Proposed work shall start with the collection of Network logs and user application logs and stored in whether Elastics Block Storage or Dynamo DB or virtual HDFS in Cloud.
2) Extraction of Attack features by preprocessing the Data.
3) Identification of Potential Attack Paths.
4) Various machine learning Classifier techniques will be adopted for extraction of features and their respective classes.
5) Validation of proposed solutions by applying different attacks & compare it with outcome of proposed solution