DDoS Attacks Detection via Three-Tier Optimization Algorithm in Cloud Environment
Keywords:
Cloud environment, Sequential Backward Selection, Independent Component Analysis, Swarm Intelligence, unauthorized personAbstract
Cloud environment is significantly threatened by distributed denial of service (DDoS) attacks, which can quickly reduce the system's resources, keep the servers busy, and cause severe system damage. Recently, many DDoS attacks have been carried out using cunning tactics, including low-rate attacks and attacks that target authenticated users. In this paper, a novel DDoS Attack Detection (DAD) technique has been proposed to detect and recover the attacker. The suggested technique involves preprocessing process in terms of three processes including Sequential Backward Selection (SBS), Independent Component Analysis (ICA), and Sewing Training-Based Optimization (STBO). An SBS analyzes and detects unauthorized or authorized requests, as well as recover attacks. But some attacks will not recover in beginning stage so the further preprocessing process will perform using ICA under identify, retrieval, organizer. The Identification process will check whether the request is from attacker or not from the database using SBS algorithm. If the request from unauthorized person, the retrieval process will start to recover and after recover the request to store data into the organizer. Finally, the performance of the suggested DAD technique is compared with MLDMF, PSD, and ADADM and the performance analysis of the proposed technique is determined using detection rate, precision, False alarm rate, and accuracy. The proposed method achieves a higher level of accuracy is 97%.
Downloads
References
Mohaiminul Islam, Shamim Reza. The Rise of Big Data and Cloud Computing, Internet of Things and Cloud Computing. Volume 7, Issue 2, June 2019 , pp. 45-53.
Aytaç T, Aydın MA, Zaim AH. Detection DDOS Attacks Using Machine Learning Methods. Electrica, 2020; 20(2): 159-167.
Santos, R., Souza, D., Santo, W., Ribeiro, A. and Moreno, E., 2020. Machine learning algorithms to detect DDoS attacks in SDN. Concurrency and Computation: Practice and Experience, 32(16), p.e5402.
Mohammed, M.H., 2022. An enhancement of cyber security management for opportunistic systems. Measurement: Sensors, 24, p.100547.
Hesham Abusaimeh, “Distributed Denial of Service Attacks in Cloud Computing” International Journal of Advanced Computer Science and Applications(IJACSA), 11(6), 2020.
Mohammad, M.A. and Jawhar, M.M., 2022. Compare between PSO and artificial bee colony optimization algorithm in detecting DoS attacks from network traffic. TELKOMNIKA Telecommunication Computing Electronics and ControlVol. 20, No. 4, August 2022, pp. 780~787.
Roopak, M., Tian, G. Y., Chambers, J. A. (2020). Multi‐objective‐based Feature Selection For Ddos Attack Detection In Iot Networks. IET Networks, 3(9), 120-127
Virupakshar, K.B., Asundi, M., Channal, K., Shettar, P., Patil, S. and Narayan, D.G., 2020. Distributed denial of service (DDoS) attacks detection system for OpenStack-based private cloud. Procedia Computer Science, 167, pp.2297-2307
AM R. A DDoS defence framework in software defined network using ensemble classifier with rough set theory based feature selection. International Journal of Advanced Technology and Engineering Exploration. 2021; 8(82):1120-1135.
Khraisat, A., Gondal, I., Vamplew, P., Kamruzzaman, J. and Alazab, A., 2019. A novel ensemble of hybrid intrusion detection system for detecting internet of things attacks. Electronics, 8(11), p.1210.
Yan, Q., Huang, W., Luo, X., Gong, Q. and Yu, F.R., 2018. A multi-level DDoS mitigation framework for the industrial Internet of Things. IEEE Communications Magazine, 56(2), pp.30-36.
Mohamed Idhammad, Karim Afdel, Mustapha Belouch, "Detection System of HTTP DDoS Attacks in a Cloud Environment Based on Information Theoretic Entropy and Random Forest", Security and Communication Networks, vol. 2018, Article ID 1263123, 13 pages, 2018.
Virupakshar, K.B., Asundi, M., Channal, K., Shettar, P., Patil, S. and Narayan, D.G., 2020. Distributed denial of service (DDoS) attacks detection system for OpenStack-based private cloud. Procedia Computer Science, 167, pp.2297-2307.
Gumaste, S. and Shinde, S., 2020. Detection of DDOS attacks in openstack-based private cloud using apache spark. Journal of Telecommunications and Information Technology, 62-71.
Saxena, R. and Dey, S., 2020. DDoS attack prevention using collaborative approach for cloud computing. Cluster Computing, 23(2), pp.1329-1344.
Q. He, et al.,"A Game-Theoretical Approach for Mitigating Edge DDoS Attack" in IEEE Transactions on Dependable and Secure Computing, vol. 19, no. 04, pp. 2333-2348, 2022.
Yadav, B. and Satija, R., Introducing three-tier captcha to prevent DDOS attack in Cloud computing. International Journal on Recent and Innovation Trends in Computing and Communication, 2(7), pp.1969-1973.
Hou, F., Sun, J., Yang, Q. and Pang, Z., 2022. Deep reinforcement learning for optimal denial-of-service attacks scheduling. Science China Information Sciences, 65(6), pp.1-9
Yousuf, O. and Mir, R.N., 2022. DDoS attack detection in Internet of Things using recurrent neural network. Computers and Electrical Engineering, 101, p.108034.
Adi, E., Anwar, A., Baig, Z. and Zeadally, S., 2020. Machine learning and data analytics for the IoT. Neural Computing and Applications, 32(20), pp.16205-16233.
Downloads
Published
How to Cite
Issue
Section
License
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
All papers should be submitted electronically. All submitted manuscripts must be original work that is not under submission at another journal or under consideration for publication in another form, such as a monograph or chapter of a book. Authors of submitted papers are obligated not to submit their paper for publication elsewhere until an editorial decision is rendered on their submission. Further, authors of accepted papers are prohibited from publishing the results in other publications that appear before the paper is published in the Journal unless they receive approval for doing so from the Editor-In-Chief.
IJISAE open access articles are licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. This license lets the audience to give appropriate credit, provide a link to the license, and indicate if changes were made and if they remix, transform, or build upon the material, they must distribute contributions under the same license as the original.