Abnormal Behavior Detection using Machine Learning In a Virtual Mobile Cloud Infrastructure

  IJPTT-book-cover
 
International Journal of P2P Network Trends and Technology (IJPTT)          
 
© 2013 by IJPTT Journal
Volume-3 Issue-6                           
Year of Publication : 2013
 

MLA

Naren Raghavendra Suri, S.Gowtham Bharath."Abnormal Behavior Detection using Machine Learning In a Virtual Mobile Cloud Infrastructure". International Journal of P2P Network Trends and Technology (IJPTT), V3(6):33 - 35  Nov - Dec 2013, ISSN:2249-2615, www.ijpttjournal.org. Published by Seventh Sense Research Group.

Abstract

— At present many mobile services are converting to cloud depended mobile services with high communications and greater flexibility. We explore a unique mobile cloud infrastructure that attaches mobiles and cloud services. This fresh infrastructure gives mobile instances, which are virtual among cloud computing. In order to enter into marketing with such infrastructure, the service providers should know about the security openings. Hence, in this paper, we initially detailed different mobile cloud services extending into mobile cloud infrastructure, and explained various service scenarios to unveil the possible security threats. Then, we detailed the architecture and methodology for abnormal behavior detection through the observation of host and network data. To check our methodology, we inserted malicious programs into our mobile cloud test bed and utilized a machine learning algorithm-Random Forest- to find out abnormal behavior’s from those.

References

[1] Scott Paquette, Paul T.Jaegar, Susan C.Wilson. Identifying the security risks associated with governmental use of cloud computing, Journal of Government Information Quarterly 27, pages 245-253, April, 2010.
[2] The Gnutella protocol specification, 2000. http://dss.clip2.com/GnutellaProtocol04.pdf.
[3] R. Anderson. The Eternity service. In Proc. PRAGOCRYPT’96 , pages 242–252. CTU Publishing House, 1996. Prague, Czech Republic.
[4] W. J. Bolosky, J. R. Douceur, D. Ely, and M. Theimer. Feasibility of a serverless distributed file system deployed on an existing set of desktop pcs. In Proc. ACM SIGMET- RICS’2000 , pages 34–43, 2000.
[5] I. Clarke, O. Sandberg, B. Wiley, and T. W. Hong. Freenet: A distributed anonymous information storage and retrieval system. ICSI, Berkeley, CA, USA
[7] Dan Svantesson, Roger Clarke. “Privacy and consumer risks in cloud computing”. Privacy consumer risks journal, pages 391-397, July, 2010.
[8] Kim Zetter. “Medical Records: Stored in the Cloud, Sold on the open Market”, Journal of privacy, crime and security, pages 223-256, March, 2009.
[9] Roger Clarke. “Evaluation of Google’s Statement against the rivacy Statement Template of 19 December 2005”, <http://www.rogerclarke.com/DV/PST-Google.html>, 2005.
[10] Google Docs Privacy Policy (Version of 3 October 2010). <http://www.google.com/intl/en/privacypolicy.html>, at 10 October 2010.
[11] Frank Gens. “IT Cloud Services User Survey, part 2: Top Benefits and Challenges”, Survey conducted by IDC, October, 2008.
[12] Buyya R, Yeo, Venugopal CS, S Broberg, J Brandic, I. “Cloud Computing and Emerging IT Platforms: Vision, Hype, and Reality for Delivering Computing as the 5th Utility”. Future Generation Computer Systems 25, pages 599-616, 2009.
[13] J.D Blower. “GIS in the cloud: Implementing a web map service on Google App Engine”, Proceedings of the 1st International Conference and Exhibition on Computing for Geospatial Research and Application, Washington D.C, June 21-23, 2010.
[14] Mark Nicolett, Jay Heiser. “Accessing the security risks of cloud computing”, Gartner Inc., June, 2008.
[15] Manish Pokharel and Jong Sou Park. “Cloud computing future solution for e-Governance”, Proceedings of 3rd International Conference on Theory and Practice of Electronic Governance, IEEE 2009.
[16] Ortuatay B. “Twitter service restored after hacker attack”, Journal of the Baltimore Sun, 2009.
[17] Cubrilovic, N. “Letting Data die a natural death”, International Journal of electronic Government Research, 2009.

Keywords

- Decentralized erasure code, secure storage system, abnormal detection, random forest, decision tree.