Classifying different denial-of-service attacks in cloud computing using rule-based learning

被引:15
作者
Khorshed, Md Tanzim [1 ]
Ali, A. B. M. Shawkat [1 ]
Wasimi, Saleh A. [1 ]
机构
[1] CQUniversity, Sch Informat & Commun Technol, Rockhampton, Qld 4702, Australia
关键词
security; threats; machine learning; cyber attacks; cloud computing; DoS attacks;
D O I
10.1002/sec.621
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
From traditional networking to cloud computing, one of the essential but formidable tasks is to detect cyber attacks and their types. A cloud provider's unwillingness to share security-related data with its clients adds to the difficulty of detection by a cloud customer. The research contributions in this paper are twofold. First, an investigative survey on cloud computing is conducted with the main focus on gaps that is hindering cloud adoption, accompanied by a review of the threat remediation challenges. Second, some thoughts are constructed on novel approaches to address some of the widely discussed denial-of-service (DoS) attack types by using machine learning techniques. We evaluate the techniques' performances by using statistical ranking-based methods, and find the rule-based learning technique C4.5, from a set of popular learning algorithms, as an efficient tool to classify various DoS attacks in the cloud platform. The novelty of our rather rigorous analysis is in its ability to identify insider's activities and other DoS attacks by using performance data. The reason for using performance data rather than traditional logs and security-related data is that the performance data can be collected by the customers themselves without any help from cloud providers. To the best of our knowledge, no one has made such attempts before. Our findings and thoughts captured through a series of experiments in our constructed cloud server are expected to give researchers, cloud providers and customers additional insight and tools to proactively protect themselves from known or perhaps even unknown security issues that have similar patterns. Copyright (c) 2012 John Wiley & Sons, Ltd.
引用
收藏
页码:1235 / 1247
页数:13
相关论文
共 42 条
  • [41] Yan LA, 2009, LECT NOTES COMPUT SC, V5931, P167
  • [42] A Layered Security Approach for Cloud Computing Infrastructure
    Yildiz, Mehmet
    Abawajy, Jemal
    Ercan, Tuncay
    Bernoth, Andrew
    [J]. 2009 10TH INTERNATIONAL SYMPOSIUM ON PERVASIVE SYSTEMS, ALGORITHMS, AND NETWORKS (ISPAN 2009), 2009, : 763 - +