Research Article
Detection of Malicious Cloud Bandwidth Consumption in Cloud Computing Using Machine Learning Techniques
Algorithm 1
Generate Artificial Log from the Actual Observed Log L.
| Input: Require Actual web server access log L. | | Output: Generated Access Log L, with replayed traffic as attack requests. | | Step 1: Construct a Data Frame DF by parsing the Actual Web Log L | | Step 2: Extract Session information, by session reconstruction from L and update DF | | Step 3: Chose the number of requests (nr) to replay | | Step 3: For every request ≤ nr | | Step 4: Randomly chose one of the session from DF to replay | | Step 5: Update Session information S, for the current request | | Step 6: For each Session S < ipAddress, sessionLength,P> | | Step 7: update P < page, time, page_size> | | Step 8: L < - L U S | | Step 9: Return L |
|