DDoS Attacks Detection via Three-Tier Optimization Algorithm in Cloud Environment

Authors

  • M. Mohan Research Scholar, Department of Information Technology, Annamalai University. Tamil Nadu, India
  • V. Tamizhazhagan Research Supervisor , Assistant Professor, Department of Information Technology , Annamalai University, Tamil Nadu, India.
  • S. Balaji Professor, CSE, Panimalar Engineering College, Chennai, Tamilnadu, India

Keywords:

Cloud environment, Sequential Backward Selection, Independent Component Analysis, Swarm Intelligence, unauthorized person

Abstract

Cloud environment is significantly threatened by distributed denial of service (DDoS) attacks, which can quickly reduce the system's resources, keep the servers busy, and cause severe system damage. Recently, many DDoS attacks have been carried out using cunning tactics, including low-rate attacks and attacks that target authenticated users. In this paper, a novel DDoS Attack Detection (DAD) technique has been proposed to detect and recover the attacker. The suggested technique involves preprocessing process in terms of three processes including Sequential Backward Selection (SBS), Independent Component Analysis (ICA), and Sewing Training-Based Optimization (STBO). An SBS analyzes and detects unauthorized or authorized requests, as well as recover attacks. But some attacks will not recover in beginning stage so the further preprocessing process will perform using ICA under identify, retrieval, organizer. The Identification process will check whether the request is from attacker or not from the database using SBS algorithm. If the request from unauthorized person, the retrieval process will start to recover and after recover the request to store data into the organizer. Finally, the performance of the suggested DAD technique is compared with MLDMF, PSD, and ADADM and the performance analysis of the proposed technique is determined using detection rate, precision, False alarm rate, and accuracy. The proposed method achieves a higher level of accuracy is 97%.

Downloads

Download data is not yet available.

References

Mohaiminul Islam, Shamim Reza. The Rise of Big Data and Cloud Computing, Internet of Things and Cloud Computing. Volume 7, Issue 2, June 2019 , pp. 45-53.

Aytaç T, Aydın MA, Zaim AH. Detection DDOS Attacks Using Machine Learning Methods. Electrica, 2020; 20(2): 159-167.

Santos, R., Souza, D., Santo, W., Ribeiro, A. and Moreno, E., 2020. Machine learning algorithms to detect DDoS attacks in SDN. Concurrency and Computation: Practice and Experience, 32(16), p.e5402.

Mohammed, M.H., 2022. An enhancement of cyber security management for opportunistic systems. Measurement: Sensors, 24, p.100547.

Hesham Abusaimeh, “Distributed Denial of Service Attacks in Cloud Computing” International Journal of Advanced Computer Science and Applications(IJACSA), 11(6), 2020.

Mohammad, M.A. and Jawhar, M.M., 2022. Compare between PSO and artificial bee colony optimization algorithm in detecting DoS attacks from network traffic. TELKOMNIKA Telecommunication Computing Electronics and ControlVol. 20, No. 4, August 2022, pp. 780~787.

Roopak, M., Tian, G. Y., Chambers, J. A. (2020). Multi‐objective‐based Feature Selection For Ddos Attack Detection In Iot Networks. IET Networks, 3(9), 120-127

Virupakshar, K.B., Asundi, M., Channal, K., Shettar, P., Patil, S. and Narayan, D.G., 2020. Distributed denial of service (DDoS) attacks detection system for OpenStack-based private cloud. Procedia Computer Science, 167, pp.2297-2307

AM R. A DDoS defence framework in software defined network using ensemble classifier with rough set theory based feature selection. International Journal of Advanced Technology and Engineering Exploration. 2021; 8(82):1120-1135.

Khraisat, A., Gondal, I., Vamplew, P., Kamruzzaman, J. and Alazab, A., 2019. A novel ensemble of hybrid intrusion detection system for detecting internet of things attacks. Electronics, 8(11), p.1210.

Yan, Q., Huang, W., Luo, X., Gong, Q. and Yu, F.R., 2018. A multi-level DDoS mitigation framework for the industrial Internet of Things. IEEE Communications Magazine, 56(2), pp.30-36.

Mohamed Idhammad, Karim Afdel, Mustapha Belouch, "Detection System of HTTP DDoS Attacks in a Cloud Environment Based on Information Theoretic Entropy and Random Forest", Security and Communication Networks, vol. 2018, Article ID 1263123, 13 pages, 2018.

Virupakshar, K.B., Asundi, M., Channal, K., Shettar, P., Patil, S. and Narayan, D.G., 2020. Distributed denial of service (DDoS) attacks detection system for OpenStack-based private cloud. Procedia Computer Science, 167, pp.2297-2307.

Gumaste, S. and Shinde, S., 2020. Detection of DDOS attacks in openstack-based private cloud using apache spark. Journal of Telecommunications and Information Technology, 62-71.

Saxena, R. and Dey, S., 2020. DDoS attack prevention using collaborative approach for cloud computing. Cluster Computing, 23(2), pp.1329-1344.

Q. He, et al.,"A Game-Theoretical Approach for Mitigating Edge DDoS Attack" in IEEE Transactions on Dependable and Secure Computing, vol. 19, no. 04, pp. 2333-2348, 2022.

Yadav, B. and Satija, R., Introducing three-tier captcha to prevent DDOS attack in Cloud computing. International Journal on Recent and Innovation Trends in Computing and Communication, 2(7), pp.1969-1973.

Hou, F., Sun, J., Yang, Q. and Pang, Z., 2022. Deep reinforcement learning for optimal denial-of-service attacks scheduling. Science China Information Sciences, 65(6), pp.1-9

Yousuf, O. and Mir, R.N., 2022. DDoS attack detection in Internet of Things using recurrent neural network. Computers and Electrical Engineering, 101, p.108034.

Adi, E., Anwar, A., Baig, Z. and Zeadally, S., 2020. Machine learning and data analytics for the IoT. Neural Computing and Applications, 32(20), pp.16205-16233.

Downloads

Published

24.03.2024

How to Cite

Mohan, M. ., Tamizhazhagan, V. ., & Balaji, S. . (2024). DDoS Attacks Detection via Three-Tier Optimization Algorithm in Cloud Environment . International Journal of Intelligent Systems and Applications in Engineering, 12(18s), 534–541. Retrieved from https://ijisae.org/index.php/IJISAE/article/view/5001

Issue

Section

Research Article

Similar Articles

You may also start an advanced similarity search for this article.