Interactive anomaly-based DDoS attack detection method in cloud computing environments using a third party auditor

被引:9
作者
Hezavehi, Sasha Mahdavi [1 ]
Rahmani, Rouhollah [2 ]
机构
[1] Islamic Azad Univ, Dept Comp Engn, Sci & Res Branch, Tehran, Iran
[2] Univ Tehran, Inst Appl Intelligent Syst, Tehran, Iran
关键词
Interactive method; Cloud security; DDoS attack; Threshold-anomaly detection; Third party auditor; DEFENSE-MECHANISM; SECURITY ISSUES; MITIGATION; PRIVACY; ALLOCATION; EFFICIENT; TAXONOMY; TRENDS;
D O I
10.1016/j.jpdc.2023.04.003
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Cloud computing environments are indispensable components of the majority of information technology organizations and users' lives. Despite multiple benefits of cloud computing environments, cloud users (CUs) as well as cloud service providers (CSPs) may experience unpleasant conditions by detrimental results of distributed denial of service (DDoS) attacks such as unavailability of cloud services or lengthy response times of the services. In this paper, we provide a threshold anomaly-based DDoS attack detection method to protect cloud environments against DDoS attack. Our proposed method is introduced to reduce DDoS attack consequences in CSPs. Our suggested method includes three newly defined components: 1. A third party auditor (TPA) which acquires direct interaction with each datacenter of the CSP, 2. A zone delimiter (ZD) which encapsulates the sensitive internal specifications of a CSP from TPA, and 3. A protocol which is defined to coordinate TPA, ZD, and CSPs for DDoS attack detection via TPA. We analyze our proposed method by determining and conducting a simulation strategy for an intrusion detection system in CSPs. Results illustrate that interactive communication between TPA and datacenters of CSPs improves the user experience of CUs in the time of DDoS attacks by reducing excessive attack filtering stages. Moreover, by using an intrusion detection system (IDS), we investigate efficiency of the proposed method to recover CSPs from DDoS attacks. We further indicate the efficiency of our proposed method by providing accuracy and qualitative comparisons with other existing methods.(c) 2023 Elsevier Inc. All rights reserved.
引用
收藏
页码:82 / 99
页数:18
相关论文
共 68 条
[61]   A trust-based hypervisor framework for preventing DDoS attacks in cloud [J].
Vetha, S. ;
Vimala Devi, K. .
CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2021, 33 (03)
[62]   Privacy-Preserving Public Auditing for Secure Cloud Storage [J].
Wang, Cong ;
Chow, Sherman S. M. ;
Wang, Qian ;
Ren, Kui ;
Lou, Wenjing .
IEEE TRANSACTIONS ON COMPUTERS, 2013, 62 (02) :362-375
[63]   Malware Detection in Cloud Computing Infrastructures [J].
Watson, Michael R. ;
Shirazi, Noor-ul-Hassan ;
Marnerides, Angelos K. ;
Mauthe, Andreas ;
Hutchison, David .
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2016, 13 (02) :192-205
[64]   Threshold privacy-preserving cloud auditing with multiple uploaders [J].
Wu, Ge ;
Mu, Yi ;
Susilo, Willy ;
Guo, Fuchun ;
Zhang, Futai .
INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2019, 18 (03) :321-331
[65]   Dynamic deployment of virtual machines in cloud computing using multi-objective optimization [J].
Xu, Bo ;
Peng, Zhiping ;
Xiao, Fangxiong ;
Gates, Antonio Marcel ;
Yu, Jian-Ping .
SOFT COMPUTING, 2015, 19 (08) :2265-2273
[66]   A Combinatorial Auction-Based Mechanism for Dynamic VM Provisioning and Allocation in Clouds [J].
Zaman, Sharrukh ;
Grosu, Daniel .
IEEE TRANSACTIONS ON CLOUD COMPUTING, 2013, 1 (02) :129-141
[67]   User stateless privacy-preserving TPA auditing scheme for cloud storage [J].
Zhao, Haichun ;
Yao, Xuanxia ;
Zheng, Xuefeng ;
Qiu, Tie ;
Ning, Huansheng .
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2019, 129 :62-70
[68]   Denial of service attacks, defences and research challenges [J].
Zlomislic, Vinko ;
Fertalj, Kresimir ;
Sruk, Vlado .
CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2017, 20 (01) :661-671