An integrated SDN framework for early detection of DDoS attacks in cloud computing

被引:6
作者
Songa, Asha Varma [1 ]
Karri, Ganesh Reddy [1 ]
机构
[1] VIT AP Univ, Sch Comp Sci & Engn, Amaravati, Andhra Pradesh, India
来源
JOURNAL OF CLOUD COMPUTING-ADVANCES SYSTEMS AND APPLICATIONS | 2024年 / 13卷 / 01期
关键词
Cloud computing; SDN; DDOS; Event correlation; DBSCAN clustering; INTRUSION DETECTION; FEATURE-SELECTION; NEURAL-NETWORK; FLOW;
D O I
10.1186/s13677-024-00625-9
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Cloud computing is a rapidly advancing technology with numerous benefits, such as increased availability, scalability, and flexibility. Relocating computing infrastructure to a network simplifies hardware and software resource monitoring in the cloud. Software-Defined Networking (SDN)-based cloud networking improves cloud infrastructure efficiency by dynamically allocating and utilizing network resources. While SDN cloud networks offer numerous advantages, they are vulnerable to Distributed Denial-of-Service (DDoS) attacks. DDoS attacks try to stop genuine users from using services and drain network resources to reduce performance or shut down services. However, early-stage detection of DDoS attack patterns in cloud environments remains challenging. Current methods detect DDoS at the SDN controller level, which is often time-consuming. We recommend focusing on SDN switches for early detection. Due to the large volume of data from diverse sources, we recommend traffic clustering and traffic anomalies prediction which is of DDoS attacks at each switch. Furthermore, to consolidate the data from multiple clusters, event correlation is performed to understand network behavior and detect coordinated attack activities. Many existing techniques stay behind for early detection and integration of multiple techniques to detect DDoS attack patterns. In this paper, we introduce a more efficient and effectively integrated SDN framework that addresses a gap in previous DDoS solutions. Our framework enables early and accurate detection of DDoS traffic patterns within SDN-based cloud environments. In this framework, we use Recursive Feature Elimination (RFE), Density Based Spatial Clustering (DBSCAN), time series techniques like Auto Regressive Integrated Moving Average (ARIMA), Lyapunov exponent, exponential smoothing filter, dynamic threshold, and lastly, Rule-based classifier. We have evaluated the proposed RDAER model on the CICDDoS 2019 dataset, that achieved an accuracy level of 99.92% and a fast detection time of 20 s, outperforming existing methods.
引用
收藏
页数:22
相关论文
共 62 条
[51]   An efficient metaheuristic algorithm based feature selection and recurrent neural network for DoS attack detection in cloud computing environment [J].
SaiSindhuTheja, Reddy ;
Shyam, Gopal K. .
APPLIED SOFT COMPUTING, 2021, 100
[52]  
Samaan SS., 2023, Bull. Electr. Eng. Inform, V12, P2302, DOI [10.11591/eei.v12i4.4711, DOI 10.11591/EEI.V12I4.4711]
[53]   An intelligent hybridization of ARIMA with machine learning models for time series forecasting [J].
Santos Junior, Domingos S. de O. ;
de Oliveira, Joao F. L. ;
de Mattos Neto, Paulo S. G. .
KNOWLEDGE-BASED SYSTEMS, 2019, 175 :72-86
[54]  
Sharafaldin I, 2019, INT CARN CONF SECU, DOI 10.1109/ccst.2019.8888419
[55]   Cloud Security: LKM and Optimal Fuzzy System for Intrusion Detection in Cloud Environment [J].
Shyla, S. Immaculate ;
Sujatha, S. S. .
JOURNAL OF INTELLIGENT SYSTEMS, 2020, 29 (01) :1626-1642
[56]   Detection of HTTP flooding attacks in cloud using fuzzy bat clustering [J].
Sree, T. Raja ;
Bhanu, S. Mary Saira .
NEURAL COMPUTING & APPLICATIONS, 2020, 32 (13) :9603-9619
[57]   Flow monitoring in Software-Defined Networks: Finding the accuracy/performance tradeoffs [J].
Suarez-Varela, Jose ;
Barlet-Ros, Pere .
COMPUTER NETWORKS, 2018, 135 :289-301
[58]   Emerging DDoS attack detection and mitigation strategies in software-defined networks: Taxonomy, challenges and future directions [J].
Valdovinos, Ismael Amezcua ;
Perez-Diaz, Jesus Arturo ;
Choo, Kim-Kwang Raymond ;
Botero, Juan Felipe .
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2021, 187
[59]   A Review of Feature Selection and Its Methods [J].
Venkatesh, B. ;
Anuradha, J. .
CYBERNETICS AND INFORMATION TECHNOLOGIES, 2019, 19 (01) :3-26
[60]   An Intrusion Detection Method Based on Decision Tree-Recursive Feature Elimination in Ensemble Learning [J].
Lian, Wenjuan ;
Nie, Guoqing ;
Jia, Bin ;
Shi, Dandan ;
Fan, Qi ;
Liang, Yongquan .
MATHEMATICAL PROBLEMS IN ENGINEERING, 2020, 2020