Cloud-based DDoS attack detection and defence system using statistical approach

被引:0
作者
Devi B.S.K. [1 ]
Subbulakshmi T. [1 ]
机构
[1] School of Computing Science and Engineering, Vellore Institute of Technology, Chennai, Tamil Nadu
关键词
chi-square statistics; cloud computing; cloud security; DDoS; distributed denial of service; statistical method; virtual machines;
D O I
10.1504/IJICS.2019.101935
中图分类号
学科分类号
摘要
In the recent era, business and IT domain rely on the cloud as it has evolved as the potential service model and lots of people jumped on the bandwagon to seek profit out of the cloud computing environment. The cloud is highly vulnerable and its risk associated with unpatched machines is exposed to distributed denial of service (DDoS) attacks. According to cloud security alliance group DDoS is the major security attack in the cloud and the impact and effects on virtual machines is much unexplored. Despite numerous DDoS solutions, there is a need for a dish fit for gods' in cloud. Hence, the proposed system defends the DDoS attacks in cloud by monitoring the performance distortion, detecting multilayer attacks using statistical method. Based on the attack variances with normal using chi-square statistics, DDoS attack sources are enlisted and communicated to the defence system to filter attack traffic and protect the cloud. © 2019 Inderscience Enterprises Ltd.
引用
收藏
页码:447 / 475
页数:28
相关论文
共 37 条
[1]  
Abouzakhar N., Bakar A., A chi-square testing-based intrusion detection model, CFET, (2010)
[2]  
Alani M.M., Securing the cloud: Threats, attacks and mitigation techniques, Journal of Advanced Computer Science and Technology, 3, 2, pp. 202-213, (2014)
[3]  
Anderson M., Black Hat 2014: How to Hack the Cloud to Mine Crypto Currency, (2014)
[4]  
Annual Worldwide Infrastructure Security Report, (2016)
[5]  
Anwar Z., Malik A.W., Can a DDoS attack meltdown my data center? A simulation study and defense strategies, IEEE Communications Letters, 18, 7, pp. 1175-1178, (2014)
[6]  
Bali M.S., Khurana S., Effect of latency on network and end user domains in cloud computing, ICGCE, pp. 777-782, (2013)
[7]  
Burst Start and Burst Rate, (2015)
[8]  
Choi J., Choi C., Ko B., Choi D., Kim P., Detecting web based DDoS attack using MapReduce operations in cloud computing environment, Journal of Internet Services and Information Security, 3, 3-4, pp. 28-37, (2013)
[9]  
Information Bulletin, I-020: Cisco 7xx Password Buffer Overflow, (1999)
[10]  
Security Guidance for Critical Areas of Focus in Cloud Computing V2, 1, (2009)