Please use this identifier to cite or link to this item: http://dspace.dtu.ac.in:8080/jspui/handle/repository/15380
Full metadata record
DC FieldValueLanguage
dc.contributor.authorMUKOKO, FUNGAYI DONEWELL-
dc.date.accessioned2016-12-15T05:27:55Z-
dc.date.available2016-12-15T05:27:55Z-
dc.date.issued2014-06-
dc.identifier.urihttp://dspace.dtu.ac.in:8080/jspui/handle/repository/15380-
dc.description.abstractCloud Computing has presented itself as a promising solution to new entrepreneurs as well as existing organizations for management of their IT needs at various levels. Many cloud service providers have exposed cloud services at cheap prices, which allow users at all levels of society to materialize their ideas and make them available across the globe. While the response has been overwhelming, the application areas where security of data is of utmost importance have not shown much interest. Hence incorporating dependable security measures in the cloud computing technology would be a good move since the aspect of security has turn out to be one of the main things to consider. In this thesis work we took an initiative as we adopted and/or interpolating Hidden Markov Model into the circles of Cloud Computing, as we exploited it’s capabilities in detecting the silent attack traces that dodge and/or bypass a set of methodical mechanisms intended to sense and prevent them into the cloud system. We modelled our hackers’ attack scenarios where we defined some states and observations. The hackers’ clusters have been taken to be the states, along with the observations which have been taken to a series of Virtual Machines on to which the attacker trades upon from the silent invasion through to the vulnerable and finally the target Virtual Machine. The modelling is given in such a way that, if we have a generated sequence of observed attacks, we must be able to find out the roots of done attackers from the grouped hackers.en_US
dc.language.isoenen_US
dc.relation.ispartofseriesTD NO.1500;-
dc.subjectCLOUD SECURITYen_US
dc.subjectVIRTUALISATIONen_US
dc.subjectHIDDEN NARKOV MODELen_US
dc.subjectSILENT ATTACKen_US
dc.titleUSING HIDDEN MARKOV MODEL TOWARDS SECURING THE CLOUD: DETECTION OF DDoS SILENT ATTACKSen_US
dc.typeThesisen_US
Appears in Collections:M.E./M.Tech. Computer Engineering

Files in This Item:
File Description SizeFormat 
FDM (MTECH THESIS REPORT).pdf1 MBAdobe PDFView/Open


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.