An SVM-based framework for detecting DoS attacks in virtualized clouds under changing environment

被引:27
作者
Abusitta, Adel [1 ]
Bellaiche, Martine [1 ]
Dagenais, Michel [1 ]
机构
[1] Polytech Montreal, Dept Comp & Software Engn, 2900 Blvd Edouard Montpetit, Montreal, PQ H3T 1J4, Canada
来源
JOURNAL OF CLOUD COMPUTING-ADVANCES SYSTEMS AND APPLICATIONS | 2018年 / 7卷
基金
加拿大自然科学与工程研究理事会;
关键词
Cloud computing; DoS attacks detection; Support vector machine; Changing environment; Virtual machines; DETECTION MODEL; DDOS ATTACKS; MACHINE;
D O I
10.1186/s13677-018-0109-4
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Cloud Computing enables providers to rent out space on their virtual and physical infrastructures. Denial of Service (DoS) attacks threaten the ability of the cloud to respond to clients requests, which results in considerable economic losses. The existing detection approaches are still not mature enough to satisfy a cloud-based detection systems requirements since they overlook the changing/dynamic environment, that characterises the cloud as a result of its inherent characteristics. Indeed, the patterns extracted and used by the existing detection models to identify attacks, are limited to the current VMs infrastructure but do not necessarily hold after performing new adjustments according to the pay-as-you-go business model. Therefore, the accuracy of detection will be negatively affected. Motivated by this fact, we present a new approach for detecting DoS attacks in a virtualized cloud under changing environment. The proposed model enables monitoring and quantifying the effect of resources adjustments on the collected data. This helps filter out the effect of adjustments from the collected data and thus enhance the detection accuracy in dynamic environments. Our solution correlates as well VMs application metrics with the actual resources load, which enables the hypervisor to distinguish between benignant high load and DoS attacks. It helps also the hypervisor identify the compromised VMs that try to needlessly consume more resources. Experimental results show that our model is able to enhance the detection accuracy under changing environments.
引用
收藏
页数:18
相关论文
共 46 条
[1]  
[Anonymous], CLOUD COMPUT
[2]  
[Anonymous], 1998, 1998 WORLD CUP WEB S
[3]  
[Anonymous], 2012, P 2012 IEEE 20 INT W
[4]  
Auria L, 2008, DISCUSSION PAPERS
[5]   A framework for generating realistic traffic for Distributed Denial-of-Service attacks and Flash Events [J].
Bhatia, Sajal ;
Schmidt, Desmond ;
Mohay, George ;
Tickle, Alan .
COMPUTERS & SECURITY, 2014, 40 :95-107
[6]   A Cooperative and Hybrid Network Intrusion Detection Framework in Cloud Computing Based on Snort and Optimized Back Propagation Neural Network [J].
Chiba, Z. ;
Abghour, N. ;
Moussaid, K. ;
El Omri, A. ;
Rida, M. .
7TH INTERNATIONAL CONFERENCE ON AMBIENT SYSTEMS, NETWORKS AND TECHNOLOGIES (ANT 2016) / THE 6TH INTERNATIONAL CONFERENCE ON SUSTAINABLE ENERGY INFORMATION TECHNOLOGY (SEIT-2016) / AFFILIATED WORKSHOPS, 2016, 83 :1200-1206
[7]   A method of DDoS attack detection using HTTP packet pattern and rule engine in cloud computing environment [J].
Choi, Junho ;
Choi, Chang ;
Ko, Byeongkyu ;
Kim, Pankoo .
SOFT COMPUTING, 2014, 18 (09) :1697-1703
[8]  
Chonka A., 2012, 2012 15th International Conference on Network-Based Information Systems (NBiS 2012), P429, DOI 10.1109/NBiS.2012.146
[9]   Cloud security defence to protect cloud computing against HTTP-DoS and XML-DoS attacks [J].
Chonka, Ashley ;
Xiang, Yang ;
Zhou, Wanlei ;
Bonti, Alessio .
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2011, 34 (04) :1097-1107
[10]  
Desnoyers M., 2006, Proceedings of the Linux Symposium, P209