Cloud Worm Detection and Response Technique By Integrating The Enhanced Genetic Algorithm An Threat Level
A worm is known as a malicious code that can replicate, infect and propagate itself without attaching itself to any host. Unlike other malicious codes, such as a Trojan horse and a virus, a worm can cause serious damage due to its payload and interrupt or stop cloud resources and services which then...
Saved in:
id |
my-usim-ddms-13031 |
---|---|
record_format |
uketd_dc |
institution |
Universiti Sains Islam Malaysia |
collection |
USIM Institutional Repository |
language |
en_US |
topic |
Worm analysis Computer security Systems and Data Security. |
spellingShingle |
Worm analysis Computer security Systems and Data Security. Hasan Mahmoud Sha'ban Kanaker Cloud Worm Detection and Response Technique By Integrating The Enhanced Genetic Algorithm An Threat Level |
description |
A worm is known as a malicious code that can replicate, infect and propagate itself without attaching itself to any host. Unlike other malicious codes, such as a Trojan horse and a virus, a worm can cause serious damage due to its payload and interrupt or stop cloud resources and services which then lead to loss of money, confidential information and productivity for organisations or users that rely on data storage, services and applications that run on the cloud. Detecting and stopping cloud worm attacks have become a hard and challenging endeavour. Therefore, this research proposes a cloud worm classification based on its features. The research also develops a cloud worm detection technique by integrating the enhanced genetic algorithm and proposes a cloud response technique based on threat levels. The proposed cloud worm detection and response technique is evaluated based on accuracy rates. The novelty and strengths of the proposed technique for cloud worm detection and response lies in the worm cloud classification, the integration of the enhancement genetic algorithm and the threat level measurement that impact confidentiality, integrity and availability. For the enhanced genetic algorithm (EGA), new parameters have been constructed for the existing genetic algorithm based on the selection proportional of fitness, tree mutation tree crossover and evolution controller to increase the 's accuracy rate of the cloud worm detection technique. The genetic algorithm is based on the idea of the natural selection process and genetics which imitates the biological process, thereby
helping solve unconstrained and constrained optimisation problems. The method of new offspring creation from the fittest parents has been mapped and used to detect unknown future cloud worm attacks. Threat level is measured by security metrics on the basis of confidentiality, integrity and availability impact. An experiment has been conducted in a controlled lab environment based on knowledge discovery techniques using open source tools. This research used I 195 datasets in the experiment wherein dynamic analysis and security metrics have been applied. From the experimentalresult, the FGA technique has produced an overall detection accuracy rate of 99.749 °o with 0.014 % false positive rate, thus outperforming the existing work of the OlexGA technique with 4I. 05 % improvement. This research has produced a technique that can detect and respond to cloud worm attacks. |
format |
Thesis |
author |
Hasan Mahmoud Sha'ban Kanaker |
author_facet |
Hasan Mahmoud Sha'ban Kanaker |
author_sort |
Hasan Mahmoud Sha'ban Kanaker |
title |
Cloud Worm Detection and Response Technique By Integrating The Enhanced Genetic Algorithm An Threat Level |
title_short |
Cloud Worm Detection and Response Technique By Integrating The Enhanced Genetic Algorithm An Threat Level |
title_full |
Cloud Worm Detection and Response Technique By Integrating The Enhanced Genetic Algorithm An Threat Level |
title_fullStr |
Cloud Worm Detection and Response Technique By Integrating The Enhanced Genetic Algorithm An Threat Level |
title_full_unstemmed |
Cloud Worm Detection and Response Technique By Integrating The Enhanced Genetic Algorithm An Threat Level |
title_sort |
cloud worm detection and response technique by integrating the enhanced genetic algorithm an threat level |
granting_institution |
Universiti Sains Islam Malaysia |
url |
https://oarep.usim.edu.my/bitstreams/ab042018-3c20-4cf1-9bb4-626532f08e2b/download https://oarep.usim.edu.my/bitstreams/d2beb3a1-6eef-4d81-8fa7-61a4fb8109ad/download https://oarep.usim.edu.my/bitstreams/e8d18f68-bf43-4815-ba20-bf90bba00187/download https://oarep.usim.edu.my/bitstreams/270a3ae6-308b-47f4-bea3-5faa4b42a2bd/download https://oarep.usim.edu.my/bitstreams/a5b3dc65-7a3f-426f-9b3e-5c41489fadba/download https://oarep.usim.edu.my/bitstreams/5b675ce7-5d9c-4dc5-a431-b4dbbf80f655/download https://oarep.usim.edu.my/bitstreams/dc02cd05-a716-4e4e-8d67-741ed4f01b14/download https://oarep.usim.edu.my/bitstreams/3bfbea43-e471-4264-b378-5a8ef0be0100/download https://oarep.usim.edu.my/bitstreams/b9ec0d06-751c-4aff-a98b-91e115145e47/download https://oarep.usim.edu.my/bitstreams/3b3a3104-edc6-4b62-ac7c-bfc258e0c126/download https://oarep.usim.edu.my/bitstreams/ea0b698d-c836-4156-ade3-b36e5143da73/download |
_version_ |
1812444894022598656 |
spelling |
my-usim-ddms-130312024-05-29T20:18:01Z Cloud Worm Detection and Response Technique By Integrating The Enhanced Genetic Algorithm An Threat Level Hasan Mahmoud Sha'ban Kanaker A worm is known as a malicious code that can replicate, infect and propagate itself without attaching itself to any host. Unlike other malicious codes, such as a Trojan horse and a virus, a worm can cause serious damage due to its payload and interrupt or stop cloud resources and services which then lead to loss of money, confidential information and productivity for organisations or users that rely on data storage, services and applications that run on the cloud. Detecting and stopping cloud worm attacks have become a hard and challenging endeavour. Therefore, this research proposes a cloud worm classification based on its features. The research also develops a cloud worm detection technique by integrating the enhanced genetic algorithm and proposes a cloud response technique based on threat levels. The proposed cloud worm detection and response technique is evaluated based on accuracy rates. The novelty and strengths of the proposed technique for cloud worm detection and response lies in the worm cloud classification, the integration of the enhancement genetic algorithm and the threat level measurement that impact confidentiality, integrity and availability. For the enhanced genetic algorithm (EGA), new parameters have been constructed for the existing genetic algorithm based on the selection proportional of fitness, tree mutation tree crossover and evolution controller to increase the 's accuracy rate of the cloud worm detection technique. The genetic algorithm is based on the idea of the natural selection process and genetics which imitates the biological process, thereby helping solve unconstrained and constrained optimisation problems. The method of new offspring creation from the fittest parents has been mapped and used to detect unknown future cloud worm attacks. Threat level is measured by security metrics on the basis of confidentiality, integrity and availability impact. An experiment has been conducted in a controlled lab environment based on knowledge discovery techniques using open source tools. This research used I 195 datasets in the experiment wherein dynamic analysis and security metrics have been applied. From the experimentalresult, the FGA technique has produced an overall detection accuracy rate of 99.749 °o with 0.014 % false positive rate, thus outperforming the existing work of the OlexGA technique with 4I. 05 % improvement. This research has produced a technique that can detect and respond to cloud worm attacks. Universiti Sains Islam Malaysia 2018-03 Thesis en_US https://oarep.usim.edu.my/handle/123456789/13031 https://oarep.usim.edu.my/bitstreams/5c7b6bfb-ac86-4bee-b68d-92ec725c8f17/download 8a4605be74aa9ea9d79846c1fba20a33 https://oarep.usim.edu.my/bitstreams/ab042018-3c20-4cf1-9bb4-626532f08e2b/download 207ab79cc5d231d5ef83c6b724e851b9 https://oarep.usim.edu.my/bitstreams/d2beb3a1-6eef-4d81-8fa7-61a4fb8109ad/download 1c23cb38e27d577763dc357cb6eadb00 https://oarep.usim.edu.my/bitstreams/e8d18f68-bf43-4815-ba20-bf90bba00187/download 7769b1885eb71ac385d91670a0fba94e https://oarep.usim.edu.my/bitstreams/270a3ae6-308b-47f4-bea3-5faa4b42a2bd/download df4d3d4633f01fb1752807067597df37 https://oarep.usim.edu.my/bitstreams/a5b3dc65-7a3f-426f-9b3e-5c41489fadba/download 07d0c6faeb66b907a9bcfae823e90128 https://oarep.usim.edu.my/bitstreams/5b675ce7-5d9c-4dc5-a431-b4dbbf80f655/download a6a47d74cfa1646fdb243b5fa4eb366c https://oarep.usim.edu.my/bitstreams/dc02cd05-a716-4e4e-8d67-741ed4f01b14/download 86663a4dec3d85e4d56eba7f01fd9562 https://oarep.usim.edu.my/bitstreams/3bfbea43-e471-4264-b378-5a8ef0be0100/download 152fd270ab4581cb20ed816918cc3382 https://oarep.usim.edu.my/bitstreams/b9ec0d06-751c-4aff-a98b-91e115145e47/download c39b81ec7d9e45f08a96666b82b672e4 https://oarep.usim.edu.my/bitstreams/3b3a3104-edc6-4b62-ac7c-bfc258e0c126/download 73013914ab74ae7f389eb3bae57aeed4 https://oarep.usim.edu.my/bitstreams/ea0b698d-c836-4156-ade3-b36e5143da73/download bf490723d38c962627c96898fec2db5d https://oarep.usim.edu.my/bitstreams/ef2dd98b-60c5-41be-b6ba-8513ba9f5fdc/download 3eaf3f4b7f55ab1943c051c713c1743e https://oarep.usim.edu.my/bitstreams/ee944c0d-f39d-4c33-aa56-7ecc34a21ec6/download bee0f30af183deef3a0f423084d6c272 https://oarep.usim.edu.my/bitstreams/5de7724a-f0e3-4892-b2fc-c744fff5715b/download 8a48ee424737fda65a851d8965aeb601 https://oarep.usim.edu.my/bitstreams/b22f3afe-9c4d-4b5f-b6f1-99e506e4d76e/download 31a1dc4446b158101743d662d07d716c https://oarep.usim.edu.my/bitstreams/bacf0700-b316-4ce7-acb2-240022e3ab32/download e1b854190c0edf3c16b32faf65ba96ad https://oarep.usim.edu.my/bitstreams/df906e1a-0248-4a85-b589-e881486fbb70/download 44761395b5d6e4a7ce84c2f9f92d84bb https://oarep.usim.edu.my/bitstreams/0e03e397-bcdd-4490-813e-c505d3b6daf7/download befdda5110eac880703c095cadd2c6b8 https://oarep.usim.edu.my/bitstreams/023e1aac-78bf-4369-b8ee-187631b2efd9/download d53fda68747ade9918f717f5cf9348a2 https://oarep.usim.edu.my/bitstreams/f8265265-c6d7-4d85-93fe-870e42919112/download f2935cfe3f3763f72c870f0770540a4d https://oarep.usim.edu.my/bitstreams/40a8b602-eb40-44a2-a394-c84a014028d0/download ad92175512217890934b6ad3bff57f88 https://oarep.usim.edu.my/bitstreams/3f0face2-2773-4e77-afce-2cf1216f53c4/download 6157224555e151b7a1a7223d41c5d773 Worm analysis Computer security Systems and Data Security. |