VM is shown in three forms A.1/ , A.2/ , and A.3/ . Its value is calculated by Eq. (1), where n.t/ is the random noise, and r1, r2, and r3 are parameters. vmk denotes the weight of the k-th VM using Eq. (20). A.1/ represents the degree of deviation of traffic periodicity of the VM using Eq. (6). A.2/ denotes the anomalous status of known applications (app) using Eq. (11). A.3/ denotes anomalous status of unknown applications (uapp) using Eq. (12). The anomalous performance of VMs is Ak D vmk.r1A.1/ C r2A.2/ C r3A.3/ / C n.t/ (1) Here’s how to compute A.1/ . A VM profile is a time- varying matrix with network traffic features that can describe the state of network traffic. A time series is a sequence of data usually at regular intervals of time during a specific period. The most important feature of this type of data is that neighboring observations are dependent on each other. This paper takes into account history data before time T .T1, T2, and T3 are three adjacent time before detection time T ), but also last week’s value WT, last month’s value MT, and last years value YT at each observing time as shown in Fig. 2. Thus, in Eq. (2), here are six values associated with given time, where m represents the total number of observation characteristics. Create a time matrix Stvm as follows: Stvm D 0 B @ w11 : : : w16 ::: ::: ::: wm1 : : : wm6 1 C A (2) Build a vector base on each time window Wi at time t, where W1 represents T1, W2 represents T2, W3 represents T3, W4 represents WT, W5 represents MT, and W6 represents YT. Wi D .w1i ; w2i ; :::; wmi /T (3) Stvm D .W1; W2; W3; W4; W5; W6/ (4) The model then uses Euclidean distance to measure the transformation. It means the likelihood of an anomalous VM state performance can be expressed by the distance spanned by the time window vector. The Euclidean distance can be expressed as dist.Wi ; Wj / D v u u t mX kD1 .wki wkj /2 (5) A weight ˇi is associated with each time window to express its importance in relation to time T. A.1/ D 1 6 6X iD1 .ˇi dist.WT ; Wi // (6) Here’s how to compute A.2/ . In the following equations appi represents the i-th application. The likelihood of anomalous application performance can be expressed in detail by considering factors such as the probability of presence of the application in traffic: Fi DPrfappi g Prfanomalyjappi g D Prfappi g fappi is suspiciousjappi g Prfappi is anonalousjappi is suspiciousg D F1i F2i F3i D 3Y j D1 Fji (7) In Eq. (7), Fi denotes the status of the i-th application, which consists of three viewpoints F1i , F2i , and F3i . F1i represents the probability of the i- th application in traffic, F2i represents the probability of a detected anomaly in Snort or application behavior analysis in the i-th application, but not in the results of the decision analysis module. F3i represents the probability of an anomaly being found in the decision analysis module. F1i , F2i , and F3i can be calculated by Eqs. (8) – (10). F1i D Number of connections to appi Total number of connections (8) F2i D Number of anomaly alert appi Number of connections to appi (9) F3i D Number of anomaly appi Number of anomaly alert appi (10) A weight is associated with the importance of the appi . k represents the number of the applications. The normalized A.2/ from Eqs. (8) – (10) can be given as A.2/ D 1 1 C e kP iD1 i 3Q jD1 Fji (11) Below is the formula for computing A.3/ . The likelihood of anomalous behavior in unknown applications (uapp) can be expressed by considering factors such as the probability of presence of the unknown applications in traffic: A.3/ D Prfuappg Prfanomalyjuappg D N1 N2 (12) N1 D Number of connections to uapp Total number of connections (13) N2 D Number of alerts to uapp Total number of alerts (14) So the anomalous performance of the k-th VM from www.redpel.com +917620593389 www.redpel.com +917620593389
  • 5. 326 Tsinghua Science and Technology, June 2016, 21(3): 322–332 Eqs. (6), (11), and (12) can be calculated by Eq. (15). Ak Dvmk r1 n nX iD1 .ˇi dist.Wt ; Wi //C r2 1 C e kP iD1 i Q3 jD1 Fji C r3 2Y iD1 Ni ! C n.t/ (15) Even a single VM is considered important in the cloud if it is connected to many VMs, which multiply the impact of each VM. vmk is an impact factor associated with the VM’s importance in the cloud. Now we show how to compute vmk. Figure 3 shows a sample connection graph. Each node represents a VM, where Vk denotes the k-th VM, and Pj denotes the j-th port of the VM. A connection between V1 and V3 exists if a flow record having these addresses is observed. Between nodes V1 and V3 there are three edges representing three flow records from IP address V1 to IP address V3 with different port numbers. According to given sample, there are three edges between V1 and V3. The vector V.k/ represents the connections of the k-th VM with other VMs, where V.1/ , V.2/ , and V.3/ can be expressed by Eqs. (16) – (18). The matrix V3 3 denoting the connections of the three VMs, is expressed by Eq. (19). V.1/ D . 0 0 3 /T (16) V.2/ D . 0 0 2 /T (17) V.3/ D . 3 2 0 /T (18) V3 3 D .V.1/ ; V.2/ ; V.3/ / D 0 B @ 0 0 3 0 0 2 3 2 0 1 C A (19) The normalized vmk can be calculated by Eq. (20), where u represents the total number of VMs. Fig. 3 Flow record sample for VMs connection graph. vmk D sum .V.W; k// uX iD1 sum .V.W; i// (20) The method proposed here can be used to describe the anomalous performance of VMs. Estimating the anomalous performance of VMs involves evaluating the situation and trend of the states of the VMs in the cloud. 3 Model Methodology 3.1 Snort Most security concerns have been addressed, and applying traditional security can prevent most intrusions by setting up defenses for each VM[6] . Deploying Intrusion Detection Systems (IDS) on the critical network flow entry is also a feasible solution[7] . Traditional IDS[8, 9] , intrusion prevention systems, and firewalls can be used to detect attacks in cloud computing. Snort[10] is a free and open source Network Intrusion Prevention System (NIPS) and a Network Intrusion Detection System (NIDS). Snort has the ability to analyze traffic in real time and log packets. Based on different configurations, Snort has a sniffer mode, a packet logger mode, and a network intrusion detection system mode[11] . We propose using a Bayesian classifier and Snort to detect network intrusions in cloud computing environments (see also closely related work in Ref. [12]). This approach has few false positives and affordable computational cost. An OpenFlow and Snort-based Intrusion Prevention System (IPS) is integrated to detect intrusions and deploy countermeasures by reconfiguring cloud computing. Our experimental results demonstrate the feasibility of this approach (see also closely related work in Ref. [13]). 3.2 Data processing 3.2.1 OpenFlow OpenFlow is an open protocol to program a flow table to deploy new protocols, without changing any networking devices, and it implements programmable networks. It thus makes it possible to experiment on production networks, without danger to operations. McKeown et al.[14] pioneered the control and forwarding separation architecture of OpenFlow. OpenFlow maintains a FlowTable in various switches and routers. The FlowTable includes packet-forwarding www.redpel.com +917620593389 www.redpel.com +917620593389
  • 6. Xiaoming Ye et al.: An Anomalous Behavior Detection Model in Cloud Computing 327 rules. According to the FlowTable, when a packet arrives at the network device, the rule set determines the packet forwarding. With programmable features, OpenFlow enables networks to reconfigure based on new rules. The paper proposed a new framework that implements network security monitoring using OpenFlow in cloud computing (see also closely related work in Ref. [15]). 3.2.2 Traffic redirection Internal virtual networks are invisible in cloud computing because their communication traffic does not flow in the same physical machine. Insider threats could increase the chance of malware infection of internal VMs and hosts from unknown neighbor applications. Therefore, a large volume of traffic is out of control. This model employs OpenFlow to build a virtual network, so that the virtual switch network traffic runs through the physical network card, and the network traffic flows to the deployed system with our programs. OpenFlow then allows all the network flows to be inspected. Figure 4 shows the virtual machine network traffic redirection. The model makes use of OpenFlow technology. OpenFlow can redirect the network traffic of VMs in the same physical machine to the deployed system. This solves the problem that the inter-VM traffic cannot be monitored and managed. And then the model employs OpenFlow to reconfigure control rules to prevent attacks. 3.2.3 Algorithm We designed Algorithm 1 to get information from flows or packets. The data processing module includes data packet parsing, reorganization of flow session, packet statistics, flow statistics, and a data access interface. NPC is the captured network package collection, which cannot use Snort to detect anomalous Fig. 4 Traffic redirection. Algorithm 1: Data Processing Input Data: NPC Output Data: F, G, Mp, Mf 1: While NPC is not null 2: Get packet p from NPC; 3: Add data packet p to queue p 0 ; 4: pi get data packet from queue p 0 ; 5: if (p not null) then 6: gi parse the header fields of data packet pi ; 7: add gi to G; 8: mi compute statistic vector of data packet gi ; 9: add mi to Mp; 10: if(pi 2 flow fi ) then 11: add pi to flow fi ; 12: fi update attributes of flow fi ; 13: if (pi is the last packet of flow fi ) then 14: ni compute statistic vector of flow fi ; 15: add ni to Mf; 16: end if 17: else 18: create fi ; 19: add pi to flow fi ; 20: fi initialize attributes of flow fi ; 21: add fi to F ; 22: end if 23: end if 24: end while network behaviors; F is a flow attribute vector set; and fi is a property of the flow. G is a data packet attributes vector set and gi is an attribute of a packet. Mp is a vector of statistical properties of a packet. Mf is a vector of statistical properties of the flow. A function of the data processing module is to prepare the dataset used by other modules. The system provides a uniform data access interface in order to perform quick and effective behavior detection. 3.3 Application behavior analysis 3.3.1 Application classification The variety of network applications in cloud computing has dramatically increased along with the growth of users. Accurate application traffic identification and classification is important for anomaly detection. This paper represents four goals of traffic classification, one of which is detecting unknown application or malicious flows[16] . Based on different grained features of network traffic, our research focuses on packet and flow data for traffic classification. At the packet level, the information is collected from packet headers and, optionally, parts of the payload. The www.redpel.com +917620593389 www.redpel.com +917620593389
  • 7. 328 Tsinghua Science and Technology, June 2016, 21(3): 322–332 IP quintuple of transport protocol, source IP address, destination IP address, source port, and destination port are common properties of a flow. At the flow level, the information can be collected from flow statistics. Network traffic classification has attracted many researchers over the past few years[17–20] . We focus on behaviors of applications when they deviate from normal behavior. This is a motivation of the work presented in this paper. The main characteristics of the network traffic used to identify the application are number of packets or bytes per second, number of packets payload (only one byte), number of packets payload (greater than one byte), sequence of number of byte on the first five packets payload, Dstatis of packets payload, Dstatis of packets interval, and Dstatis of TTL. Dstatis represents the statistical value of one characteristic, which contains minimum, maximum, variance, mean, median, and deviation. Application behavior analysis consists of two steps. The first step aims to identify applications. This module manipulates the training examples and produces multiple classifiers to improve the application classification accuracy. The second step aims to detect anomalous behaviors of the application. This paper adopts the AdaBoost algorithm given in Ref. [21]. AdaBoost produces a sequence of k classifiers, such as K-Means, Support Vector Machines (SVM), etc. The weight for all training examples is equal at beginning. In each iteration, the error of the previous classifier is calculated. If it is too large, delete the iteration and exit. Training examples that are incorrectly classified by the previous classifiers are given higher weights for the next classifier[22] . The iteration stops until the error rate reaches a predetermined value. Figure 5 shows the process of application classification. A application classifier is learned from the labelled training samples during the training phase and then the class label of every application is obtained from the trained classifier in the classification phase. Traffic samples that contain various applications (such as HTTP, QQ, PPLIVE, DNS, SSH, MSN, POP3, etc.) are collected. The module then uses time series technology to analyze applications. As mentioned previously, each module will get information from the data processing module. After identifying applications, this module gets various applications as input and then we use time series analysis method to detect anomalies based on application behaviors. Fig. 5 Classification processing. 3.3.2 Time series analysis The characteristics of networking behaviors are also closely correlated with history data (T1, T2, T3, WT, MT, and YT using Eq. (21)) as mentioned in Section 2.3. The time series is defined as in Ref. [23]. TS D fT1; T2; T3; WT; MT; YTg (21) C D .C1; C2; :::; Cm/ represents the value of the time T , where m is the total number of the application characteristics, and Ci represents the value of the i-th feature can be any characteristic of a network application (such as byte counts, packet counts, number of connection requests, source mask bits, destination mask bits, incoming and outgoing traffic, duration, average connection duration, protocol, packet rate, maximum or average packet, etc.). OC is the predicted value at time T. Â determines whether the application behavior deviates from normal. This means that some deviation between the forecast values and the values can be observed. This deviation is given by Eq. (22). Â.T / D C.T / OC.T / D .Â1; Â2; :::; Âm/ (22) Here’s how to compute OC using Eq. (23). jTSj denotes the size of the set TS. OCi D 1 jTSj sum .Ci .t// D 1 jTSj .Ci .T1/ C Ci .T2/C Ci .T3/ C Ci .MT/ C Ci .YT// (23) However, if the detection time is too short, you cannot show a regularity; if the time is too long you will have a lot of historical data as a basis, which is the next key issue to be resolved, along with determining threshold Â. 3.4 Decision analysis In order to improve detection accuracy, the decision analysis module uses the anomaly records for in-depth www.redpel.com +917620593389 www.redpel.com +917620593389
  • 8. Xiaoming Ye et al.: An Anomalous Behavior Detection Model in Cloud Computing 329 analysis, where the various computation processes are described in Algorithm 2. This module uses a self-training algorithm, which is an incremental algorithm. The known and unknown records of anomalous behaviors are used to construct a sample library. In this module, a Naive Bayesian classifier[22] is trained with the labeled set, which is applied to classify the unlabeled set. Then, the highest-confidence samples are added to the labeled samples. This process iterates until all the unlabeled samples are added to the labeled samples. The features A D .A1; A2; :::; Am/ are extracted from anomaly records, which are used to construct a sample library. If a number of labeled samples meet the condition, the system will get results through self- learning. The number of labeled samples will affect the final result, which is the next problem to be solved. Naive Bayesian is a classifier F. The task of classification can be regarded as estimating the class posterior probabilities. In this module, there are two classes. One is anomalous behaviors, the other is normal behaviors. Each sample is assigned to its most probable class. The self-training algorithm[22] is given. Z is labeled samples, .a1; a2; :::; am/ represents observed attributes. Using label samples Z, train Naive Bayesian Algorithm 2: Decision Analysis Input Data: Features of Network Traffic Output Data: y D fyes, nog 1: Train classifier F use labeled samples Z; 2: While unlabelled samples is not null 3: F.Q/; 4: for r 1 to jQj do 5: Compute per class Pr.C D cj / 6: Compute per feature Pr.Ai D ai jC D cj / 7: c1 D Pr.c D yes/ jAjQ iD1 Pr.A D ˛i jc D yes/ 8: c2 D Pr.c D no/ jAjQ iD1 Pr.A D ˛i jc D no/ 9: if (c1 > c2 and c1 > ") then 10: q:y D yes; 11: end if 12: if (c2 > c1 and c2 > ") then 13: q:y D no; 14: end if 15: Add q:y to Z; 16: remove q from Q; 17: end for 18: end while classifiers F. This classification is then used to classify the unlabeled sample Q; then the highest confidence samples are added to the labeled samples. This process iterates until all the unlabeled data have been given class labels. This module aims to find out which applications have anomalous behaviors. 4 Experiments The approach is able to establish a behavioral baseline of normal network activity for each service, and then when network activity deviates from a baseline, anomalous activity will be detected. Zhao et al.[24] proposed detection botnets for classifying network traffic behavior, and that it is possible to identify the presence of existing and unknown botnet activity with high accuracy. Lin et al.[25] proposed a behavior- based approach that can detect known and even unknown malware. Koch et al.[26] used behavior- based techniques to detect intrusions in encrypted environments. Behavior profiles of each VM and service are used to detect cooperative anomalous behavior in our approach. In order to detect anomalous network behaviors in cloud computing, we propose the model presented in Fig. 2. For illustration purposes, a cloud environment with several nodes is set up and we have used this platform to develop the security architecture for IaaS[27] . We deploy an experimental cloud computing platform based on a QEMU emulator v2.0.0 (Debian 2.0.0+dfsg-2ubuntu1), OpenStack IceHouse, and Open- Flow v1.3. We use the KDD-99 dataset as training data, which is used for the Third International Knowledge Discovery and Data Mining Tools Competition[28] . It contains 4 898 431 network connections with 41 network traffic features. There are seven discrete-valued features, and others are continuous-valued features. KDD-99 is well-known and widely used for network attack detection[29–31] . The system will first preprocess some text features into numeric features. As shown in Table 1, the service type “UDP” is mapped to 2. Then the system transforms continuous-valued features into discrete-valued features. KDD-99 is partitioned into ten equal-size disjoint subsets as training data, including six services in Table 1. For testing purposes, our system focuses on the same types of application traffic. Table 2 shows data distribution of connection records on six services, and www.redpel.com +917620593389 www.redpel.com +917620593389
  • 9. 330 Tsinghua Science and Technology, June 2016, 21(3): 322–332 Table 1 Data transformation. Types Class Value Protocol TCP 1 UDP 2 ICMP 3 Service login 1 http 2 shell 3 smtp 4 ssh 5 telnet 6 average accuracy of classification. In this experiment, the dataset is partitioned into ten equal-size disjoint subsets. The 10-fold cross-validation method is used. As shown in Fig. 6, this approach is able to classify almost one hundred percent of normal traffic. Detection of attack traffic decreases by approximate 3%-8% when the dataset is unbalanced for each class, which is left for future work. The results show that the proposed algorithms are able to classify a majority of the attack traffic. The experimental results indicate that the effectiveness of our approach is more than 90%, and the model can detect attacks accurately. A Receiver Operating Characteristic (ROC) curve is used to evaluate classification results. We aggregate the classification results, and demonstrate the effectiveness of this model. Figure 7 shows ROC curves for six Table 2 Data distribution on six services. Service type Attack (%) Accuracy (%) Attack precision (%) login 100.0000 99.9020 99.9899 http 0.6491 99.6813 95.8351 shell 99.5243 99.7106 99.7106 smtp 1.2252 99.8299 92.7589 ssh 99.3488 99.8095 99.9900 telnet 47.9308 92.1981 90.6363 services. Considering some acceptable behaviors can be classified as unacceptable, we plan to further evaluate the proposed approach using false negative analysis in the future. In terms of the per-service attack sample rate, “login”, “shell”, and “ssh” have the best classification performance across all services, due to the existence of large and long-duration attack flows in the training data. The effectiveness of the algorithms are evaluated in terms of its ability to distinguish attack traffic from normal traffic. We focus on the six services in this work and leave other types of services for future work. The experimental results show the feasibility and accuracy of our proposed approach. 5 Conclusion This paper presents an anomalous behavior detection model in cloud computing that takes into account hybrid data sources and hybrid approaches. Our proposed detection model can deal with both discrete and continuous attributes. Experimental results show that it has high precision values and low recall values. The model uses SDN programmable technology to solve the inter-VM network traffic that cannot be monitored. The VM states are analyzed to propose efficient countermeasures to fuse several analysis approaches for preventing and handling the anomalous traffic of VMs. A good direction for future work would be to study weights of samples and optimizing parameters of the proposed algorithm. We also hope to combine a deep learning algorithm and genetic algorithms to improve the accuracy of the model. Acknowledgment This work was supported by the National Natural Science Foundation of China (No. 61272447) and the National Fig. 6 Classification precision on ten subsets. www.redpel.com +917620593389 www.redpel.com +917620593389
  • 10. Xiaoming Ye et al.: An Anomalous Behavior Detection Model in Cloud Computing 331 Fig. 7 ROC curves of six services. Key Technologies Research and Development Program of China (No. 2012BAH18B05). References [1] N. Antonopoulos and L. Gillam, Cloud Computing: Principles, Systems and Applications. Springer Science Business Media, 2010. [2] B. Grobauer, T. Walloschek, and E. Stocker, Understanding cloud computing vulnerabilities, IEEE Security & Privacy, vol. 9, no. 2, pp. 50–57, 2011. [3] U. Oktay and O. K. Sahingoz, Attack types and intrusion detection systems in cloud computing, in 2013 6th International Information Security & Cryptology Conference, 2013, pp. 71–76. [4] R. George, Cloud Application Architectures: Building Applications and Infrastructure in the Cloud. O’Reilly Media, Inc., 2009. [5] Gartner Press Release, Gartnesr says 60 percent of virtualized servers will be less secure than the physical servers they replace through 2012, http:// www.gartner.com/newsroom/id/1322414, 2015. [6] J. H. Lee, M. W. Park, J. H. Eom, and T. M. Chung, Multilevel intrusion detection system and log management in cloud computing, in Advanced Communication Technology (ICACT), 2011 13th International Conference on. IEEE, 2011, pp. 552–555. [7] U. Tupakula, V. Varadharajan, and N. Akku, Intrusion detection techniques for infrastructure as a service cloud, in Dependable Dependable, Autonomic and Secure Computing (DASC), 2011 IEEE Ninth International Conference on, 2011, pp. 744–751. [8] P. Casas, J. Mazel, P. Owezarski, P. Casas, and J. Mazel, Unsupervised network intrusion detection systems: Detecting the unknown without knowledge, Computer Communications, vol. 35, no. 7, pp. 772–783, 2012. [9] L. Koc, T. A. Mazzuchi, and S. Sarkani, A network intrusion detection system based on a hidden na¨ıve Bayes multiclass classifier, Expert Systems with Applications, vol. 39, no. 18, pp. 13492–13500, 2012. [10] Snort, https://www.snort.org, 2015. [11] Snort Users Manual, http://manual.snort.org, 2015. [12] C. N. Modi, D. R. Patel, A. Patel, and R. Muttukrishnan, Bayesian classifier and Snort based network intrusion detection system in cloud computing, in Computing Communication & Networking Technologies (ICCCNT), 2012 Third International Conference on, 2012, pp. 1–7. [13] T. Xing, D. Huang, L. Xu, C. J. Chung, and P. Khatkar, Snortflow: A openflow-based intrusion prevention system in cloud environment, in Research and Educational Experiment Workshop (GREE), 2013 Second GENI, 2013, pp. 89–92. [14] N. McKeown, T. Anderson, H. Balakrishnan, G. Parulkar, L. Peterson, J. Rexford, S. Shenker, and J. Turner, OpenFlow: Enabling innovation in campus networks, Computer Communication Review, vol. 38, no. 2, pp. 69– 74, 2008. [15] S. Shin and G. Gu, CloudWatcher: Network security monitoring using OpenFlow in dynamic cloud networks (or: How to provide security monitoring as a service in clouds?), in Network Protocols (ICNP), 2012 20th IEEE International Conference on, 2012, pp. 1–6. [16] A. Callado, C. Kamienski, G. Szabo, B. P. Ger, J. Kelner, S. Fernandes, and D. Sadok, A survey on internet traffic identification, IEEE Communications Surveys and Tutorials - COMSUR, vol. 11, no. 3, pp. 37–52, 2009. [17] J. Zhang, Y. Xiang, W. Zhou, and Y. Wang, Unsupervised traffic classification using flow statistical properties and IP packet payload, Journal of Computer and System Sciences, vol. 79, no. 5, pp. 573–585, 2013. [18] J. Zhang, Y. Xiang, Y. Wang, W. Zhou, Y. Xiang, and Y. Guan, Network traffic classification using www.redpel.com +917620593389 www.redpel.com +917620593389
  • 11. 332 Tsinghua Science and Technology, June 2016, 21(3): 322–332 correlation information, IEEE Transactions on Parallel and Distributed Systems, vol. 24, no. 1, pp. 104–117, 2013. [19] Y. Jin, N. Duffield, J. Erman, P. Haffner, S. Sen, and Z. Zhang, A modular machine learning system for flow-level traffic classification in large networks, ACM Transactions on Knowledge Discovery From Data (TKDD), vol. 6, no.1, p. 4, 2012. [20] A. Tongaonkar, R. Torres, M. Iliofotou, R. Keralapura, and A. Nucci, Towards self adaptive network traffic classification, Computer Communications, vol. 56, no. 1, pp. 35–46, 2015. [21] Y. Freund and R. E. Schapire, Experiments with a new boosting algorithm, in Int’l Conf. Machine Learning (ICML), 1996, pp. 148–156. [22] B. Liu, M. J. Carey, and S. Ceri, Web Data Mining. Springer, 2011. [23] G. E. P. Box, G. M. Jenkins, and G. C. Reinsel, Time Series Analysis: Forecasting and Control. John Wiley & Sons, 2008. [24] D. Zhao, I. Traore, B. Sayed, W. Lu, S. Saad, A. Ghorbani, and D. Garant, Botnet detection based on traffic behavior analysis and flow intervals, Computers & Security, vol. 39, pp. 2–16, 2013. [25] Y. D. Lin, Y. C. Lai, C. N. Lu, P. K. Hsu, and C. Y. Lee, Three-phase behavior-based detection and classification of known and unknown malware, Security and Communication Networks, vol. 8, no. 11, pp. 2004– 2015, 2015. [26] R. Koch, M. Golling, and G. D. Rodosek, Behavior- based intrusion detection in encrypted environments, Communications Magazine, vol. 52, no. 7, pp. 124–131, 2014. [27] L. Chen, X. S. Chen, J. F. Jiang, X. Y. Yin, and G. L. Shao, Research and practice of dynamic network security architecture for IaaS platforms, Tsinghua Science and Technology, vol. 19, no. 5, pp. 496–507, 2014. [28] KDD Cup 1999 Data, http://kdd.ics.uci.edu/databases/ kddcup99/kddcup99.html, 2015. [29] P. A. R. Kumar and S. Selvakumar, Detection of distributed denial of service attacks using an ensemble of adaptive and hybrid neuro-fuzzy systems, Computer Communications, vol. 36, no. 3, pp. 303–319, 2013. [30] S. S. Sathya, R. G. Ramani, and K. Sivaselvi, Discriminant analysis based feature selection in kdd intrusion dataset, International Journal of Computer Applications, vol. 31, no. 11, pp. 1–7, 2011. [31] P. Casas, J. Mazel, and P. Owezarski, Unsupervised network intrusion detection systems: Detecting the unknown without knowledge, Computer Communications, vol. 35, no. 7, pp. 772–783, 2011. Xiaoming Ye is a PhD candidate at College of Computer Science of Sichuan University. She got the BE degree from College of Information Engineering of Jiangnan University in 2005 and MS degree from College of Computer Science of Sichuan University in 2008. Her research interests include cyber security and big data analytics. Xingshu Chen received the PhD degree from Sichuan University in 2004. She is now a professor of the College of Computer Science and Cybersecurity Research Institute of Sichuan University. She is the member of China Information Security Standardization Technical Committee. Her research interests include cloud computing, cloud security, distributed file system, big data processing, network protocol analysis, and new media supervision. Haizhou Wang received the BE degree and PhD degree from College of Computer Science, Sichuan University, China, in 2008 and 2014, respectively. From 2013 to 2014, he visited University of Toronto. He is currently a lecturer in the College of Computer Science, Sichuan University, China. His research interests include peer- to-peer streaming system, information security, and network measurement. Xuemei Zeng is a PhD candidate at College of Computer Science of Sichuan University. She received the MS degree from Computer Science College of Sichuan University in 2004. Her current research interests include computer and network security, big data, and cloud computing security. Guolin Shao is a PhD candidate of College of Computer Science of Sichuan University. He got the BE degree from Sichuan University in 2013. His general research interests lie in cyber security. Xueyuan Yin is a PhD candidate at College of Computer Science of Sichuan University. He got the BE degree from Sichuan University in 2008. His research interests mainly focus on computer network and information security. Chun Xu received the PhD degree from Sichuan University in 2008. He is now an associate professor of the College of Cybersecurity Research Institute of Sichuan University. His research interests mainly focus on computer network and information security. www.redpel.com +917620593389 www.redpel.com +917620593389