A DDoS Detection Approach Based on CNN in Cloud Computing

被引:7
作者
Yang, Zhongxue [1 ]
Qin, Xiaolin [1 ]
Li, Wenrui
Yang, Yingjie
机构
[1] Nanjing Univ Aeronaut & Astronaut, Coll Comp Sci & Technol, Nanjing 210016, Jiangsu, Peoples R China
来源
APPLIED SCIENCE, MATERIALS SCIENCE AND INFORMATION TECHNOLOGIES IN INDUSTRY | 2014年 / 513-517卷
关键词
DDoS Detection; Cellular Neural Network; RPLA; Cloud Computing; CELLULAR NEURAL-NETWORKS;
D O I
10.4028/www.scientific.net/AMM.513-517.579
中图分类号
TU [建筑科学];
学科分类号
0813 ;
摘要
A novel DDoS detection approach based on Cellular Neural Network (CNN) model in cloud computing is proposed in this paper. Cloud computing is a new generation of computation and information platform, which faces many security issues owing to the characteristics such as widely distributed and heterogeneous environment, voluminous, noisy and volatile data, difficulty in communication, changing attack patterns. CNN is an artificial neural network which features a multi-dimensional array of neurons and local interconnections among cells and CNN can be used to solve the cloud security difficulties according to the nature of non-linear and dynamic. RPLA and Tabu optimized algorithm is employed to learn the CNN classifier templates and bias for DDoS intrusion detection in cloud computing. Experiments on DDoS attacks detection show that whether RPLA-CNN or Tabu-CNN models are effective for DDoS Attacks detection. Results show that CNN model for DDoS attacks detection in cloud computing exhibits an excellent performance with the higher attack detection rate with lower false positive rate.
引用
收藏
页码:579 / 584
页数:6
相关论文
共 50 条
[31]   A DDoS Mitigation System with Multi-Stage Detection and Text-Based Turing Testing in Cloud Computing [J].
Huang, Vincent Shi-Ming ;
Huang, Robert ;
Chiang, Ming .
2013 IEEE 27TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS WORKSHOPS (WAINA), 2013, :655-662
[32]   Analysis and Detection of DDoS Attacks on Cloud Computing Environment using Machine Learning Techniques [J].
Wani, Abdul Raoof ;
Rana, Q. P. ;
Saxena, U. ;
Pandey, Nitin .
PROCEEDINGS 2019 AMITY INTERNATIONAL CONFERENCE ON ARTIFICIAL INTELLIGENCE (AICAI), 2019, :870-875
[33]   A Circular Chain Intrusion Detection for Cloud Computing based on improved AdjointVM Approach [J].
Oktay, Ucman ;
Aydin, Muhammed Ali ;
Sahingoz, Ozgur Koray .
14TH IEEE INTERNATIONAL SYMPOSIUM ON COMPUTATIONAL INTELLIGENCE AND INFORMATICS (CINTI), 2013, :201-206
[34]   DDoS vulnerabilities analysis and mitigation model in cloud computing [J].
Mishra, Narendra ;
Singh, R. K. .
JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2020, 23 (02) :535-545
[35]   A Survey of DDoS Attack and Defense Technologies in Cloud Computing [J].
Yue M. ;
Wang H.-Y. ;
Wu Z.-J. ;
Liu L. .
Jisuanji Xuebao/Chinese Journal of Computers, 2020, 43 (12) :2315-2336
[36]   Towards Securing Cloud Computing from DDOS Attacks [J].
Ahmed, Ishtiaq ;
Ahmed, Sheeraz ;
Nawaz, Asif ;
Jan, Sadeeq ;
Najam, Zeeshan ;
Saadat, Muneeb ;
Khan, Rehan Ali ;
Zaman, Khalid .
INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2020, 11 (08) :615-622
[37]   Intrusion detection and prevention of DDoS attacks in cloud computing environment: a review on issues and current methods [J].
Devi B.S.K. ;
Subbulakshmi T. .
International Journal of Cloud Computing, 2023, 12 (05) :450-481
[38]   HIDCC: A hybrid intrusion detection approach in cloud computing [J].
Hatef, Mohammad Amin ;
Shaker, Vahid ;
Jabbarpour, Mohammad Reza ;
Jung, Jason ;
Zarrabi, Houman .
CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2018, 30 (03)
[39]   Trilateral Trust Based Defense Mechanism against DDoS Attacks in Cloud Computing Environment [J].
Iyengar, N. Ch. S. N. ;
Ganapathy, Gopinath .
CYBERNETICS AND INFORMATION TECHNOLOGIES, 2015, 15 (02) :119-140
[40]   MAD-SE: ADAPTIVE THRESHOLD-BASED STACK ENSEMBLE APPROACH FOR THE DETECTION OF DDOS ATTACK IN CLOUD [J].
Pateriya, Rajesh Kumar ;
Verma, Priyanka ;
Singh, Dharam .
SURANAREE JOURNAL OF SCIENCE AND TECHNOLOGY, 2022, 29 (05)