Research Article

Detection of Malicious Cloud Bandwidth Consumption in Cloud Computing Using Machine Learning Techniques

Algorithm 1

Generate Artificial Log from the Actual Observed Log L.
Input: Require Actual web server access log L.
Output: Generated Access Log L, with replayed traffic as attack requests.
Step 1: Construct a Data Frame DF by parsing the Actual Web Log L
Step 2: Extract Session information, by session reconstruction from L and update DF
Step 3: Chose the number of requests (nr) to replay
Step 3: For every request ≤ nr
Step 4: Randomly chose one of the session from DF to replay
Step 5: Update Session information S, for the current request
 Step 6: For each Session S < ipAddress, sessionLength,P>
  Step 7: update P < page, time, page_size>
Step 8: L < - L U S
Step 9: Return L