An efficient SVM based DEHO classifier to detect DDoS attack in cloud computing environment

被引:13
|
作者
Alam, Gowthul M. M. [1 ]
Kumar, Jerald Nirmal S. [2 ]
Mageswari, Uma R. [3 ]
Raj, Michael T. F. [2 ]
机构
[1] Presidency Univ, Dept Comp Sci & Engn, Bengaluru, India
[2] Galgotias Univ, Sch Comp Sci & Engn, Greater Noida, India
[3] Vardhaman Coll Engn, Dept Comp Sci & Engn, Hyderabad, India
关键词
DDoS attack; Cloud; DEHO; SVM; KPCA; Databases; Data samples; Cyber security; LOAD;
D O I
10.1016/j.comnet.2022.109138
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Distributed denial of service (DDoS) attacks is rising exponentially and creates a severe threat to security. Generally, the DDoS attack may appear uncomplicated but they are hard to prevent and considered as one of the most significant cybersecurity issues. Hence, addressing against DDoS attacks turns out to be imperative. The major goal of this paper involves the optimal detection of data samples as normal data samples and malicious/ attacked data samples. This paper proposes a security algorithm against DDoS attacks by employing four significant phases namely the Database training phase, Data pre-processing phase, Feature selection phase and Classification phase. Initially, the data samples are to be trained before using it for attack detection. Later, the sample group is created for every file and the data samples are pre-processed in the data pre-processing phase. Secondly, in feature selection phase, the selected features are optimized by employing kernel principal component analysis (KPCA) to obtain optimal features. Later, in the classification phase, a support vector machine-based discrete elephant herding optimization (SVM-DEHO) classifier is utilized to detect the data sample as normal data and attacked or malicious data. Finally, the proposed approach is examined for four different databases namely NSL-KDD, UNSW-NB15, ISCX ID and CIC-IDS2017 databases respectively. The experimental analyses are performed for various simulation metrics and the outcome reveals that the detection system performances are high using SVM-DEHO approach than other approaches.
引用
收藏
页数:12
相关论文
共 50 条
  • [1] An efficient SVM based DEHO classifier to detect DDoS attack in cloud computing environment
    MM, Gowthul Alam
    S, Jerald Nirmal Kumar
    R, Uma Mageswari
    TF, Michael Raj
    Computer Networks, 2022, 215
  • [2] EFFICIENT CLASSIFIER TO DETECT DDoS ATTACK BASED ON INTERNET OF THINGS
    Almulhim, Fatimah
    Al Shanbari, Huda M.
    Aljohani, Hassan M.
    Elhag, Azhari A.
    Ben Ishak, Anis
    THERMAL SCIENCE, 2024, 28 (6B): : 5113 - 5123
  • [3] DDoS Attack Detection and Mitigation Techniques in Cloud Computing Environment
    Devi, Kiruthika B. S.
    Subbulakshmi, T.
    PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON INTELLIGENT SUSTAINABLE SYSTEMS (ICISS 2017), 2017, : 512 - 517
  • [4] Detection Mechanisms of DDoS Attack in Cloud Computing Environment: A Survey
    Alarqan, Mohammad Abdelkareem
    Zaaba, Zarul Fitri
    Almomani, Ammar
    ADVANCES IN CYBER SECURITY (ACES 2019), 2020, 1132 : 138 - 152
  • [5] Efficient DDoS Attack Detection through Lightweight Deep Learning Model in Cloud Computing Environment
    Gupta, Brij B.
    Gaurav, Akshat
    Arya, Varsha
    Chui, Kwok Tai
    2024 IEEE 24TH INTERNATIONAL SYMPOSIUM ON CLUSTER, CLOUD AND INTERNET COMPUTING WORKSHOPS, CCGRIDW 2024, 2024, : 208 - 212
  • [6] Efficient DDoS attack detection and prevention scheme based on SDN in cloud environment
    He H.
    Hu Y.
    Zheng L.
    Xue Z.
    He, Heng (heheng@wust.edu.cn), 2018, Editorial Board of Journal on Communications (39): : 139 - 151
  • [7] A Novel Cloud Computing Security Model to Detect and Prevent DoS and DDoS Attack
    Rahman, Masudur
    Cheung, Wah Man
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2014, 5 (06) : 119 - 122
  • [8] An Efficient system to stumble on and Mitigate DDoS attack in cloud Environment
    Mohan, Manju K.
    PROCEEDINGS OF THE 2018 SECOND INTERNATIONAL CONFERENCE ON INVENTIVE COMMUNICATION AND COMPUTATIONAL TECHNOLOGIES (ICICCT), 2018, : 1855 - 1857
  • [9] A Confidence Interval Based Filtering Against DDoS Attack in Cloud Environment: A Confidence Interval Against DDoS Attack in the Cloud
    Haddadi, Mohamed
    Beghdad, Rachid
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY AND PRIVACY, 2020, 14 (04) : 42 - 56
  • [10] Analysis of DDoS Attacks and an Introduction of a Hybrid Statistical Model to Detect DDoS Attacks on Cloud Computing Environment
    Girma, Anteneh
    Garuba, Moses
    Li, Jiang
    Liu, Chunmei
    2015 12TH INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY - NEW GENERATIONS, 2015, : 212 - 217