DDoS Attack Detection in Cloud Computing Using Deep Learning Algorithms

Authors

  • Marram Amitha Department of Computer Science GITAM Deemed to be University, India
  • Muktevi Srivenkatesh Department of Computer Science GITAM Deemed to be University, India

Keywords:

Cloud computing, Deep Learning, distributed denial of service

Abstract

Distributed cloud computing and its reliance on internet connectivity have more challenges. They offer a great deal of flexibility, and these assets are accessible through the Internet using popular requirements, forms, and protocols for networking according to the cloud service-providing organizations. Attacks like distributed denial of service are a few of the most frequent attacks that severely harm the cloud and lower its performance. Internal attacks cannot be identified using established methods of detection such as firewalls. The attackers frequently modify their skill strategies, because of the increasing amount of data created and stored, conventional detection techniques are inefficient in identifying novel DDoS attacks. Radial Basis Function (RBF) networks are a type of artificial neural network commonly used for function approximation, pattern recognition, and classification tasks. While they have been used in various domains, they are not typically used directly within convolutional neural networks (CNNs) for DDoS (Distributed Denial of Service) detection. This paper presents a hybrid model of Radial Basis Function (RBF) and LSTM networks-based approach for DDoS attack detection and mitigation, aiming to enhance the overall security of cloud computing infrastructures. Our proposed method is evaluated on benchmark dataset CICDDoS2019, demonstrating its effectiveness in identifying DDoS attacks and mitigating their impact on cloud systems.

Downloads

Download data is not yet available.

References

Masdari, M., and Jalali, M.: ‘A survey and taxonomy of DoS attacks in cloud computing’, Security and Communication Networks, 2016, 9, (16), pp. 3724-3751

Song Wang, Juan Fernando Balarezo, Karina Gomez Chavez, Akram Al-Hourani, Sithamparanathan Kandeepan, Muhammad Rizwan Asghar, Giovanni Russello, “Detecting flooding DDoS attacks in software defined networks using supervised learning techniques”, Engineering Science and Technology, an International Journal, Volume 35,2022,101-176, ISSN 2215-0986,

Rawashdeh, A., Alkasassbeh, M., and Al-Hawawreh, M.: ‘An anomaly-based approach for DDoS attack detection in cloud environment’, International Journal of Computer Applications in Technology, 2018, 57, (4), pp. 312-324

Wani, A.R., Rana, Q., Saxena, U., and Pandey, N.: ‘Analysis and Detection of DDoS Attacks on Cloud Computing Environment using Machine Learning Techniques’, in Editor (Ed.)^(Eds.): ‘Book Analysis and Detection of DDoS Attacks on Cloud Computing Environment using Machine Learning Techniques’ (IEEE, 2019, edn.), pp. 870-875

Idhammad, M., Afdel, K., and Belouch, M.: ‘Detection system of HTTP DDoS attacks in a cloud environment based on information theoretic entropy and random forest’, Security and Communication Networks, 2018, 2018

Hezavehi, S.M., and Rahmani, R.: ‘An anomaly-based framework for mitigating effects of DDoS attacks using a third party auditor in cloud computing environments’, Cluster Computing, 2020, pp. 1-19

R. K. Gupta et al., “An Improved Secure Key Generation Using Enhanced Identity-Based Encryption for Cloud Computing in Large Scale 5G”, Wireless Communications and Mobile Computing 2022.

Khuphiran, Panida, et al. "Performance comparison of machine learning models for ddos attacks detection." 2018 22nd International Computer Science and Engineering Conference (ICSEC). IEEE, 2018.

Farnaaz, Nabila, and M. A. Jabbar. "Random forest modeling for network intrusion detection system." Procedia Computer Science 89 (2016): 213-217.

Sahi, A., Lai, D., Li, Y., and Diykh, M.: ‘An efficient DDoS TCP flood attack detection and prevention system in a cloud environment’, IEEE Access, 2017, 5, pp. 6036-6048

Chen, Z., Jiang, F., Cheng, Y., Gu, X., Liu, W., and Peng, J.: ‘XGBoost classifier for DDoS attack detection and analysis in SDN-based cloud’, in Editor (Ed.)^(Eds.): ‘Book XGBoost classifier for DDoS attack detection and analysis in SDN-based cloud’ (IEEE, 2018, edn.), pp. 251-256

Kingma, D. P., & Ba, J. (2015). Adam: a method for stochastic optimization. 3rd International Conference for Learning Representations, San Diego. Sharafaldin, I., Lashkari, A. H., Hakak, S., & Ghorbani, A. A. (2019).

Chollet F., “Keras: Python Deep Learning Library,” https://keras.io, Last Visited, 2022. [27] University of New Brunswick. DDoS Evaluation Dataset (CIC-DDoS2019). 2019. Available online: https://www.unb.ca/cic/ datasets/ddos-2019.html (accessed on 20 december 2021).

Sharafaldin, I.; Lashkari, A.H.; Hakak, S.; Ghorbani, A.A. Developing realistic distributed denial of service (DDoS) attack dataset and taxonomy. In Proceedings of the 2019 International Carnahan Conference on Security Technology (ICCST), Chennai, India, 1–3 October 2019; pp. 1–8

Cheng, J.; Yin, J.; Liu, Y.; Cai, Z.;Wu, C. DDoS attack detection using IP address feature interaction. In Proceedings of the IEEE International Conference on Intelligent Networking and Collaborative Systems, Thessalonika, Greece, 24–26 November 2010; IEEE: Piscataway Township, NJ, USA, 2009; pp. 113–118.

Wang, C.; Zheng, J.; Li, X. Research on DDoS attacks detection based on RDF-SVM. In Proceedings of the 10th International Conference on Intelligent Computation Technology and Automation, Changsha, China, 9–12 October 2017.

Prathyusha, D.J., and Kannayaram, G.: ‘A cognitive mechanism for mitigating DDoS attacks using the artificial immune system in a cloud environment’, Evolutionary Intelligence, 2020, pp. 1-12

Rabbani, M., Wang, Y.L., Khoshkangini, R., Jelodar, H., Zhao, R., and Hu, P.: ‘A hybrid machine learning approach for malicious behaviour detection and recognition in cloud computing’, Journal of Network and Computer Applications, 2020, 151, pp. 102507

Zareapoor, M., Shamsolmoali, P., and Alam, M.A.: ‘Advance DDOS detection and mitigation technique for securing cloud’, International Journal of Computational Science and Engineering, 2018, 16, (3), pp. 303-310

Xu, Y., Sun, H., Xiang, F., and Sun, Z.: ‘Efficient DDoS Detection Based on K-FKNN in Software Defined Networks’, IEEE Access, 2019, 7, pp. 160536-160545

Velliangiri, S., and Pandey, H.M.: ‘Fuzzy-Taylor-elephant herd optimization inspired Deep Belief Network for DDoS attack detection and comparison with state-of-the-arts algorithms’, Future Generation Computer Systems, 2020

Kesavamoorthy, R., and Soundar, K.R.: ‘Swarm intelligence based autonomous DDoS attack detection and defense using multi agent system’, Cluster Computing, 2019, 22, (4), pp. 9469-9476

A. Al-Abassi, H. Karimipour, A. Dehghantanha, and R. M. Parizi, “An ensemble deep learning-based cyber-attack detection in industrial control system,” IEEE Access, vol. 8, pp. 83965–83973, 2020.

Y. Liu, M. Dong, K. Ota, J. Li and J. Wu, "Deep Reinforcement Learning based Smart Mitigation of DDoS Flooding in Software-Defined Networks," 2018 IEEE 23rd International Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMAD), Barcelona, Spain, 2018, pp. 1-6, doi: 10.1109/CAMAD.2018.8514971.

Srikanth yadav M., R. Kalpana, “Recurrent nonsymmetric deep auto encoder approach for network intrusion detection system, Measurement: Sensors, Volume 24, 2022, ISSN 2665-9174

G. Oke, G. Loukas and E. Gelenbe, "Detecting Denial of Service Attacks with Bayesian Classifiers and the Random Neural Network," 2007 IEEE International Fuzzy Systems Conference, London, UK, 2007, pp. 1-6, doi: 10.1109/FUZZY.2007.4295666.

LV Y, Le Q-T, Bui H-B, Bui X-N, Nguyen H, Nguyen-Thoi T, Dou J, Song X. A Comparative Study of Different Machine Learning Algorithms in Predicting the Content of Ilmenite in Titanium Placer. Applied Sciences. 2020; 10(2):635. https://doi.org/10.3390/app10020.

Singh, C. ., Gangwar, M. ., & Kumar, U. . (2023). Improving Accuracy of Integrated Neuro-Fuzzy Classifier with FCM based Clustering for Diagnosis of Psychiatric Disorder. International Journal on Recent and Innovation Trends in Computing and Communication, 11(2s), 244–248. https://doi.org/10.17762/ijritcc.v11i2s.6143

Hernandez, A., Hughes, W., Silva, D., Pérez, C., & Rodríguez, C. Machine Learning for Predictive Analytics in Engineering Procurement. Kuwait Journal of Machine Learning, 1(2). Retrieved from ttp://kuwaitjournals.com/index.php/kjml/article/view/124

Downloads

Published

21.09.2023

How to Cite

Amitha, M. ., & Srivenkatesh, M. . (2023). DDoS Attack Detection in Cloud Computing Using Deep Learning Algorithms. International Journal of Intelligent Systems and Applications in Engineering, 11(4), 82–90. Retrieved from https://ijisae.org/index.php/IJISAE/article/view/3456

Issue

Section

Research Article