Open Access Open Access  Restricted Access Subscription Access
Open Access Open Access Open Access  Restricted Access Restricted Access Subscription Access

Data Mining Approach and Security Over DDOS Attacks


Affiliations
1 School of Computing Science and Engineering, Galgotias University, India
2 Department of Computer Science, Gambella University, India
     

   Subscribe/Renew Journal


The benefit of on-demand services is one of the most important benefits of using cloud computing; therefore, the payment method in the cloud environment is pay per use. This feature results in a new type of DDOS attack called Economic Denial of Sustainability (EDoS), where as a result of the attack the customer pays the cloud provider extra. Similar to other DDoS attacks, EDoS attacks are divided into different groups, such as bandwidth-consuming attacks, specific target attacks, and connections-layer-exhaustion attacks. In this study, we propose a novel system for detecting different types of EDoS attacks by developing a pro le that learns from normal and abnormal behaviors and classifies them. In this sense, the extra demanding resources are allocated only to VMs that are found to be in a normal situation and thus prevent attack and resource dissemination from the cloud environment.

Keywords

DDoS Attacks, EDoS Attacks, Cloud Computing, Machine Learning Detection.
Subscription Login to verify subscription
User
Notifications
Font Size

  • B.R. Kandukuri, V.R. Paturi and A. Rakshit, “Cloud Security Issues, in: Services Computing”, Proceedings of IEEE International Conference on Services Computing, 2009, pp. 517-520, 2009.
  • L.M. Kaufman, “Can Public-Cloud Security meet its Unique Challenges?”, IEEE Security and Privacy, Vol. 4, No. 8, pp. 55-57, 2010.
  • W. Xing, E.P.R. Guo and S. Goggins, “Participation-Based Student Final Performance Prediction Model through interpretable Genetic Programming: Integrating Learning Analytics, Educational Data Mining and Theory”, Computers in Human Behavior, Vol. 47, pp. 168-181, 2015.
  • Q. Yan, R. Yu, Q. Gong and J. Li, “Software-Defined Networking (SDN) and Distributed Denial of Service (DDoS) Attacks in Cloud Computing Environments: A Survey, Some Research Issues, and Challenges”, IEEE Communications Surveys and Tutorials, Vol. 18, No. 1, pp. 602-622, 2015.
  • G. Somani, M.S. Gaur, D. Sanghi, M. Conti, “DDoS Attacks in Cloud Computing: Collateral Damage to Non-Targets”, Computer Networks, Vol. 109, No. 2, pp. 157-171, 2016.
  • A. Badr and A. William, “Proactive Approach for the Prevention of DDoS Attacks in Cloud Computing Environments”, Springer, 2017.
  • L. Feinstein, D. Schnackenberg, R. Balupari and D. Kindred, “Statistical Approaches to DDoS Attack Detection and Response”, Proceedings of IEEE International Conference on Information Survivability Conference and Exposition, pp. 303-314, 2003.
  • K. Bunkar, U.K. Singh, B. Pandya and R. Bunkar, “Data Mining: Prediction for Performance Improvement of Graduate Students using Classification”, Proceedings of IEEE International Conference on Wireless and Optical Communications Networks, pp. 20-27, 2012.
  • A. Keramati, R.J. Marandi, M. Aliannejadi, I. Ahmadian, M. Mozaffari and U. Abbasi, “Improved Churn Prediction in Telecommunication Industry using Data Mining Techniques”, Applied Soft Computing, Vol. 24, pp. 994-1012, 2014.
  • L.P. Macfadyen and S. Dawson. “Mining LMS Data to Develop an “Early Warning System” for Educators: A Proof of Concept”, Computers and Education, Vol. 54, No. 2, pp. 588-599, 2010.
  • Xutao Zhao, “Study on DDoS Attacks based on DPDK in Cloud Computing”, Proceedings of 3rd IEEE International Conference on Computational Intelligence and Communication Technology, pp. 1-5, 2017.
  • S. Aqeel, L. David, L. Yan and D. Mohammed, “An Efficient DDoS TCP Flood Attack Detection and Prevention System in a Cloud Environment”, IEEE Access, Vol. 5, pp. 6036-6048, 2017.
  • G. Somani, M.S. Gaur, D. Sanghi, M. Conti and R. Buyya, “DDoS Attacks in Cloud Computing: Issues, Taxonomy, and Future Directions”, Computer Communications, Vol. 107, pp. 30-48, 2017.
  • B.B. Gupta and O.P. Badve, “Taxonomy of DoS and DDoS Attacks and Desirable Defense Mechanism in a Cloud Computing Environment”, Neural Computing and Applications, Vol. 28, pp. 3655-3682, 2017.
  • N. Agrawal and S. Tapaswi, “Defense Schemes for Variants of Distributed Denial-of-Service (DDoS) Attacks in Cloud Computing: A Survey”, Information Security Journal: A Global Perspective, Vol. 26, No. 2, pp. 1-13, 2017.
  • A. Rukavitsyn, K. Borisenko and A.Shorov, “Self-Learning Method for DDoS Detection Model in Cloud Computing”, Proceedings of IEEE Conference of Russian Young Researchers in Electrical and Electronic Engineering, pp. 1-6, 2017.
  • S.M. Himadri, H.M.D. Tariq, H.M.D. Bellal, R.M. Ekhlasur and R. Hasan, “Enhancing Secure Cloud Computing Environment by Detecting DDoS Attack using Fuzzy Logic”, Proceedings of International Conference on Electrical Information and Communication Technology, pp. 7-9, 2017.
  • R. Kesavamoorthy and K.R. Soundar, “Swarm Intelligence based Autonomous DDoS Attack Detection and Defense using Multi Agent System”, Springer, 2018.
  • W. Alosaimi and K.A. Begain, “A New Method to Mitigate the Impacts of the Economical Denial of Sustainability Attacks against the Cloud”, Proceedings of 14th Annual Post Graduates Symposium on the Convergence of Telecommunication, Networking and Broadcasting, pp. 116-121, 2013.
  • H. Wang, Q. Jia, D. Fleck, W. Powell, F. Li and A. Stavrou, “A Moving Target DDoS Defense Mechanism”, Computer Communications, Vol. 46, pp. 10-21, 2014.
  • T. Karnwal, T. Sivakumar and G. Aghila, “A Comber Approach to Protect Cloud Computing against XML DDoS and HTTP DDoS Attack”, Proceedings of International Conference on Electrical, Electronics and Computer Science, pp. 1-5, 2012.
  • T. Anderson, T. Roscoe and D. Wetherall, “Preventing Internet Denial-of-Service with Capabilities”, Proceedings of ACM International Conference on Computer Communications, pp. 39-44, 2004.
  • M. Masood, Z. Anwar, S.A. Raza and M.A. Hur, “EDoS Armor: A Cost Effective Economic Denial of Sustainability Attack Mitigation Framework for E-Commerce Applications in Cloud Environments”, Proceedings of 16th IEEE International Conference on Multi Topic, pp. 37-42, 2013.
  • Q. Jia, H. Wang, D. Fleck, F. Li, A. Stavrou and W. Powell, “Catch Me If You can: A Cloud-Enabled DDoS Defense”, Proceedings of IEEE International Conference on Dependable Systems and Networks, pp. 264-275, 2014.
  • Q. Chen, W. Lin, W. Dou and S. Yu, “CBF: A Packet Filtering Method for DDoS Attack Defense in Cloud Environment”, Proceedings of IEEE International Conference on Dependable, Autonomic and Secure Computing, pp. 427-434, 2011.

Abstract Views: 226

PDF Views: 0




  • Data Mining Approach and Security Over DDOS Attacks

Abstract Views: 226  |  PDF Views: 0

Authors

M. Arvindhan
School of Computing Science and Engineering, Galgotias University, India
Bhanu Prakash Ande
Department of Computer Science, Gambella University, India

Abstract


The benefit of on-demand services is one of the most important benefits of using cloud computing; therefore, the payment method in the cloud environment is pay per use. This feature results in a new type of DDOS attack called Economic Denial of Sustainability (EDoS), where as a result of the attack the customer pays the cloud provider extra. Similar to other DDoS attacks, EDoS attacks are divided into different groups, such as bandwidth-consuming attacks, specific target attacks, and connections-layer-exhaustion attacks. In this study, we propose a novel system for detecting different types of EDoS attacks by developing a pro le that learns from normal and abnormal behaviors and classifies them. In this sense, the extra demanding resources are allocated only to VMs that are found to be in a normal situation and thus prevent attack and resource dissemination from the cloud environment.

Keywords


DDoS Attacks, EDoS Attacks, Cloud Computing, Machine Learning Detection.

References