CFP last date
20 January 2025
Reseach Article

Comparison of BP and SVM on SLA based Masquerader Detection in Cloud

by Tej Bahadur Shahi, Dadhi Ram Ghimire
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 91 - Number 14
Year of Publication: 2014
Authors: Tej Bahadur Shahi, Dadhi Ram Ghimire
10.5120/15948-5146

Tej Bahadur Shahi, Dadhi Ram Ghimire . Comparison of BP and SVM on SLA based Masquerader Detection in Cloud. International Journal of Computer Applications. 91, 14 ( April 2014), 16-20. DOI=10.5120/15948-5146

@article{ 10.5120/15948-5146,
author = { Tej Bahadur Shahi, Dadhi Ram Ghimire },
title = { Comparison of BP and SVM on SLA based Masquerader Detection in Cloud },
journal = { International Journal of Computer Applications },
issue_date = { April 2014 },
volume = { 91 },
number = { 14 },
month = { April },
year = { 2014 },
issn = { 0975-8887 },
pages = { 16-20 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume91/number14/15948-5146/ },
doi = { 10.5120/15948-5146 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:12:43.449641+05:30
%A Tej Bahadur Shahi
%A Dadhi Ram Ghimire
%T Comparison of BP and SVM on SLA based Masquerader Detection in Cloud
%J International Journal of Computer Applications
%@ 0975-8887
%V 91
%N 14
%P 16-20
%D 2014
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Cloud computing is a new dynamics in the IT sector which imitates the pay per use modality of many commodity items. Organizations can use the new offerings in the IT field without significant capital investment. However, there is scrutiny in adoption of cloud computing in organizations as there are many economic, security and business risk associated with it. SLA between cloud service provider and cloud service user is a key in maintaining trust in the cloud services and achieve a common goal. Most SLAs focus on cloud computing performance while other issues don't get much attention. This study is oriented to build a masquerade detection system in cloud computing, based on the proposed SLA. The new SLA contains additional security constraints than that found in traditional SLA such as length of temporal sequence, weight of each activities and the threshold weight of the temporal sequence. The performance analysis includes comparison of Back Propagation algorithm with Support Vector Machine (SVM). The detection rate and false alarm rate is observed and found that it can detect masqueraders well from the small set of training data with small false alarm rate.

References
  1. "The NIST definition of Cloud," 2011(NIST Special Publication 800-145) available at http://csrc. nist. gov/publications/PubsSPs. html#800-145.
  2. R. Kaur, "Cloud computing," international journal of computer science and technology, vol. 2,2011,PP 373-381.
  3. G. Christos A. Yfoulis, "Honoring SLAs on cloud computing services: a control perspective," 2009, available at http://www. techrepublic. com/resource-library/whitepapers/honoring-slas-on-cloud-computing-services-a-control-perspective/#
  4. F. Baiardi. H. A. Kholidy, "CIDD: A Cloud Intrusion Detection Dataset For Cloud Computing and Masquerede Attacks," IEEE:NInth International Conference Of Information Technology-New Generations, 16-18 April 2012, PP 397-402 doi:10. 1109/ITNG. 2012. 97.
  5. X. Cheng,J. Chen, "Modeling User Interests Based on Cloud Model for Masquerade Detection," International Conference on Computational Intelligence and Software Engineering , Wuhan, 11-13 Dec. 2009 ,PP 1-4, 2009 doi:10. 1109/CISE. 2009. 5366294.
  6. M. Schonalu, Dumouchel, W. ,Karr, "Computer Intrusion:Detectiong masqueraders," Statistical Science, 2001,Vol. 17 PP. 1-17.
  7. T. A. Welch, "A Technique for high performance data compression" IEEE Computer Vol. 17 Issue 6, 1984 PP. 8-19, doi: 10. 1109/MC. 1984. 1659158.
  8. S. E. Evans, E. Markham, S. Impson, J. Laczo, "Mdlcompress for intrusion detection: Signature inference and masquerade attack. ," Military Communications Conference, 2007.
  9. A. R. Pankesh Patel, Amit Sheth, "Service Level Agreement in Cloud Computing," 2010.
  10. I. H. W. Craig G. Nevill-Manning, "Identifying Hierarchical Structure in Sequences:A linear-time algorithm," Journal of Artificial Intelligence Research Vol. 7 Issue 1, July 1997 PP 67-82.
  11. K. Nigam, A. McCallum, "A Comparison of Event Models for Naive Bayes Text Classication," In AAAI-98 Workshop on Learning for Text Categorization, 1998.
  12. C. J. C. Burges, "A tutorial on support vector machines for pattern recognition. ," Data Mining and Knowledge Discovery Vol. 2, Issue 2 1998, pp 121-167 doi: 10. 1023/A:1009715923555.
  13. K. Wang, S. Stolfo, "One-Class Training for Masquerade Detection," In: ICDM Workshop on Data Mining for Computer Security (DMSEC), 2003
  14. M. Latendresse, "Masquerade Detection via Customized Grammars," in: Second International Conference, DIMVA 2005, Vienna, Austria, July 7-8, 2005, PP. 141-159 doi 10. 1007/11506881_9
  15. Thorsten Joachims, "Learning to Classify Text Using Support Vector Machines" Dissertation, Kluwer, 2002.
  16. Maximiliano Bertacchini, Pablo I. Fierens, " A Survey of Masquerader Detection Approaches"
Index Terms

Computer Science
Information Sciences

Keywords

Support Vector Machine Back Propagation Masquerader Detection Cloud Computing Service Level Agreement.