Performance Analysis of Detection And Prevention Of DDoS Attacks In Cloud
Implementation Plan:
—————————
Scenario -1:(Using Actor-Critic Algorithm) :
—————————————————-
Step 1: Initially, we create a cloud-sim environment with 10 – number of data centers, 15 – number of tasks, 50 – number of virtual machines, and cloud service providers.
Step 2: Next, We register all users with their user ID, password.
Step 3: Next, We Perform the Authentication process by using their credentials and a random number will be generated. This process is carried out by implementing the SHA 512 algorithm.
Step 4: Next, We make a DDoS Attack Detection process based on CICIDS 2017 Dataset and perform the Feature Selection process.
Step 5: Next, We perform the Data Packets Classification by using Fuzzy VIKOR in which units of network traffic that are packets are categorized either malicious [DDOS] or not malicious.
Step 6: Next, We perform the Risk Aware VM Isolation process by using the Soft Actor Critic Algorithm (SAC) which is a reinforcement-based algorithm.
Step 7: To evaluate the performance of our work we consider the following metrics:
7.1: Number of Tasks vs. Response Time (ms)
7.2: Number of Tasks vs. Latency (ms)
7.3: Number of VM Nodes vs. Latency (ms)
7.4: Number of Tasks vs. Throughput (Mbps)
7.6: Number of Tasks vs. Resource Utilization(%)
7.7 Number of VM Nodes vs. Detection Rate(%)
7.8: Number of VM Nodes vs. False Positive Rate (%)
7.9: Number of VM Nodes vs. False Negative Rate (%)
7.10: Number of VM Nodes vs. Load Balancing Efficiency(%)
7.11: Number of Tasks vs. Policy Convergence Time(ms)
7.12: Number of Tasks vs. Computational Efficiency(%)
7.13: Number of Tasks vs. Decision Accuracy(%)
7.14: Number of Tasks vs. Average Reward(%)
Scenario -2:(Using Trust-Based MaxMin Game Algorithm) :
———————————————————————-
Step 1: Initially, we create a cloud-sim environment with 10 – number of data centers, 15 – number of tasks, 50 – number of virtual machines, and cloud service providers.
Step 2: Initially, register all users with their user ID, password.
Step 3: Next, Perform the Authentication process by using their credentials and a random number will be generated. This process is carried out by implementing the SHA 512 algorithm.
Step 4: Next, to make a DDoS Attack Detection process based on CICIDS 2017 Dataset and perform the Feature Selection process.
Step 5: Next, perform the Data Packets Classification by using Fuzzy VIKOR in which units of network traffic that are packets are categorized either malicious [DDOS] or not malicious.
Step 6: Next, perform the Risk Aware VM Isolation process by using the Trust-Based MaxMin Game Algorithm which is a reinforcement-based algorithm.
Step 7: To evaluate the performance of our work we consider the following metrics:
7.1: Number of Tasks vs. Response Time (ms)
7.2: Number of Tasks vs. Latency (ms)
7.3: Number of VM Nodes vs. Latency (ms)
7.4: Number of Tasks vs. Throughput (Mbps)
7.6: Number of Tasks vs. Resource Utilization(%)
7.7 Number of VM Nodes vs. Detection Rate(%)
7.8: Number of VM Nodes vs. False Positive Rate (%)
7.9: Number of VM Nodes vs. False Negative Rate (%)
7.10: Number of VM Nodes vs. Load Balancing Efficiency(%)
7.11: Number of Tasks vs. Policy Convergence Time(ms)
7.12: Number of Tasks vs. Computational Efficiency(%)
7.13: Number of Tasks vs. Decision Accuracy(%)
7.14: Number of Tasks vs. Average Reward(%)
Software Requirements:
—————————–
1. Development Environment: NetBeans 8.2
2. Development Tool: CloudSim 3.o
3. Programming Language: Java 1.8
4. Operating System: Windows – 11 (64-bit)
Dataset:
———-
Link :- CICIDS 2017 Dataset => (https://www.kaggle.com/datasets/kk0105/cicids2017)
Note:
——
[1] If the above plan does not satisfy your requirement, please provide the processing details, like the above step-by-step.
[2] Please note that this implementation plan does not include any further steps after it is put into implementation.
[3] Please understand that any modifications made to the confirmed implementation plan will not be made before or after the project development.
[4] If the above plan satisfies your requirement please confirm with us.
| Technology | Ph.D | MS | M.Tech |
|---|---|---|---|
| NS2 | 75 | 117 | 95 |
| NS3 | 98 | 119 | 206 |
| OMNET++ | 103 | 95 | 87 |
| OPNET | 36 | 64 | 89 |
| QULANET | 30 | 76 | 60 |
| MININET | 71 | 62 | 74 |
| MATLAB | 96 | 185 | 180 |
| LTESIM | 38 | 32 | 16 |
| COOJA SIMULATOR | 35 | 67 | 28 |
| CONTIKI OS | 42 | 36 | 29 |
| GNS3 | 35 | 89 | 14 |
| NETSIM | 35 | 11 | 21 |
| EVE-NG | 4 | 8 | 9 |
| TRANS | 9 | 5 | 4 |
| PEERSIM | 8 | 8 | 12 |
| GLOMOSIM | 6 | 10 | 6 |
| RTOOL | 13 | 15 | 8 |
| KATHARA SHADOW | 9 | 8 | 9 |
| VNX and VNUML | 8 | 7 | 8 |
| WISTAR | 9 | 9 | 8 |
| CNET | 6 | 8 | 4 |
| ESCAPE | 8 | 7 | 9 |
| NETMIRAGE | 7 | 11 | 7 |
| BOSON NETSIM | 6 | 8 | 9 |
| VIRL | 9 | 9 | 8 |
| CISCO PACKET TRACER | 7 | 7 | 10 |
| SWAN | 9 | 19 | 5 |
| JAVASIM | 40 | 68 | 69 |
| SSFNET | 7 | 9 | 8 |
| TOSSIM | 5 | 7 | 4 |
| PSIM | 7 | 8 | 6 |
| PETRI NET | 4 | 6 | 4 |
| ONESIM | 5 | 10 | 5 |
| OPTISYSTEM | 32 | 64 | 24 |
| DIVERT | 4 | 9 | 8 |
| TINY OS | 19 | 27 | 17 |
| TRANS | 7 | 8 | 6 |
| OPENPANA | 8 | 9 | 9 |
| SECURE CRT | 7 | 8 | 7 |
| EXTENDSIM | 6 | 7 | 5 |
| CONSELF | 7 | 19 | 6 |
| ARENA | 5 | 12 | 9 |
| VENSIM | 8 | 10 | 7 |
| MARIONNET | 5 | 7 | 9 |
| NETKIT | 6 | 8 | 7 |
| GEOIP | 9 | 17 | 8 |
| REAL | 7 | 5 | 5 |
| NEST | 5 | 10 | 9 |
| PTOLEMY | 7 | 8 | 4 |