Interactive anomaly-based DDoS attack detection method in cloud computing environments using a third party auditor

被引:9
作者
Hezavehi, Sasha Mahdavi [1 ]
Rahmani, Rouhollah [2 ]
机构
[1] Islamic Azad Univ, Dept Comp Engn, Sci & Res Branch, Tehran, Iran
[2] Univ Tehran, Inst Appl Intelligent Syst, Tehran, Iran
关键词
Interactive method; Cloud security; DDoS attack; Threshold-anomaly detection; Third party auditor; DEFENSE-MECHANISM; SECURITY ISSUES; MITIGATION; PRIVACY; ALLOCATION; EFFICIENT; TAXONOMY; TRENDS;
D O I
10.1016/j.jpdc.2023.04.003
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Cloud computing environments are indispensable components of the majority of information technology organizations and users' lives. Despite multiple benefits of cloud computing environments, cloud users (CUs) as well as cloud service providers (CSPs) may experience unpleasant conditions by detrimental results of distributed denial of service (DDoS) attacks such as unavailability of cloud services or lengthy response times of the services. In this paper, we provide a threshold anomaly-based DDoS attack detection method to protect cloud environments against DDoS attack. Our proposed method is introduced to reduce DDoS attack consequences in CSPs. Our suggested method includes three newly defined components: 1. A third party auditor (TPA) which acquires direct interaction with each datacenter of the CSP, 2. A zone delimiter (ZD) which encapsulates the sensitive internal specifications of a CSP from TPA, and 3. A protocol which is defined to coordinate TPA, ZD, and CSPs for DDoS attack detection via TPA. We analyze our proposed method by determining and conducting a simulation strategy for an intrusion detection system in CSPs. Results illustrate that interactive communication between TPA and datacenters of CSPs improves the user experience of CUs in the time of DDoS attacks by reducing excessive attack filtering stages. Moreover, by using an intrusion detection system (IDS), we investigate efficiency of the proposed method to recover CSPs from DDoS attacks. We further indicate the efficiency of our proposed method by providing accuracy and qualitative comparisons with other existing methods.(c) 2023 Elsevier Inc. All rights reserved.
引用
收藏
页码:82 / 99
页数:18
相关论文
共 68 条
[1]   Detection of DDOS Attack using Deep Learning Model in Cloud Storage Application [J].
Agarwal, Ankit ;
Khari, Manju ;
Singh, Rajiv .
WIRELESS PERSONAL COMMUNICATIONS, 2022, 127 (01) :419-439
[2]   An SDN-Assisted Defense Mechduanism for the Shrew DDoS Attack in a Cloud Computing Environment [J].
Agrawal, Neha ;
Tapaswi, Shashikala .
JOURNAL OF NETWORK AND SYSTEMS MANAGEMENT, 2021, 29 (02)
[3]   Defense Mechanisms Against DDoS Attacks in a Cloud Computing Environment: State-of-the-Art and Research Challenges [J].
Agrawal, Neha ;
Tapaswi, Shashikala .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2019, 21 (04) :3769-3795
[4]   Efficient and secure flash-based gaming CAPTCHA [J].
Aldwairi, Monther ;
Mohammed, Suaad ;
Padmanabhan, Megana Lakshmi .
JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING, 2020, 142 (142) :27-35
[5]   Collaborative design in the era of cloud computing [J].
Andreadis, Georgios ;
Fourtounis, Georgios ;
Bouzakis, Konstantinos-Dionysios .
ADVANCES IN ENGINEERING SOFTWARE, 2015, 81 :66-72
[6]  
[Anonymous], 2010, P 19 INT C WORLD WID
[7]  
Basak Debashis, 2010, Operating Systems Review, V44, P86, DOI 10.1145/1899928.1899939
[8]   Deep belief network and support vector machine fusion for distributed denial of service and economical denial of service attack detection in cloud [J].
Britto Dennis, J. ;
Shanmuga Priya, M. .
CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2022, 34 (01)
[9]   CloudSim: a toolkit for modeling and simulation of cloud computing environments and evaluation of resource provisioning algorithms [J].
Calheiros, Rodrigo N. ;
Ranjan, Rajiv ;
Beloglazov, Anton ;
De Rose, Cesar A. F. ;
Buyya, Rajkumar .
SOFTWARE-PRACTICE & EXPERIENCE, 2011, 41 (01) :23-50
[10]   DDoS detection and defense mechanism based on cognitive-inspired computing in SDN [J].
Cui, Jie ;
Wang, Mingjun ;
Luo, Yonglong ;
Zhong, Hong .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2019, 97 :275-283