Distributed denial of service attack detection in cloud computing using hybrid extreme learning machine

被引:9
作者
Kushwah, Gopal Singh [1 ]
Ranga, Virender [1 ]
机构
[1] Natl Inst Technol Kurukshetra, Dept Comp Engn, Kurukshetra, Haryana, India
关键词
Cloud computing; black hole optimization; DDoS attacks; artificial neural networks; extreme learning machine; INTRUSION DETECTION; DDOS ATTACKS; DEFENSE; ENVIRONMENT;
D O I
10.3906/elk-1908-87
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
One of the major security challenges in cloud computing is distributed denial of service (DDoS) attacks. In these attacks, multiple nodes are used to attack the cloud by sending huge traffic. This results in the unavailability of cloud services to legitimate users. In this research paper, a hybrid machine learning-based technique has been proposed to detect these attacks. The proposed technique is implemented by combining the extreme learning machine (ELM) model and the blackhole optimization algorithm. Various experiments have been performed with the help of four benchmark datasets namely, NSL KDD, ISCX IDS 2012, CICIDS2017, and CICDDoS2019, to evaluate the performance of our proposed technique. It achieves an accuracy of 99.23%, 92.19%, 99.50%, 99.80% with NSL KDD, ISCX IDS 2012, CICIDS2017, and CICDDoS2019, respectively. The performance comparison with other techniques based on ELM, artificial neural network (ANN) trained with blackhole optimization, backpropagation ANN, and other state-of-the-art techniques is also performed.
引用
收藏
页码:1852 / 1870
页数:19
相关论文
共 50 条
[1]   Cloud-Based DDoS HTTP Attack Detection Using Covariance Matrix Approach [J].
Aborujilah, Abdulaziz ;
Musa, Shahrulniza .
Journal of Computer Networks and Communications, 2017, 2017
[2]   Defense Mechanisms Against DDoS Attacks in a Cloud Computing Environment: State-of-the-Art and Research Challenges [J].
Agrawal, Neha ;
Tapaswi, Shashikala .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2019, 21 (04) :3769-3795
[3]   A View of Cloud Computing [J].
Armbrust, Michael ;
Fox, Armando ;
Griffith, Rean ;
Joseph, Anthony D. ;
Katz, Randy ;
Konwinski, Andy ;
Lee, Gunho ;
Patterson, David ;
Rabkin, Ariel ;
Stoica, Ion ;
Zaharia, Matei .
COMMUNICATIONS OF THE ACM, 2010, 53 (04) :50-58
[4]   Fuzziness based semi-supervised learning approach for intrusion detection system [J].
Ashfaq, Rana Aamir Raza ;
Wang, Xi-Zhao ;
Huang, Joshua Zhexue ;
Abbas, Haider ;
He, Yu-Lin .
INFORMATION SCIENCES, 2017, 378 :484-497
[5]  
Bakshi Aman, 2010, Proceedings of the Second International Conference on Communication Software and Networks (ICCSN 2010), P260, DOI 10.1109/ICCSN.2010.56
[6]  
Buragohain Chaitanya, 2016, 2016 3rd International Conference on Signal Processing and Integrated Networks (SPIN), P519, DOI 10.1109/SPIN.2016.7566750
[7]  
Chi-Chun Lo, 2010, 2010 39th International Conference on Parallel Processing Workshops (ICPPW), P280, DOI 10.1109/ICPPW.2010.46
[8]   A study on intrusion detection using neural networks trained with evolutionary algorithms [J].
Dash, Tirtharaj .
SOFT COMPUTING, 2017, 21 (10) :2687-2700
[9]   Efficient DDoS flood attack detection using dynamic thresholding on flow-based network traffic [J].
David, Jisa ;
Thomas, Ciza .
COMPUTERS & SECURITY, 2019, 82 :284-295
[10]   PCA filtering and probabilistic SOM for network intrusion detection [J].
De la Hoz, Eduardo ;
De La Hoz, Emiro ;
Ortiz, Andres ;
Ortega, Julio ;
Prieto, Beatriz .
NEUROCOMPUTING, 2015, 164 :71-81