Skip to main content

Combating Cyber Attacks in Cloud Systems Using Machine Learning

  • Chapter
  • First Online:
Security, Privacy and Trust in Cloud Systems

Abstract

One of the crucial but complicated tasks is to detect cyber attacks and their types in any IT networking environment including recent uptake of cloud services.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
USD 109.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Amazon (2011) Amazon Elastic Compute Cloud (Amazon EC2). Retrieved 27 June 2011, from http://aws.amazon.com/ec2/

  2. Archer J, Boehme A, Cullinane D, Kurtz P, Puhlmann N, Reavis J (2010) Top threats to cloud computing, version 1.0. Cloud security alliance. Retrieved 7 May 2011, from http://www.cloudsecurityalliance.org/topthreats/csathreats.v1.0.pdf

  3. Batishchev AM (2012). LOIC. Retrieved 22 Aug 2012, from http://sourceforge.net/projects/loic/

  4. BBC (2010) Anonymous Wikileaks supporters explain web attacks. Retrieved 23 Aug 2012, from http://www.bbc.co.uk/news/technology-11971259

  5. Chonka A, Xiang Y, Zhou W, Bonti A (2010) Cloud security defence to protect cloud computing against HTTP-DoS and XML-DoS attacks. J Netw Comput Appl.

    Google Scholar 

  6. Company H-PD (2012) HP proLiant DL380 G4 server–specifications retrieved 6th Aug 2012, from http://h18000.www1.hp.com/products/servers/proliantdl380/specifications-g4.html

  7. Corporation M (2012) Windows 7 Retrieved 6th Aug 2012 from http://windows.microsoft.com/en-au/windows7/products/home

  8. Dahbur K, Mohammad B, Tarakji AB (2011) A survey of risks, threats and vulnerabilities in cloud computing. Paper presented at the Proceedings of the international conference on intelligent semantic web-services and applications, ISWSA ’11. ACM, New York, USA.

    Google Scholar 

  9. Danchev D (2008a) Coordinated Russia vs Georgia cyber attack in progress. Retrieved Oct 25 2008.

    Google Scholar 

  10. Danchev D (2008b) The DDoS attack against CNN. com.

    Google Scholar 

  11. Danchev D (2011) Dancho Danchev’s blog–mind streams of information security knowledge retrieved 31 May 2011, from http://ddanchev.blogspot.com/

  12. Frank E, Witten IH (1998) Generating accurate rule sets without global optimization. Paper presented at the fifteenth international conference on machine learning.

    Google Scholar 

  13. Freund Y, Schapire R, Abe N (1999) A short introduction to boosting. Journal-Japanese Society For Artificial Intelligence 14(771–780):1612

    Google Scholar 

  14. Friedman J, Hastie T, Tibshirani R (2001) The elements of statistical learning, vol 1. Springer Series in Statistics, New York

    MATH  Google Scholar 

  15. Grid G (2010) Tutorial: how to DoS attack (Ping flooding). Retrieved 23 Aug 2012, from http://ghostgrid.blog.com/2010/12/16/ping-flooding/

  16. Grossman J (2011) Jeremiah Grossman. Retrieved 19 June 2011, from http://jeremiahgrossman.blogspot.com/

  17. Inc G (2012) NewEraCracker / LOIC. Retrieved 22 Aug 2012, from https://github.com/NewEraCracker/LOIC/

  18. John GH, Langley P (1995) Estimating continuous distributions in Bayesian classifiers. Paper presented at the Eleventh Conference on Uncertainty in Artificial Intelligence, San Mateo

    Google Scholar 

  19. Khorshed MT, Ali ABMS, Wasimi SA (2011a) Monitoring insiders activities in cloud computing using rule based learning. Paper presented at the Proceedings of IEEE TrustCom-11, Nov 16–18, Changsha, China.

    Google Scholar 

  20. Khorshed MT, Ali ABMS, Wasimi SA (2011b) Trust issues that create threats for cyber attacks in cloud computing. Paper presented at the Proceedings of IEEE ICPADS, December 7–9, 2011, Tainan, Taiwan.

    Google Scholar 

  21. Khorshed MT, Ali A, Wasimi SA (2012a) Classifying different DoS attacks in cloud computing using rule based learning. Security and Communication Networks, Wiley, New York. doi:10.1002/sec.621

    Google Scholar 

  22. Khorshed MT, Ali A, Wasimi SA (2012b) A survey on gaps, threat remediation challenges and some thoughts for proactive attack detection in cloud computing. Future generation computer systems. Elsevier, New York. doi:10.1016/j.future.2012.01.006

  23. Kumar A, Sharma AK, Singh A (2012) Performance evaluation of centralized multicasting network over ICMP ping flood for DDoS. Perform Eval 37(10)

    Google Scholar 

  24. Lopez R, Onate E (2006) A variational formulation for the multilayer perceptron. Artificial Neural Networks-ICANN 2006:159–168

    Google Scholar 

  25. McDowell M (2009) Understanding denial-of-service attacks. Retrieved 10 Jan 2013, from http://www.us-cert.gov/cas/tips/ST04-015.html

  26. Nanda R (2008) DDoS Attack/PING flooding: explanation and solution. Retrieved 23 Aug 2012, from http://ramannanda.blogspot.com.au/2009/05/ddos-attackping-flooding-explanation.html

  27. Platt JC (1999) Fast training of support vector machines using sequential minimal optimization. Paper presented at the Advances in Kernel Methods–Support Vector Learning.

    Google Scholar 

  28. Quinlan JR (1993) C4. 5: programs for machine learning. San Mateo, Morgan Kaufmann, CA.

    Google Scholar 

  29. Quinlan JR (1986) Induction of decision trees. Mach Learn 1(1):81–106

    Google Scholar 

  30. Quinlan JR (1987) Simplifying decision trees. Int J Man-Mach Stud 27(3):221–234

    Article  Google Scholar 

  31. Rimal BP, Choi E, Lumb I (2009) A taxonomy and survey of cloud computing systems. Paper presented at the NCM ’09. In: Proceedings of the (2009) fifth international joint conference on INC, IMS and IDC (IEEE Computer Society). Washington, DC, USA

    Google Scholar 

  32. Ristenpart T, Tromer E, Shacham H, Savage S (2009) Hey, you, get off of my cloud: exploring information leakage in third-party compute clouds. Paper presented at the Proceedings of the 16th ACM conference on Computer and communications security Chicago, Illinois, USA.

    Google Scholar 

  33. Rocha F, Correia M (2011) Lucy in the Sky without Diamonds: stealing confidential data in the cloud.

    Google Scholar 

  34. Rouse M (2006) Ping of death. Retrieved 23 Aug 2012, from http://searchsecurity.techtarget.com/definition/ping-of-death

  35. securitytube.net (2012) Ddos attack with Rdos and T3c3i3. Retrieved 22 Aug 2012, from http://www.securitytube.net/video/4719

  36. Tan WPN, Steinbach M, Kumar V (2005) General approach to solving a classification problem. Introduction to Data Mining, Pearson Addison-Wesley, Boston

    Google Scholar 

  37. VMware (2011) VMware vSphere Hypervisor. Retrieved 16 July 2011, from https://www.vmware.com/tryvmware/?p=esxi&ie=utf-8&oe=utf-8&aq=t&rls=org.mozilla:en-US:official&client=firefox-a

  38. Williams G (2008) DATA MINING Desktop survival guide. dim (survey) 1(32561):15

    Google Scholar 

  39. Wilmes G, Kistler U (2007) Engage packet builder–scriptable libnet-based packet builder. Retrieved 24 Aug 2012, from http://www.engagesecurity.com/products/engagepacketbuilder/

  40. Witten IH, Frank E, Hall MA (2011) Data mining: practical machine learning tools and techniques, 3rd edn. Morgan Kaufmann, San Francisco

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2014 Springer-Verlag Berlin Heidelberg

About this chapter

Cite this chapter

Khorshed, M.T., Ali, A.S., Wasimi, S.A. (2014). Combating Cyber Attacks in Cloud Systems Using Machine Learning. In: Nepal, S., Pathan, M. (eds) Security, Privacy and Trust in Cloud Systems. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-38586-5_14

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-38586-5_14

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-38585-8

  • Online ISBN: 978-3-642-38586-5

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics