Deep belief network and support vector machine fusion for distributed denial of service and economical denial of service attack detection in cloud

被引:7
作者
Britto Dennis, J. [1 ]
Shanmuga Priya, M. [2 ]
机构
[1] Dhanalakshmi Srinivasan Engn Coll, Dept Informat Technol, Perambalur, Tamil Nadu, India
[2] MAM Coll Engn, Dept Comp Sci & Engn, Trichy, India
关键词
deep belief network (DBN); distributed denial of service (DDoS); economical denial of service (EDoS); support vector machine (SVM); INTRUSION DETECTION; DDOS; MITIGATION;
D O I
10.1002/cpe.6543
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Cloud computing is a progressive technology that offers computing resources as Internet-based services, revolutionized information, and communication technologies. From an economic standpoint, this transformation is beneficial because it allows them to streamline technology infrastructure and capital costs. However, economical denial of service (EDoS) potential is a crucial impediment to cloud computing success. Several improved ways to detect EDoS and distributed denial of service (DDoS) attacks in the cloud have been presented; nevertheless, these approaches still result in a considerable reduction in detection accuracy when employed in a cloud setting. Because selecting relevant features and precise classifiers for attack detection is a challenge. We recommend using an EDoS and DDoS attack identification framework in the cloud based on optimized deep learning techniques for higher detection accuracy. The experimental results reveal True Positive Rate (TPR) varies from 98.9% to 99.8% when using deep belief network with support vector machine as a learning mechanism, while True Negative Rate (TNR) from 99.6% to 99.9%. TPR and TNR were found to have average values of 99.32% and 99.67%, respectively. At 1600 requests/s, the maximum accuracy achieved and the overall accuracy of the proposed strategy was 99.78%.
引用
收藏
页数:19
相关论文
共 36 条
[1]   Multi-layered intrusion detection and prevention in the SDN/NFV enabled cloud of 5G networks using AI-based defense mechanisms [J].
Abdulqadder, Ihsan H. ;
Zhou, Shijie ;
Zou, Deqing ;
Aziz, Israa T. ;
Akber, Syed Muhammad Abrar .
COMPUTER NETWORKS, 2020, 179
[2]   Performance Modeling and Analysis of the EDoS-Shield Mitigation [J].
Al-Haidari, F. ;
Salah, K. ;
Sqalli, M. ;
Buhari, S. M. .
ARABIAN JOURNAL FOR SCIENCE AND ENGINEERING, 2017, 42 (02) :793-804
[3]  
Alam MI., 2020, SPLINT INT J PROF, V7, P75
[4]  
Alshouiliy K., 2021, Fog/Edge Computing For Security, Privacy, and Applications, P3
[5]   An Experimental Evaluation of the EDoS-Shield Mitigation Technique for Securing the Cloud [J].
Alsowail, Saeed ;
Sqalli, Mohammed H. ;
Abu-Amara, Marwan ;
Baig, Zubair ;
Salah, Khaled .
ARABIAN JOURNAL FOR SCIENCE AND ENGINEERING, 2016, 41 (12) :5037-5047
[6]  
Azhari A., 2020, International Journal Of Artificial Intelligence Research, V4, P1, DOI DOI 10.29099/IJAIR.V4I1.156
[7]   Controlled access to cloud resources for mitigating Economic Denial of Sustainability (EDoS) attacks [J].
Baig, Zubair A. ;
Sait, Sadiq M. ;
Binbeshr, Farid .
COMPUTER NETWORKS, 2016, 97 :31-47
[8]  
Bawa PS., 2017, THESIS U SAINS MALAY
[9]   Unsupervised deep learning approach for network intrusion detection combining convolutional autoencoder and one-class SVM [J].
Binbusayyis, Adel ;
Vaiyapuri, Thavavel .
APPLIED INTELLIGENCE, 2021, 51 (10) :7094-7108
[10]  
Bulman G., 2018, SELECT COMPUT RES PA, V7, P15