Total views : 190

Detection and Prediction of Abnormal Users in Cloud Network


  • School of Computing, SASTRA University, Tirumalaisamudram, Thanjavur – 613401, Tamilnadu, India


Objectives: Cloud computing refers to an internet based computing that allows sharing data and resources, which provides create, configure and customize the applications online. Methods: To overcome this issue, we proposed an analyzing behavior of user’s traffic. First, construct a whole feature set by collecting features from users and feature selection is helps to choose set of accurate features where necessary features are selected and predicted for an abnormal user is done by Naive Bayes classification. Findings: Support Vector Machine (SVM) produces high accuracy and over fitting of data is applicable. This new method improves the efficiency and detection rate of the system in the analysis of traffic behavior of abnormal users. Applications: Email communication, banking, e-commerce and social networks.


Data Mining Techniques, Feature Set, Feature Selection, Network Traffic Analysis, Network Traffic Prediction, SVM.

Full Text:

 |  (PDF views: 164)


  • Lai Y, Chen Y, Liu Z, Yang Z, Li X. On monitoring and predicting mobile network traffic abnormality. Simulation Modelling and Practice Theory. 2015 Jan; 50:176–88.
  • Rutka G. Some aspects of traffic analysis used for internet traffic prediction. Research Journal of Electronics and Electrical Engineering. 2009; 5(93):1–4.
  • On the investigation of cloud-based mobile media environments with service-populating and Qos-aware mechanisms [Internet]. 2012 [cited 2012 Nov 13]. Available from: http://
  • Kirubakaramoorthi R, Arivazhagan D, Helen D. Analysis of cloud computing technology. Indian Journal of Science and Technology. 2015 Sep; 8(21):1–3.
  • Zhani MF, Elbiaze H. Analysis and prediction of real network traffic. Journal of Networks. 2009 Nov; 4(9):855–65.
  • Du Z, Fan W, Chai Y, Chen Y. Priori information and sliding window based prediction algorithm for energy-efficient storage systems in cloud. Simulation Modelling Practice and Theory. 2013 Dec; 39:3–19.
  • Mavromoustakis CX, Karatza HD. Adaptive traffic-based control method for energy conservation in wireless devices.Simulation Modelling Practice and Theory. 2005 Apr; 13(3):213–32.
  • Farraposo S, Owezarski P, Montreiro E. A multi-scale tomographic algorithm for detecting and classifying traffic anomalies. Proceedings of Institute of Electrical and Electronics Engineers (IEEE) International Conference on Communications; 2007 Jul. p. 1–5.
  • Zhang L, Wang J, Lin S. Design of the network traffic anomaly detection system in cloud computing environment. In the proceedings of Fourth International Symposium on Information Science and Engineering (ISISE), Institute of Electrical and Electronics Engineers (IEEE) Xplore Digital Library; 2012 Dec 14. p. 16–9.
  • Prasad SNSE, Srinath MV, Basha MS. Intrusion detection systems, tools and techniques – an overview. Indian Journal of Science and Technology. 2015 Dec; 8(35):1–7.
  • Singh MP. Quantifying concept drifting in network traffic using ROC curves from naive bayes classifier. In the Proceedings of Nirma University International Conference on Engineering (NUiCONE), Institute of Electrical and Electronics Engineers (IEEE) Xplore Digital Library; 2013 Nov 28. p. 1–5.
  • Auld T, Moore AW, Gull SF. Bayesian neural networks for internet traffic classification. Institute of Electrical and Electronics Engineers (IEEE) Transactions on neural networks.2007 Jan; 18(1):223–39.


  • There are currently no refbacks.

Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.