Analysis and Detection of DDoS Attacks on Cloud Computing Environment using Machine Learning Techniques

被引:0
作者
Wani, Abdul Raoof [1 ]
Rana, Q. P. [2 ]
Saxena, U. [3 ]
Pandey, Nitin [1 ]
机构
[1] Amity Univ Noida, Noida, India
[2] Jamia Hamdard, New Delhi, India
[3] CCFIS, Noida, India
来源
PROCEEDINGS 2019 AMITY INTERNATIONAL CONFERENCE ON ARTIFICIAL INTELLIGENCE (AICAI) | 2019年
关键词
Machine learning; SVM; Naive Bayes; Random Forest; DDoS; Cloud Computing; Weka;
D O I
10.1109/aicai.2019.8701238
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The primary benefit of the cloud is that it elastically scales to meet variable demand and it provides the environment which scales up and scales down instantly according to the demand, so it needs great protection from DDoS attacks to tackle downtime effects of DDoS Attacks. Distribute Denial of Service attacks fall on the category of critical attacks that compromise the availability of the network. These attacks have become sophisticated and continue to grow at a rapid pace so to detect and counter these attacks have become a challenging task. This work was carried out on the owncloud environment using Tor Hammer as an attacking tool and a new dataset was generated with Intrusion Detection System. This work incorporates various machine learning algorithms: Support Vector Machine, Naive Bayes, and Random Forest for classification and overall accuracy was 99.7%, 97.6% and 98.0% of Support Vector Machine, Random Forest and Naive Bayes respectively
引用
收藏
页码:870 / 875
页数:6
相关论文
共 17 条
  • [1] Alkasassbeh Mouhammd, 2016, INT J ADV COMPUTER S, V7
  • [2] [Anonymous], 2006, LOC COMP NETW P 2006
  • [3] Bhardwaj Abhishek, 2018, INT J ENG TECHNOLOGY, V7, P502, DOI [10.14419/ijet.v7i2.7.10871, DOI 10.14419/IJET.V7I2.7.10871]
  • [4] Bhat AZ, 2016, INT CONF RELI INFO, P526
  • [5] Burman I., 2018, J ADV RES DYNAMICAL, V10, P291
  • [6] Cambiaso E., 2012, International Conference on Security in Computer Networks and Distributed Systems, P195
  • [7] Dantas Yuri Gil, 2014, INT SEC INF C JISIC
  • [8] Labs Kaspersky., 2014, GLOBAL IT SECURITY RISKS SURVEY 2014 DISTRIBUTED DENIAL OF SERVICE
  • [9] Defense techniques for low-rate DoS attacks against application servers
    Macia-Fernandez, Gabriel
    Rodriguez-Gomez, Rafael A.
    Diaz-Verdejo, Jesus E.
    [J]. COMPUTER NETWORKS, 2010, 54 (15) : 2711 - 2727
  • [10] Nam SY, 2009, LECT NOTES COMPUT SC, V5787, P301