A Vulnerability based Attack Detection and Mitigation in Cloud SaaS Framework

被引:0
作者
Saisindhutheja R. [1 ]
Shyam G.K. [2 ]
Makka S. [1 ]
机构
[1] Department of CSE, Vardhaman College of Engineering, Telangana, Hyderabad
[2] School of CSE, Cloud Computing lab, Presidency University, Karnataka, Bengaluru
关键词
Attack detection; Bait model; Cloud computing; Correntropy-variation features; Dbn; Mitigation; Ocsa;
D O I
10.25103/jestr.155.21
中图分类号
学科分类号
摘要
Cloud computing provides various cost-effective on-demand services to the user and so it is rising up as a real trend in the IT service model. More particularly, the security is the ultimate question in the mind of each cloud user. A huge interest is being paid by the research community to detect the attack exist in the network. This research work intends to introduce a novel framework that combines the attack detection and mitigation, which gives the SaaS provider to decide relevant fields to be extracted, when huge traffic is available. Deep learning-based attack detection is carried out and based on the vulnerability in the network, the model switches to mitigation process. Initially, the feature selection is carried out by Opposition Based Crow Search Algorithm (OCSA). The selected features are subjected to attack detection process via Deep Belief Network (DBN) model, where the presence of attacks is determined. Subsequently, the ‘vulnerability assessment’ is carried out by evaluating the risk level via correntropy variation features. This phase decides ‘how vulnerable the network is’ with the presence of attack. This decision is based on fixing a threshold on risk level (RL). Moreover, the decision tells whether to execute the ‘mitigation process’ or not. In the attack mitigation phase, bait-based mitigation process is carried out. The proposed vulnerability-based attack detection and mitigation system beat the traditional methods with a packet loss ratio of 16% and a throughput of 92% © 2022 School of Science, IHU. All rights reserved
引用
收藏
页码:158 / 169
页数:11
相关论文
共 54 条
  • [1] Saisindhutheja Reddy, Shyam Gopal K., A machine learning based attack detection and mitigation using a secure SaaS framework, Proceedings of the Journal of King Saud University - Computer and Information Sciences, (2020)
  • [2] Ashok Kumar C, Vimala R, Load Balancing in Cloud Environment Exploiting Hybridization of Chicken Swarm and Enhanced Raven Roosting Optimization Algorithm, Proceedings of the Multimedia Research, 3, 1, pp. 45-55, (2020)
  • [3] Saisindhutheja Reddy, Shyam Gopal K., An Efficient Metaheuristic Algorithm Based Feature Selection and Recurrent Neural Network for DoS Attack Detection in Cloud Computing Environment, Proceedings of the Applied soft computing journal, 100, pp. 1-11, (2020)
  • [4] Somani G., Gaur M. S., Sanghi D., Conti M., Rajarajan M., Scale Inside-Out: Rapid Mitigation of Cloud DDoS Attacks, Proceedings of the IEEE Transactions on Dependable and Secure Computing, 15, 6, pp. 959-973, (2018)
  • [5] Alkadi O., Moustafa N., Turnbull B., A Review of Intrusion Detection and Blockchain Applications in the Cloud: Approaches, Challenges and Solutions, Proceedings of the IEEE Access, 8, pp. 104893-104917, (2020)
  • [6] Dong S., Abbas K., Jain R., A Survey on Distributed Denial of Service (DDoS) Attacks in SDN and Cloud Computing Environments, Proceedings of the IEEE Access, 7, pp. 80813-80828, (2019)
  • [7] Thomas Renjith, Rangachar MJS., Hybrid Optimization based DBN for Face Recognition using Low-Resolution Images, Proceedings of the Multimedia Research, 1, 1, pp. 33-43, (2018)
  • [8] VhatkarKapilNetaji, Bhole G P, Optimal Container Resource Allocation Using Hybrid SA-MFO Algorithm in Cloud Architecture, Proceedings of the Multimedia Research, 3, 1, pp. 11-20, (2020)
  • [9] Wang W., Du X., Shan D., Qin R., Wang N., Cloud Intrusion Detection Method Based on Stacked Contractive Auto-Encoder and Support Vector Machine, Proceedings of the IEEE Transactions on Cloud Computing, (2020)
  • [10] Ravi N., Shalinie S. M., Learning-Driven Detection and Mitigation of DDoS Attack in IoT via SDN Cloud Architecture, Proceedings of the IEEE Internet of Things Journal, 7, 4, pp. 3559-3570, (2020)