The proposed mechanism investigates several ma-
chine learning techniques and combines them. First,
N-Gram module filters the operation sequence. The
filtered sequence is combined with resource usage
metrics. Then, the proposed framework classifies the
requests as regular or malicious using the combined
measured metrics. This classification module is built
on the training data. The Random Forest classifier is
able to detect a malicious request with the probability
of 0.87 in the proposed framework.
It is obvious that better results can be obtained us-
ing proposed framework with the more precise mea-
surement and different metrics in the future. Im-
proved frameworks would be applicable to malicious
behavior detection into the PaaS clouds domain in the
near future. As a future work, proposed framework
scenarios will be extended using different cloud ap-
plications and different metrics.
REFERENCES
Arshad, J., Townend, P., and Xu, J. (2012). An abstract
model for integrated intrusion detection and severity
analysis for clouds. Cloud Computing Advancements
in Design, Implementation, and Technologies, 1.
Banerjee, C., Kundu, A., Basu, M., Deb, P., Nag, D., and
Dattagupta, R. (2013). A service based trust man-
agement classifier approach for cloud security. In Ad-
vanced Computing Technologies (ICACT), 2013 15th
International Conference on, pages 1–5. IEEE.
Bazm, M.-M., Lacoste, M., S
¨
udholt, M., and Menaud, J.-M.
(2017). Side Channels in the Cloud: Isolation Chal-
lenges, Attacks, and Countermeasures. working paper
or preprint.
Bazrafshan, Z., Hashemi, H., Fard, S. M. H., and Hamzeh,
A. (2013). A survey on heuristic malware detection
techniques. In Information and Knowledge Technol-
ogy (IKT), 2013 5th Conference on, pages 113–120.
IEEE.
Breiman, L. (2001). Random forests. Machine learning,
45(1):5–32.
Fan, Y., Ye, Y., and Chen, L. (2016). Malicious sequen-
tial pattern mining for automatic malware detection.
Expert Systems with Applications, 52:16–25.
Garfinkel, T., Rosenblum, M., et al. (2003). A virtual
machine introspection based architecture for intrusion
detection. In Ndss, volume 3, pages 191–206.
Hamad, H. and Al-Hoby, M. (2012). Managing intrusion
detection as a service in cloud networks. International
Journal of Computer Applications, 41(1).
Hu, W., Hu, W., and Maybank, S. (2008). Adaboost-
based algorithm for network intrusion detection. IEEE
Transactions on Systems, Man, and Cybernetics, Part
B (Cybernetics), 38(2):577–583.
Kiczales, G., Lamping, J., Mendhekar, A., Maeda, C.,
Lopes, C., Loingtier, J.-M., and Irwin, J. (1997).
Aspect-oriented programming. ECOOP’97Object-
oriented programming, pages 220–242.
Mamitsuka, N. A. H. et al. (1998). Query learning strate-
gies using boosting and bagging. In Machine learn-
ing: proceedings of the fifteenth international confer-
ence (ICML98), volume 1.
Modi, C., Patel, D., Borisaniya, B., Patel, H., Patel, A., and
Rajarajan, M. (2013). A survey of intrusion detection
techniques in cloud. Journal of Network and Com-
puter Applications, 36(1):42–57.
Networking, C. V. (2017). Ciscoglobal cloud index: fore-
cast and methodology, 2015-2020. white paper.
Pirscoveanu, R. S., Hansen, S. S., Larsen, T. M., Ste-
vanovic, M., Pedersen, J. M., and Czech, A. (2015).
Analysis of malware behavior: Type classification us-
ing machine learning. In Cyber Situational Aware-
ness, Data Analytics and Assessment (CyberSA), 2015
International Conference on, pages 1–7. IEEE.
Sandıkkaya, M. T.,
¨
Odevci, B., and Ovatman, T. (2014).
Practical runtime security mechanisms for an apaas
cloud. In Globecom Workshops (GC Wkshps), 2014,
pages 53–58. IEEE.
Sanjay Ram, M. (2012). Secure cloud computing based on
mutual intrusion detection system. International Jour-
nal of Computer application, 1(2):57–67.
Shabtai, A., Moskovitch, R., Feher, C., Dolev, S., and
Elovici, Y. (2012). Detecting unknown malicious code
by applying classification techniques on opcode pat-
terns. Security Informatics, 1(1):1.
Su, Z., Yang, Q., Lu, Y., and Zhang, H. (2000). Whatnext:
A prediction system for web requests using n-gram
sequence models. In Web Information Systems Engi-
neering, 2000. Proceedings of the First International
Conference on, volume 1, pages 214–221. IEEE.
Uppal, D., Sinha, R., Mehra, V., and Jain, V. (2014). Mal-
ware detection and classification based on extraction
of api sequences. In Advances in Computing, Com-
munications and Informatics (ICACCI, 2014 Interna-
tional Conference on, pages 2337–2342. IEEE.
Wu, S. X. and Banzhaf, W. (2010). The use of computa-
tional intelligence in intrusion detection systems: A
review. Applied Soft Computing, 10(1):1–35.
Zhang, Y., Juels, A., Reiter, M. K., and Ristenpart, T.
(2014). Cross-tenant side-channel attacks in paas
clouds. In Proceedings of the 2014 ACM SIGSAC
Conference on Computer and Communications Secu-
rity, pages 990–1003. ACM.
Classifying Malicious Thread Behavior in PaaS Web Services
425