Artificial Intelligence Algorithm-Based Economic Denial of Sustainability Attack Detection Systems: Cloud Computing Environments

被引:23
作者
Aldhyani, Theyazn H. H. [1 ]
Alkahtani, Hasan [2 ]
机构
[1] King Faisal Univ, Appl Coll Abqaiq, POB 400, Al Hasa 31982, Saudi Arabia
[2] King Faisal Univ, Coll Comp Sci & Informat Technol, POB 400, Al Hasa 31982, Saudi Arabia
关键词
machine learning approaches; deep learning approaches; economic denial of sustainability attack; cloud computing; intrusion detection system; TREE-BASED MODELS; DDOS ATTACKS; FOREST;
D O I
10.3390/s22134685
中图分类号
O65 [分析化学];
学科分类号
070302 ; 081704 ;
摘要
Cloud computing is currently the most cost-effective means of providing commercial and consumer IT services online. However, it is prone to new flaws. An economic denial of sustainability attack (EDoS) specifically leverages the pay-per-use paradigm in building up resource demands over time, culminating in unanticipated usage charges to the cloud customer. We present an effective approach to mitigating EDoS attacks in cloud computing. To mitigate such distributed attacks, methods for detecting them on different cloud computing smart grids have been suggested. These include hard-threshold, machine, and deep learning, support vector machine (SVM), K-nearest neighbors (KNN), random forest (RF) tree algorithms, namely convolutional neural network (CNN), and long short-term memory (LSTM). These algorithms have greater accuracies and lower false alarm rates and are essential for improving the cloud computing service provider security system. The dataset of nine injection attacks for testing machine and deep learning algorithms was obtained from the Cyber Range Lab at the University of New South Wales (UNSW), Canberra. The experiments were conducted in two categories: binary classification, which included normal and attack datasets, and multi-classification, which included nine classes of attack data. The results of the proposed algorithms showed that the RF approach achieved accuracy of 98% with binary classification, whereas the SVM model achieved accuracy of 97.54% with multi-classification. Moreover, statistical analyses, such as mean square error (MSE), Pearson correlation coefficient (R), and the root mean square error (RMSE), were applied in evaluating the prediction errors between the input data and the prediction values from different machine and deep learning algorithms. The RF tree algorithm achieved a very low prediction level (MSE = 0.01465) and a correlation R-2 (R squared) level of 92.02% with the binary classification dataset, whereas the algorithm attained an R-2 level of 89.35% with a multi-classification dataset. The findings of the proposed system were compared with different existing EDoS attack detection systems. The proposed attack mitigation algorithms, which were developed based on artificial intelligence, outperformed the few existing systems. The goal of this research is to enable the detection and effective mitigation of EDoS attacks.
引用
收藏
页数:24
相关论文
共 79 条
[71]   DDoS attacks in cloud computing: Collateral damage to non-targets [J].
Somani, Gaurav ;
Gaur, Manoj Singh ;
Sanghi, Dheeraj ;
Conti, Mauro .
COMPUTER NETWORKS, 2016, 109 :157-171
[72]   Entropy-Based Economic Denial of Sustainability Detection [J].
Sotelo Monge, Marco Antonio ;
Maestre Vidal, Jorge ;
Garcia Villalba, Luis Javier .
ENTROPY, 2017, 19 (12)
[73]  
Sqalli M. H., 2011, Proceedings of the 2011 IEEE 4th International Conference on Utility and Cloud Computing (UCC 2011), P49, DOI 10.1109/UCC.2011.17
[74]  
Tavallaee M., 2009, 2009 IEEE S COMP INT, P1
[75]  
Teoh T. T., 2018, 2018 INT C SMART COM
[76]   A Deep Learning Approach for Intrusion Detection Using Recurrent Neural Networks [J].
Yin, Chuanlong ;
Zhu, Yuefei ;
Fei, Jinlong ;
He, Xinzheng .
IEEE ACCESS, 2017, 5 :21954-21961
[77]   Machine Learning-based Orchestration of Containers: A Taxonomy and Future Directions [J].
Zhong, Zhiheng ;
Xu, Minxian ;
Rodriguez, Maria Alejandra ;
Xu, Chengzhong ;
Buyya, Rajkumar .
ACM COMPUTING SURVEYS, 2022, 54 (10S)
[78]  
Zhou L., 2018, P 2 INT C COMP SCI A, P1
[79]   Detection and defense of application-layer DDoS attacks in backbone web traffic [J].
Zhou, Wei ;
Jia, Weijia ;
Wen, Sheng ;
Xiang, Yang ;
Zhou, Wanlei .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2014, 38 :36-46