Abstract
One of the crucial but complicated tasks is to detect cyber attacks and their types in any IT networking environment including recent uptake of cloud services.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Amazon (2011) Amazon Elastic Compute Cloud (Amazon EC2). Retrieved 27 June 2011, from http://aws.amazon.com/ec2/
Archer J, Boehme A, Cullinane D, Kurtz P, Puhlmann N, Reavis J (2010) Top threats to cloud computing, version 1.0. Cloud security alliance. Retrieved 7 May 2011, from http://www.cloudsecurityalliance.org/topthreats/csathreats.v1.0.pdf
Batishchev AM (2012). LOIC. Retrieved 22 Aug 2012, from http://sourceforge.net/projects/loic/
BBC (2010) Anonymous Wikileaks supporters explain web attacks. Retrieved 23 Aug 2012, from http://www.bbc.co.uk/news/technology-11971259
Chonka A, Xiang Y, Zhou W, Bonti A (2010) Cloud security defence to protect cloud computing against HTTP-DoS and XML-DoS attacks. J Netw Comput Appl.
Company H-PD (2012) HP proLiant DL380 G4 server–specifications retrieved 6th Aug 2012, from http://h18000.www1.hp.com/products/servers/proliantdl380/specifications-g4.html
Corporation M (2012) Windows 7 Retrieved 6th Aug 2012 from http://windows.microsoft.com/en-au/windows7/products/home
Dahbur K, Mohammad B, Tarakji AB (2011) A survey of risks, threats and vulnerabilities in cloud computing. Paper presented at the Proceedings of the international conference on intelligent semantic web-services and applications, ISWSA ’11. ACM, New York, USA.
Danchev D (2008a) Coordinated Russia vs Georgia cyber attack in progress. Retrieved Oct 25 2008.
Danchev D (2008b) The DDoS attack against CNN. com.
Danchev D (2011) Dancho Danchev’s blog–mind streams of information security knowledge retrieved 31 May 2011, from http://ddanchev.blogspot.com/
Frank E, Witten IH (1998) Generating accurate rule sets without global optimization. Paper presented at the fifteenth international conference on machine learning.
Freund Y, Schapire R, Abe N (1999) A short introduction to boosting. Journal-Japanese Society For Artificial Intelligence 14(771–780):1612
Friedman J, Hastie T, Tibshirani R (2001) The elements of statistical learning, vol 1. Springer Series in Statistics, New York
Grid G (2010) Tutorial: how to DoS attack (Ping flooding). Retrieved 23 Aug 2012, from http://ghostgrid.blog.com/2010/12/16/ping-flooding/
Grossman J (2011) Jeremiah Grossman. Retrieved 19 June 2011, from http://jeremiahgrossman.blogspot.com/
Inc G (2012) NewEraCracker / LOIC. Retrieved 22 Aug 2012, from https://github.com/NewEraCracker/LOIC/
John GH, Langley P (1995) Estimating continuous distributions in Bayesian classifiers. Paper presented at the Eleventh Conference on Uncertainty in Artificial Intelligence, San Mateo
Khorshed MT, Ali ABMS, Wasimi SA (2011a) Monitoring insiders activities in cloud computing using rule based learning. Paper presented at the Proceedings of IEEE TrustCom-11, Nov 16–18, Changsha, China.
Khorshed MT, Ali ABMS, Wasimi SA (2011b) Trust issues that create threats for cyber attacks in cloud computing. Paper presented at the Proceedings of IEEE ICPADS, December 7–9, 2011, Tainan, Taiwan.
Khorshed MT, Ali A, Wasimi SA (2012a) Classifying different DoS attacks in cloud computing using rule based learning. Security and Communication Networks, Wiley, New York. doi:10.1002/sec.621
Khorshed MT, Ali A, Wasimi SA (2012b) A survey on gaps, threat remediation challenges and some thoughts for proactive attack detection in cloud computing. Future generation computer systems. Elsevier, New York. doi:10.1016/j.future.2012.01.006
Kumar A, Sharma AK, Singh A (2012) Performance evaluation of centralized multicasting network over ICMP ping flood for DDoS. Perform Eval 37(10)
Lopez R, Onate E (2006) A variational formulation for the multilayer perceptron. Artificial Neural Networks-ICANN 2006:159–168
McDowell M (2009) Understanding denial-of-service attacks. Retrieved 10 Jan 2013, from http://www.us-cert.gov/cas/tips/ST04-015.html
Nanda R (2008) DDoS Attack/PING flooding: explanation and solution. Retrieved 23 Aug 2012, from http://ramannanda.blogspot.com.au/2009/05/ddos-attackping-flooding-explanation.html
Platt JC (1999) Fast training of support vector machines using sequential minimal optimization. Paper presented at the Advances in Kernel Methods–Support Vector Learning.
Quinlan JR (1993) C4. 5: programs for machine learning. San Mateo, Morgan Kaufmann, CA.
Quinlan JR (1986) Induction of decision trees. Mach Learn 1(1):81–106
Quinlan JR (1987) Simplifying decision trees. Int J Man-Mach Stud 27(3):221–234
Rimal BP, Choi E, Lumb I (2009) A taxonomy and survey of cloud computing systems. Paper presented at the NCM ’09. In: Proceedings of the (2009) fifth international joint conference on INC, IMS and IDC (IEEE Computer Society). Washington, DC, USA
Ristenpart T, Tromer E, Shacham H, Savage S (2009) Hey, you, get off of my cloud: exploring information leakage in third-party compute clouds. Paper presented at the Proceedings of the 16th ACM conference on Computer and communications security Chicago, Illinois, USA.
Rocha F, Correia M (2011) Lucy in the Sky without Diamonds: stealing confidential data in the cloud.
Rouse M (2006) Ping of death. Retrieved 23 Aug 2012, from http://searchsecurity.techtarget.com/definition/ping-of-death
securitytube.net (2012) Ddos attack with Rdos and T3c3i3. Retrieved 22 Aug 2012, from http://www.securitytube.net/video/4719
Tan WPN, Steinbach M, Kumar V (2005) General approach to solving a classification problem. Introduction to Data Mining, Pearson Addison-Wesley, Boston
VMware (2011) VMware vSphere Hypervisor. Retrieved 16 July 2011, from https://www.vmware.com/tryvmware/?p=esxi&ie=utf-8&oe=utf-8&aq=t&rls=org.mozilla:en-US:official&client=firefox-a
Williams G (2008) DATA MINING Desktop survival guide. dim (survey) 1(32561):15
Wilmes G, Kistler U (2007) Engage packet builder–scriptable libnet-based packet builder. Retrieved 24 Aug 2012, from http://www.engagesecurity.com/products/engagepacketbuilder/
Witten IH, Frank E, Hall MA (2011) Data mining: practical machine learning tools and techniques, 3rd edn. Morgan Kaufmann, San Francisco
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2014 Springer-Verlag Berlin Heidelberg
About this chapter
Cite this chapter
Khorshed, M.T., Ali, A.S., Wasimi, S.A. (2014). Combating Cyber Attacks in Cloud Systems Using Machine Learning. In: Nepal, S., Pathan, M. (eds) Security, Privacy and Trust in Cloud Systems. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-38586-5_14
Download citation
DOI: https://doi.org/10.1007/978-3-642-38586-5_14
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-38585-8
Online ISBN: 978-3-642-38586-5
eBook Packages: EngineeringEngineering (R0)