An Effective DOS Attack Detection Model in Cloud Using Artificial Bee Colony Optimization

被引:4
作者
Seth, Jitendra Kumar [1 ,2 ]
Chandra, Satish [2 ]
机构
[1] Ajay Kumar Garg Engn Coll, Dept Informat Technol, Ghaziabad, India
[2] Jaypee Inst Informat Technol, Dept Comp Sci & Engn, Noida, India
关键词
Denial of service (DOS); Cloud-based DOS attack detection (CDOSD); Artificial bee colony optimization (BABCO); Decision tree (DT); Cross validation; Best feature subset (BFS); Classification;
D O I
10.1007/s13319-018-0195-6
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Denial of service (DOS) attack is a serious threat in the cloud which causes unavailability of cloud services to genuine users. Firewalls alone are not able to detect DOS attack because of the dynamic nature of the attack and masked identity. This paper proposes a cloud-based DOS attack detection model (CDOSD) which is setup through key feature selection using a new binary version of Artificial bee colony optimization (BABCO) and decision tree (DT) classifier. The DT classifier is utilized because it has superior learning speed than other classification algorithms and BABCO is used for feature selection from the dataset. The real-time DOS attack tools are used to perform the attacks on cloud host. It has been observed that the CDOSD detects DOS attack on cloud host with high accuracy and a very low false positive rate. The features of the dataset are significantly reduced by BABCO which provides a low dimension of computation space for training and classification. The proposed scheme is also compared with the other existing models and found superior in performance. The proposed methodology may help the cloud service providers to design more secure cloud environment. [GRAPHICS] .
引用
收藏
页数:13
相关论文
共 24 条
[1]   A feature reduced intrusion detection system using ANN classifier [J].
Akashdeep ;
Manzoor, Ishfaq ;
Kumar, Neeraj .
EXPERT SYSTEMS WITH APPLICATIONS, 2017, 88 :249-257
[2]  
Bahaweres R. B., 2016, CITSM 2016, DOI [10.1109/citsm.2016.7577583, DOI 10.1109/CITSM.2016.7577583]
[3]  
Balobaid A, 2016, 2016 INTERNATIONAL CONFERENCE ON COMPUTING, ANALYTICS AND SECURITY TRENDS (CAST), P416, DOI 10.1109/CAST.2016.7915005
[4]   Defence for Distributed Denial of Service Attacks in Cloud Computing [J].
Carlin, Andrew ;
Hammoudeh, Mohammad ;
Aldabbas, Omar .
INTERNATIONAL CONFERENCE ON ADVANCED WIRELESS INFORMATION AND COMMUNICATION TECHNOLOGIES (AWICT 2015), 2015, 73 :490-497
[5]   A cloud-based secure authentication (CSA) protocol suite for defense against Denial of Service (DoS) attacks [J].
Darwish, Marwan ;
Ouda, Abdelkader ;
Capretz, Luiz Fernando .
JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2015, 20 :90-98
[6]   Understanding DDoS Attack & Its Effect In Cloud Environment [J].
Deshmukh, Rashmi V. ;
Devadkar, Kailas K. .
PROCEEDINGS OF 4TH INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING, COMMUNICATION AND CONTROL(ICAC3'15), 2015, 49 :202-210
[7]   A Clinical Report of Nonsyndromic Concomitant Hypo-Hyperdontia [J].
Gupta, Siddarth ;
Popat, Hashmat .
CASE REPORTS IN DENTISTRY, 2013, 2013
[8]  
Kabir M.R., 2017, INT J COMPUTER APPL, V166, P13, DOI [https://doi.org/10.5120/ijca2017913992, DOI 10.5120/IJCA2017913992]
[9]  
Karaboga D., 2005, TR06 ERC U COMP ENG
[10]   A comparative study of Artificial Bee Colony algorithm [J].
Karaboga, Dervis ;
Akay, Bahriye .
APPLIED MATHEMATICS AND COMPUTATION, 2009, 214 (01) :108-132