Real-Time Detection Schemes for Memory DoS (M-DoS) Attacks on Cloud Computing Applications

被引:7
作者
Islam, Umar [1 ]
Al-Atawi, Abdullah [2 ]
Alwageed, Hathal Salamah [3 ]
Ahsan, Muhammad [4 ]
Awwad, Fuad A. [5 ]
Abonazel, Mohamed R. [6 ]
机构
[1] IQRA Natl Univ, Dept Comp Sci, Swat Campus, Khyber Pakhtunkhwa 19220, Pakistan
[2] Univ Tabuk, Appl Coll, Dept Comp Sci, Tabuk 47512, Saudi Arabia
[3] Jouf Univ, Coll Comp & Informat Sci, Sakaka 72388, Saudi Arabia
[4] Silesian Tech Univ, Dept Measurements & Control Syst, PL-44100 Gliwice, Poland
[5] King Saud Univ, Coll Business Adm, Dept Quantitat Anal, Riyadh 11587, Saudi Arabia
[6] Cairo Univ, Fac Grad Studies Stat Res, Dept Appl Stat & Econometr, Giza 12613, Egypt
关键词
DDOS; MDOS; cloud computing; memory attacks; ML; DL; DDOS ATTACKS;
D O I
10.1109/ACCESS.2023.3290910
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Memory Denial of Service (M-DoS) attacks refer to a class of cyber-attacks that aim to exhaust the memory resources of a system, rendering it unavailable to legitimate users. This type of attack is particularly dangerous in cloud computing environments, where multiple users share the same resources. Detection and mitigation of M-DoS attacks in real-time is a challenging task, as they often involve a large number of low-rate requests, making it difficult to distinguish them from legitimate traffic. Several real-time detection schemes have been proposed to identify and mitigate M-DoS attacks in cloud computing environments. These schemes can be broadly classified into two categories: signature-based and anomaly-based detection. Signature-based detection methods rely on the identification of specific patterns or characteristics of known M-DoS attack techniques, while anomaly-based detection methods identify abnormal behaviour that deviates from the normal pattern of usage. This study presents a hybrid model for real-time detection of cloud and MDOS attacks using SVM-KNN-LR. The dataset used in this study was collected from various sources and pre-processed to extract relevant features for attack detection. A feature selection process was also applied to identify the most important features for attack detection. The hybrid model achieved an accuracy of 96%, outperforming other individual models such as SVM, KNN, LR, Naive Bayes, Decision Trees, Extra Trees, Bagging Trees, and Random Forests. Confusion matrices were also used to evaluate the performance of each model. In the discussion section, we examined the performance of the hybrid model in detecting MDOS attacks and found that it had a high precision score of 0.97. However, the recall score was lower at 0.87, indicating that the model was not able to detect all instances of MDOS attacks.
引用
收藏
页码:74641 / 74656
页数:16
相关论文
共 39 条
[1]   Transport and Application Layer DDoS Attacks Detection to IoT Devices by Using Machine Learning and Deep Learning Models [J].
Almaraz-Rivera, Josue Genaro ;
Perez-Diaz, Jesus Arturo ;
Cantoral-Ceballos, Jose Antonio .
SENSORS, 2022, 22 (09)
[2]   Detection and mitigation of DDoS attack in cloud computing using machine learning algorithm [J].
Amjad, Aroosh ;
Alyas, Tahir ;
Farooq, Umer ;
Tariq, Muhammad Arsian .
EAI ENDORSED TRANSACTIONS ON SCALABLE INFORMATION SYSTEMS, 2019, 6 (23) :1-8
[3]  
[Anonymous], 2022, J THEOR APPL INF TEC, V100, P4632
[4]  
Aysa M.H., 2020, P 2020 4 INT S MULTI, P1, DOI [10.1109/ISMSIT50672.2020.9254703, DOI 10.1109/ISMSIT50672.2020.9254703]
[5]   Detection DDOS Attacks Using Machine Learning Methods [J].
Aytac, Tugba ;
Aydin, Muhammed Ali ;
Zaim, Abdul Halim .
ELECTRICA, 2020, 20 (02) :159-167
[6]  
Badamasi UM., 2020, INT J COMPUT NETW CO, V8, P93
[7]   Real-time DDoS flood attack monitoring and detection (RT-AMD) model for cloud computing [J].
Bamasag, Omaimah ;
Alsaeedi, Alaa ;
Munshi, Asmaa ;
Alghazzawi, Daniyal ;
Alshehri, Suhair ;
Jamjoom, Arwa .
PEERJ COMPUTER SCIENCE, 2022, 7
[8]  
Bhonkar B., 2016, INT J ADV RES COMPUT, V5, P58
[9]   DDoS detection and defense mechanism based on cognitive-inspired computing in SDN [J].
Cui, Jie ;
Wang, Mingjun ;
Luo, Yonglong ;
Zhong, Hong .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2019, 97 :275-283
[10]   Boosting-Based DDoS Detection in Internet of Things Systems [J].
Cvitic, Ivan ;
Perakovic, Dragan ;
Gupta, Brij B. ;
Choo, Kim-Kwang Raymond .
IEEE INTERNET OF THINGS JOURNAL, 2022, 9 (03) :2109-2123