Analysis of Detection Prevention DDoS Attack In Cloud

Analysis of Detection Prevention DDoS Attack In Cloud

Performance Analysis of Detection And Prevention Of DDoS Attacks In Cloud

Implementation Plan:
—————————

Scenario -1:(Using Actor-Critic Algorithm) :
—————————————————-

Step 1: Initially, we create a cloud-sim environment with 10 – number of data centers, 15 – number of tasks, 50 – number of virtual machines, and cloud service providers.

Step 2: Next, We register all users with their user ID, password.

Step 3: Next, We Perform the Authentication process by using their credentials and a random number will be generated. This process is carried out by implementing the SHA 512 algorithm.

Step 4: Next, We make a DDoS Attack Detection process based on CICIDS 2017 Dataset and perform the Feature Selection process.

Step 5: Next, We perform the Data Packets Classification by using Fuzzy VIKOR in which units of network traffic that are packets are categorized either malicious [DDOS] or not malicious.

Step 6: Next, We perform the Risk Aware VM Isolation process by using the Soft Actor Critic Algorithm (SAC) which is a reinforcement-based algorithm.

Step 7: To evaluate the performance of our work we consider the following metrics:

7.1: Number of Tasks vs. Response Time (ms)

7.2: Number of Tasks vs. Latency (ms)

7.3: Number of VM Nodes vs. Latency (ms)

7.4: Number of Tasks vs. Throughput (Mbps)

7.6: Number of Tasks vs. Resource Utilization(%)

7.7 Number of VM Nodes vs. Detection Rate(%)

7.8: Number of VM Nodes vs. False Positive Rate (%)

7.9: Number of VM Nodes vs. False Negative Rate (%)

7.10: Number of VM Nodes vs. Load Balancing Efficiency(%)

7.11: Number of Tasks vs. Policy Convergence Time(ms)

7.12: Number of Tasks vs. Computational Efficiency(%)

7.13: Number of Tasks vs. Decision Accuracy(%)

7.14: Number of Tasks vs. Average Reward(%)

 

Scenario -2:(Using Trust-Based MaxMin Game Algorithm) :
———————————————————————-

Step 1: Initially, we create a cloud-sim environment with 10 – number of data centers, 15 – number of tasks, 50 – number of virtual machines, and cloud service providers.

Step 2: Initially, register all users with their user ID, password.

Step 3: Next, Perform the Authentication process by using their credentials and a random number will be generated. This process is carried out by implementing the SHA 512 algorithm.

Step 4: Next, to make a DDoS Attack Detection process based on CICIDS 2017 Dataset and perform the Feature Selection process.

Step 5: Next, perform the Data Packets Classification by using Fuzzy VIKOR in which units of network traffic that are packets are categorized either malicious [DDOS] or not malicious.

Step 6: Next, perform the Risk Aware VM Isolation process by using the Trust-Based MaxMin Game Algorithm which is a reinforcement-based algorithm.

Step 7: To evaluate the performance of our work we consider the following metrics:

7.1: Number of Tasks vs. Response Time (ms)

7.2: Number of Tasks vs. Latency (ms)

7.3: Number of VM Nodes vs. Latency (ms)

7.4: Number of Tasks vs. Throughput (Mbps)

7.6: Number of Tasks vs. Resource Utilization(%)

7.7 Number of VM Nodes vs. Detection Rate(%)

7.8: Number of VM Nodes vs. False Positive Rate (%)

7.9: Number of VM Nodes vs. False Negative Rate (%)

7.10: Number of VM Nodes vs. Load Balancing Efficiency(%)

7.11: Number of Tasks vs. Policy Convergence Time(ms)

7.12: Number of Tasks vs. Computational Efficiency(%)

7.13: Number of Tasks vs. Decision Accuracy(%)

7.14: Number of Tasks vs. Average Reward(%)

 

Software Requirements:
—————————–

1. Development Environment: NetBeans 8.2

2. Development Tool: CloudSim 3.o

3. Programming Language: Java 1.8

4. Operating System: Windows – 11 (64-bit)

 

Dataset:
———-

Link :- CICIDS 2017 Dataset => (https://www.kaggle.com/datasets/kk0105/cicids2017)

 

Note:
——

[1] If the above plan does not satisfy your requirement, please provide the processing details, like the above step-by-step.

[2] Please note that this implementation plan does not include any further steps after it is put into implementation.

[3] Please understand that any modifications made to the confirmed implementation plan will not be made before or after the project development.

[4] If the above plan satisfies your requirement please confirm with us.

Live Tasks
Technology Ph.D MS M.Tech
NS2 75 117 95
NS3 98 119 206
OMNET++ 103 95 87
OPNET 36 64 89
QULANET 30 76 60
MININET 71 62 74
MATLAB 96 185 180
LTESIM 38 32 16
COOJA SIMULATOR 35 67 28
CONTIKI OS 42 36 29
GNS3 35 89 14
NETSIM 35 11 21
EVE-NG 4 8 9
TRANS 9 5 4
PEERSIM 8 8 12
GLOMOSIM 6 10 6
RTOOL 13 15 8
KATHARA SHADOW 9 8 9
VNX and VNUML 8 7 8
WISTAR 9 9 8
CNET 6 8 4
ESCAPE 8 7 9
NETMIRAGE 7 11 7
BOSON NETSIM 6 8 9
VIRL 9 9 8
CISCO PACKET TRACER 7 7 10
SWAN 9 19 5
JAVASIM 40 68 69
SSFNET 7 9 8
TOSSIM 5 7 4
PSIM 7 8 6
PETRI NET 4 6 4
ONESIM 5 10 5
OPTISYSTEM 32 64 24
DIVERT 4 9 8
TINY OS 19 27 17
TRANS 7 8 6
OPENPANA 8 9 9
SECURE CRT 7 8 7
EXTENDSIM 6 7 5
CONSELF 7 19 6
ARENA 5 12 9
VENSIM 8 10 7
MARIONNET 5 7 9
NETKIT 6 8 7
GEOIP 9 17 8
REAL 7 5 5
NEST 5 10 9
PTOLEMY 7 8 4

Related Pages

Workflow

YouTube Channel

Unlimited Network Simulation Results available here.

Related Topics