An anomaly-based approach for DDoS attack detection in cloud environment

被引:33
作者
Rawashdeh, Adnan [1 ]
Alkasassbeh, Mouhammd [2 ]
Al-Hawawreh, Muna [2 ]
机构
[1] Yarmouk Univ, Fac IT & CS, Software Engn Dept, Irbid, Jordan
[2] Mutah Univ, Fac IT, Comp Sci Dept, Mutah, Jordan
关键词
distributed denial of service; DDoS; cloud computing; intrusion detection system; hypervisor; attacks detection; neural networks;
D O I
10.1504/IJCAT.2018.10014729
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Cloud computing is currently a major focal point for researchers owing to its widespread application and benefits. Cloud computing's complete reliance on the internet for service provision and its distributed nature pose challenges to security, the most serious being insider Distributed Denial of Service (DDoS) which causes a total deactivation of service. Traditional defence mechanisms, such as firewalls, are unable to detect insider attacks. This work proposes an anomaly intrusion detection approach in the hypervisor layer to discourage DDoS activities between virtual machines. The proposed approach is implemented by the evolutionary neural network which integrates the particle swarm optimisation with neural network for detection and classification of the traffic that is exchanged between virtual machines. The performance analysis and results of our proposed approach detect and classify the DDoS attacks in the cloud environment with minimum false alarms and high detection accuracy.
引用
收藏
页码:312 / 324
页数:13
相关论文
共 55 条
[1]  
Ahmed I., 2016, INT J COMPUTER APPL, V137, P18
[2]  
Akramifard H., 2015, P INT C SEC MAN SAM
[3]  
Al-kasassbeh M., 2013, INT J ADV SCI TECHNO, V55
[4]   Bioflocculation as an innovative harvesting strategy for microalgae [J].
Alam, Md Asraful ;
Vandamme, Dries ;
Chun, Wan ;
Zhao, Xinqing ;
Foubert, Imogen ;
Wang, Zhongming ;
Muylaert, Koenraad ;
Yuan, Zhenhong .
REVIEWS IN ENVIRONMENTAL SCIENCE AND BIO-TECHNOLOGY, 2016, 15 (04) :573-583
[5]  
Alkasassbeh M, 2016, INT J ADV COMPUT SC, V7, P436
[6]  
Alsafi H. M., 2012, INT J COMPUTING INFO, V4, P1
[7]  
Bhat A. H., 2013, INT J APPL INNOV ENG, V2, P56
[8]  
Bogdanoski Mitko, 2013, International Journal of Computer Network and Information Security, V5, P3, DOI 10.5815/ijcnis.2013.08.01
[9]  
Carlisle A, 2001, SHELF PSO
[10]  
Cheh J. J., 2013, J APPL BUSINESS RES, V15, P33