A Vulnerability based Attack Detection and Mitigation in Cloud SaaS Framework

被引:0
作者
Saisindhutheja R. [1 ]
Shyam G.K. [2 ]
Makka S. [1 ]
机构
[1] Department of CSE, Vardhaman College of Engineering, Telangana, Hyderabad
[2] School of CSE, Cloud Computing lab, Presidency University, Karnataka, Bengaluru
关键词
Attack detection; Bait model; Cloud computing; Correntropy-variation features; Dbn; Mitigation; Ocsa;
D O I
10.25103/jestr.155.21
中图分类号
学科分类号
摘要
Cloud computing provides various cost-effective on-demand services to the user and so it is rising up as a real trend in the IT service model. More particularly, the security is the ultimate question in the mind of each cloud user. A huge interest is being paid by the research community to detect the attack exist in the network. This research work intends to introduce a novel framework that combines the attack detection and mitigation, which gives the SaaS provider to decide relevant fields to be extracted, when huge traffic is available. Deep learning-based attack detection is carried out and based on the vulnerability in the network, the model switches to mitigation process. Initially, the feature selection is carried out by Opposition Based Crow Search Algorithm (OCSA). The selected features are subjected to attack detection process via Deep Belief Network (DBN) model, where the presence of attacks is determined. Subsequently, the ‘vulnerability assessment’ is carried out by evaluating the risk level via correntropy variation features. This phase decides ‘how vulnerable the network is’ with the presence of attack. This decision is based on fixing a threshold on risk level (RL). Moreover, the decision tells whether to execute the ‘mitigation process’ or not. In the attack mitigation phase, bait-based mitigation process is carried out. The proposed vulnerability-based attack detection and mitigation system beat the traditional methods with a packet loss ratio of 16% and a throughput of 92% © 2022 School of Science, IHU. All rights reserved
引用
收藏
页码:158 / 169
页数:11
相关论文
共 54 条
[21]  
Li G., Wu S. X., Zhang S., Li Q., Neural Networks-Aided Insider Attack Detection for the Average Consensus Algorithm, Proceedings of the IEEE Access, 8, pp. 51871-51883, (2020)
[22]  
Alkadi O., Moustafa N., Turnbull B., Choo K. R., A Deep Blockchain Framework-enabled Collaborative Intrusion Detection for Protecting IoT and Cloud Networks, Proceedings of the IEEE Internet of Things Journal, (2020)
[23]  
Zhijun W., LWenjing, Liang L., Meng Y., Low-Rate DoS Attacks, Detection, Defense, and Challenges: A Survey, Proceedings of the IEEE Access, 8, pp. 43920-43943, (2020)
[24]  
Shamshirband Shahab, Pescape Mahdis Fathi Antonio, Computational intelligence intrusion detection techniques in mobile cloud computing environments: Review, taxonomy, and open research issues, Proceedings of the Journal of Information Security and Applications, (2020)
[25]  
Virupakshar Karan B., Asundi Manjunath, Narayan D. G., Distributed Denial of Service (DDoS) Attacks Detection System for OpenStack-based Private Cloud, Proceedings of the Procedia Computer Science, 167, pp. 2297-2307, (2020)
[26]  
Tomas Martinez Garre Jose, Perez Manuel Gil, Ruiz-Martinez Antonio, A novel Machine Learning-based approach for the detection of SSH botnet infection, Proceedings of the Future Generation Computer Systems, 115, pp. 387-396, (2020)
[27]  
Ninu Preetha NS, Brammya G, Ramya R, Praveena S, Binu D, Rajakumar B R, Grey Wolf Optimisation based Feature Selection and Classification for Facial Emotion Recognition, Proceedings of the IET Biometrics, 7, 5, pp. 490-499, (2018)
[28]  
Rajakumar B. R., Static and Adaptive Mutation Techniques for Genetic algorithm: A Systematic Comparative Analysis, Proceedings of the International Journal of Computational Science and Engineering, 8, 2, pp. 180-193, (2013)
[29]  
Bhardwaj A., Mangat V., Vig R., Hyperband Tuned Deep Neural Network with Well Posed Stacked Sparse Auto Encoder for Detection of DDoS Attacks in Cloud, Proceedings of the IEEE Access, 8, pp. 181916-181929, (2020)
[30]  
Sahi A., Lai D., Li Y., Diykh M., An Efficient DDoS TCP Flood Attack Detection and Prevention System in a Cloud Environment, Proceedings of the IEEE Access, 5, pp. 6036-6048, (2017)