An Efficient Model to Predict Network Packets in TVDC Using Machine Learning

被引:0
作者
Duggal, Ashmeet Kaur [1 ]
Dave, Meenu [1 ]
机构
[1] Jagannath Univ, Dept Comp Sci & Engn, Jaipur, Rajasthan, India
关键词
machine learning; Amazon Web Services (AWS); Elastic Compute Cloud (EC2); artificial intelligence; cloud computing; trusted virtual data center;
D O I
10.12720/jait.14.3.523-531
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Internet-based computing allows the sharing of on-demand resources. This computing technique includes data processing and storage to globally separated machines, known as Cloud Computing. Confidentiality and integrity of data on the cloud are vital. The key constraints include effective access control, accessibility, and transmission of files, in a dynamic cloud environment, seeking a Trusted Virtual Data Center (TVDC). So, to overcome challenges such as data security and integrity due to exponentially growing data size, this research paper aims to develop a prediction model using the machine learning approach, which identifies the type of incoming packet on the TVDC. Alternatively, in other words, this system predicts whether the incoming packets on the server in the cloud environment are malicious or not, using the machine learning approach. This research explored artificial intelligence verticals in building systems with learned data structures for efficient data access. This research describes the implementation of machine learning algorithms for an efficient model's prediction of the type of incoming packet on the server. It has achieved 88% accuracy using the Gradient Boosted Tree classifier. Also, in this study, the author compares the results of two algorithms, Decision Tree and Gradient Boosted Tree, and finally selects the most optimal for this prediction.
引用
收藏
页码:523 / 531
页数:9
相关论文
共 23 条
  • [1] Amazon EC2, GEN PURP
  • [2] [Anonymous], OVERVIEW AMAZON WEB
  • [3] Security for the cloud infrastructure: Trusted virtual data center implementation
    Berger, S.
    Caceres, R.
    Goldman, K.
    Pendarakis, D.
    Perez, R.
    Rao, J. R.
    Rom, E.
    Sailer, R.
    Schildhauer, W.
    Srinivasan, D.
    Tal, S.
    Valdez, E.
    [J]. IBM JOURNAL OF RESEARCH AND DEVELOPMENT, 2009, 53 (04)
  • [4] Berger Stefan, 2008, Operating Systems Review, V42, P40, DOI 10.1145/1341312.1341321
  • [5] Canadian Institute for Cybersecurity, DATASETS
  • [6] Canadian Institute for Cybersecurity, APPLICATIONS
  • [7] Canadian Institute for Cybersecurity, DDOS EV DAT CICDDOS2
  • [8] Draper-Gil Gerard, 2016, ICISSP 2016. 2nd International Conference on Information Systems Security and Privacy. Proceedings, P407
  • [9] emc, DATA GROWTH BUSINESS
  • [10] Greedy function approximation: A gradient boosting machine
    Friedman, JH
    [J]. ANNALS OF STATISTICS, 2001, 29 (05) : 1189 - 1232