Please use this identifier to cite or link to this item:
http://10.1.7.192:80/jspui/handle/123456789/8039
Title: | Attacks on Cloud and its Effects on IaaS |
Authors: | Patel, Namrata |
Keywords: | Computer 2016 Project Report 2016 Computer Project Report Project Report 16MCEI 16MCEI15 INS INS 2016 CE (INS) |
Issue Date: | 1-May-2018 |
Publisher: | Institute of Technology |
Abstract: | In the era of Digitization and the e-commerce, all users are maintaining their data in a cloud and their personal information like documents, images, card information for quick payment and confidential data resides in the cloud. For Decades, most of the IT-industries, Government Agencies, Defense Sectors, Education hub, Hospitals and many more are using cloud services. One essential thing is that you require a network connection in order to get services from the cloud. There are many possibilities of attack in the cloud as the cloud is open and is connected to the internet. It means cloud run base on internet connection so chances of attacks on clouds are much more. Cloud is a hub of resources like network, storage, server, memory, CPU and any user uses these facilities worldwide at any time by subscription system. Cloud Computing provides so many services basically Infrastructure as a Service (IaaS), Platform as a Service (PaaS), and Software as a Service (SaaS) where the attacker always tries to breach the security at an IaaS level. Denial of Service (DoS) and Distributed Denial of Service (DDoS) attacks on IaaS which target resources like CPU, Memory, RAM usage and this is the major concern about the Cloud Service Provider (CSP). In this research at an initial level, Intrusion Detection System (IDS) technique is been deployed to detect the DoS and DDoS attack, for that Snort has been deployed. To overcome the problem of DoS and DDoS attack, Reinforcement Learning (RL) algorithm has been used to train the Cloud behavior for the classification of an attack. The basis on Reinforcement Learning Policy it shows either attack is Normal or High according to that it will gives Positive and Negative Reward. If an attack has been Normal then CSP go for Prevent that attack otherwise go for Load Balancing. |
URI: | http://10.1.7.192:80/jspui/handle/123456789/8039 |
Appears in Collections: | Dissertation, CE (INS) |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
16MCEI15.pdf | 16MCEI15 | 1.79 MB | Adobe PDF | ![]() View/Open |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.