Interactive anomaly-based DDoS attack detection method in cloud computing environments using a third party auditor

被引:9
作者
Hezavehi, Sasha Mahdavi [1 ]
Rahmani, Rouhollah [2 ]
机构
[1] Islamic Azad Univ, Dept Comp Engn, Sci & Res Branch, Tehran, Iran
[2] Univ Tehran, Inst Appl Intelligent Syst, Tehran, Iran
关键词
Interactive method; Cloud security; DDoS attack; Threshold-anomaly detection; Third party auditor; DEFENSE-MECHANISM; SECURITY ISSUES; MITIGATION; PRIVACY; ALLOCATION; EFFICIENT; TAXONOMY; TRENDS;
D O I
10.1016/j.jpdc.2023.04.003
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Cloud computing environments are indispensable components of the majority of information technology organizations and users' lives. Despite multiple benefits of cloud computing environments, cloud users (CUs) as well as cloud service providers (CSPs) may experience unpleasant conditions by detrimental results of distributed denial of service (DDoS) attacks such as unavailability of cloud services or lengthy response times of the services. In this paper, we provide a threshold anomaly-based DDoS attack detection method to protect cloud environments against DDoS attack. Our proposed method is introduced to reduce DDoS attack consequences in CSPs. Our suggested method includes three newly defined components: 1. A third party auditor (TPA) which acquires direct interaction with each datacenter of the CSP, 2. A zone delimiter (ZD) which encapsulates the sensitive internal specifications of a CSP from TPA, and 3. A protocol which is defined to coordinate TPA, ZD, and CSPs for DDoS attack detection via TPA. We analyze our proposed method by determining and conducting a simulation strategy for an intrusion detection system in CSPs. Results illustrate that interactive communication between TPA and datacenters of CSPs improves the user experience of CUs in the time of DDoS attacks by reducing excessive attack filtering stages. Moreover, by using an intrusion detection system (IDS), we investigate efficiency of the proposed method to recover CSPs from DDoS attacks. We further indicate the efficiency of our proposed method by providing accuracy and qualitative comparisons with other existing methods.(c) 2023 Elsevier Inc. All rights reserved.
引用
收藏
页码:82 / 99
页数:18
相关论文
共 68 条
[21]   An assessment model for cloud service security risk based on entropy and support vector machine [J].
Jiang, Rong ;
Ma, Zifei ;
Yang, Juan .
CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2021, 33 (21)
[22]  
John Jomina, 2019, Advances in Big Data and Cloud Computing. Proceedings of ICBDCC18. Advances in Intelligent Systems and Computing (AISC 750), P11, DOI 10.1007/978-981-13-1882-5_2
[23]   Swarm intelligence based autonomous DDoS attack detection and defense using multi agent system [J].
Kesavamoorthy, R. ;
Soundar, K. Ruba .
CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2019, 22 (Suppl 4) :S9469-S9476
[24]  
Khaldi Abir, 2014, 2014 2nd IEEE International Conference on Mobile Cloud Computing, Services and Engineering (MobileCloud), P289, DOI 10.1109/MobileCloud.2014.44
[25]  
Kilari N., 2018, BIG DATA ANAL, P515
[26]   DDoS in the IoT: Mirai and Other Botnets [J].
Kolias, Constantinos ;
Kambourakis, Georgios ;
Stavrou, Angelos ;
Voas, Jeffrey .
COMPUTER, 2017, 50 (07) :80-84
[27]   Mitigating DDoS using weight-based geographical clustering [J].
Kongshavn, Madeleine ;
Haugerud, Harek ;
Yazidi, Anis ;
Maseng, Torleiv ;
Hammer, Hugo .
CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2020, 32 (11)
[28]   Optimized extreme learning machine for detecting DDoS attacks in cloud computing [J].
Kushwah, Gopal Singh ;
Ranga, Virender .
COMPUTERS & SECURITY, 2021, 105
[29]   Voting extreme learning machine based distributed denial of service attack detection in cloud computing [J].
Kushwah, Gopal Singh ;
Ranga, Virender .
JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2020, 53
[30]   Low-rate DDoS attacks detection method using data compression and behavior divergence measurement [J].
Liu, Xinqian ;
Ren, Jiadong ;
He, Haitao ;
Wang, Qian ;
Song, Chen .
COMPUTERS & SECURITY, 2021, 100