A Confidence Interval Based Filtering Against DDoS Attack in Cloud Environment: A Confidence Interval Against DDoS Attack in the Cloud

被引:3
作者
Haddadi, Mohamed [1 ]
Beghdad, Rachid [1 ]
机构
[1] Univ Bejaia, Fac Sci Exactes, Dept Informat, Bejaia, Algeria
关键词
CI; CIF; Cloud Computing; DDoS Attack; Security; Studied Variable; Unrealistic Value; VMware; DEFENSE;
D O I
10.4018/IJISP.2020100103
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Distributed denial of service (DDoS) attacks have become a serious danger against the availability of services in cloud computing environment. Current defending mechanisms cannot detect DDoS attacks with high accuracy. This is mainly due to the fact that the unrealistic value of the studied variables was used. In view of this problem, the authors propose a novel approach called confidence intervalbased filtering (CIF) to detect DDoS attacks. The proposed approach is implemented using VMware and JAVA applications. The simulation results showed that CIF outperforms the existing approaches in terms of detection rate and false negative and positive rates with an acceptable computation time.
引用
收藏
页码:42 / 56
页数:15
相关论文
共 25 条
[1]  
Almulla S.A., 2010, 2010 2 INT C ENG SYS, P1
[2]   Detecting the Origin of DDoS Attacks in OpenStack Cloud Platform Using Data Mining Techniques [J].
Borisenko, Konstantin ;
Rukavitsyn, Andrey ;
Gurtov, Andrei ;
Shorov, Andrey .
INTERNET OF THINGS, SMART SPACES, AND NEXT GENERATION NETWORKS AND SYSTEMS, NEW2AN 2016/USMART 2016, 2016, 9870 :303-315
[3]   Securing Cloud Servers against Flooding Based DDOS Attacks [J].
Chopade, S. S. ;
Pandey, K. U. ;
Bhade, D. S. .
2013 INTERNATIONAL CONFERENCE ON COMMUNICATION SYSTEMS AND NETWORK TECHNOLOGIES (CSNT 2013), 2013, :524-528
[4]  
Chouhan V., 2013, INT J COMPUT SCI ELE, V1, P2315
[5]   A confidence-based filtering method for DDoS attack defense in cloud environment [J].
Dou, Wanchun ;
Chen, Qi ;
Chen, Jinjun .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2013, 29 (07) :1838-1850
[6]  
Haddadi Mohamed, 2018, EDPACS: The EDP Audit, Control, and Security Newsletter, V57, P1, DOI 10.1080/07366981.2018.1453101
[7]  
Hurwitz J., 2010, CLOUD COMPUTING DUMM
[8]  
Janarthanan T, 2017, PROC IEEE INT SYMP, P1881, DOI 10.1109/ISIE.2017.8001537
[9]  
Joshi A., 2012, INT GREEN COMPUTING, P1
[10]  
Karnwal T, 2013, ADV INTELL SYST, V182, P459