Prevention and detection of DDOS attack in virtual cloud computing environment using Naive Bayes algorithm of machine learning

被引:0
作者
Shang Y. [1 ]
机构
[1] Xinyang Agriculture and Forestry University, Department of Information Engineering Department, Henan, Xinyang
来源
Measurement: Sensors | 2024年 / 31卷
关键词
Cloud computing; Cyber attack; Machine learning; Navie bayes; Virtual cloud computing environment;
D O I
10.1016/j.measen.2023.100991
中图分类号
学科分类号
摘要
The popularity of cloud computing, with its incredible scalability and accessibility, has already welcomed a new era of innovation. Consumers who subscribe to a cloud-based service and use the associated pay-as-you-go features have unlimited access to the applications mentioned above and technologies. In addition to lowering prices, this notion also increased the reliability and accessibility of the offerings. One of the most crucial aspects of cloud technology is the on-demand viewing of personal services, which is also one of its most significant advantages. Apps that are cloud-based are available on demand from anywhere in the world at a reduced cost. Although it causes its users pain with safety concerns, cloud computing can thrive because of its fantastic instantaneous services. There are various violations, but they all accomplish something similar, taking the systems offline. Distributed denial of service attacks are among the most harmful forms of online assault. For fast and accurate DDoS (Distributed Denial of Service, distributed denial of service) attack detection. This research introduced the DDOS attack and a method to defend against it, making the system more resistant to such attacks. In this scenario, numerous hosts are used to carrying out a distributed denial of service assault against cloud-based web pages, sending possibly millions or even trillions of packets. It uses an OS like ParrotSec to pave the way for the attack and make it possible. In the last phase, the most effective algorithms, such as Naive Bayes and Random Forest, are used for detection and mitigation. Another major topic was studying the many cyber attacks that can be launched against cloud computing. © 2023
引用
收藏
相关论文
共 23 条
[1]  
Jing X., Yan Z., Pedrycz W., Security data collection and data analytics in the internet: a survey, IEEE Commun. Surv. Tutorials, 21, 1, pp. 586-618, (2019)
[2]  
Singh K.J., Thongam K., De T., Detection and differentiation of application layer DDoS attack from flash events using fuzzy-GA computation, IET Inf. Secur., 12, 6, pp. 502-512, (2018)
[3]  
Subbulakshmi T., Mercy Shalinie S., Suneel Reddy C., Ramamoorthi A., Detection and classification of DDoS attacks using fuzzy inference system, Commun. Comput. Inf. Sci., 89 CCIS, pp. 242-252, (2010)
[4]  
Tabassum N., Khan M.S., Abbas S., Alyas T., Athar A., Khan M.A., EAI Endorsed Transactions Intelligent reliability management in hyper- convergence cloud infrastructure using fuzzy inference system, 4, 5, pp. 1-12
[5]  
Soliman A.K., Salama C., Mohamed H.K., Detecting DNS reflection amplification DDoS attack originating from the cloud, Proc. - 2018 13th Int. Conf. Comput. Eng. Syst. ICCES 2018, pp. 145-150, (2019)
[6]  
Arun Raj Kumar P., Selvakumar S., Detection of distributed denial of service attacks using an ensemble of adaptive and hybrid neuro-fuzzy systems, Comput. Commun., 36, 3, pp. 303-319, (2013)
[7]  
Boroujerdi A.S., Ayat S., A robust ensemble of neuro-fuzzy classifiers for DDoS attack detection, Proc. 2013 3rd Int. Conf. Comput. Sci. Netw. Technol. ICCSNT 2013, pp. 484-487, (2014)
[8]  
Kwiat L., Kamhoua C.A., Kwiat K.A., Tang J., Risks and benefits: game-theoretical analysis and algorithm for virtual machine security management in the cloud, Assur. Cloud Comput., pp. 49-80, (2018)
[9]  
Mondal H.S., Hasan M.T., Hossain M.B., Rahaman M.E., Hasan R., Enhancing secure cloud computing environment by Detecting DDoS attack using fuzzy logic, 3rd Int. Conf. Electr. Inf. Commun. Technol. EICT 2017, 2018-Janua, pp. 1-4, (2018)
[10]  
Mishra P., Pilli E.S., Varadharajan V., Tupakula U., Intrusion detection techniques in cloud environment: a survey, J. Netw. Comput. Appl., 77, October 2016, pp. 18-47, (2017)