Detect and Filter Traffic Attack through Cloud Trace back and Neural Network

被引:0
作者
Alam, Mansaf [1 ]
Shakil, Kashish Ara [1 ]
Javed, Mohd. Salman [1 ]
Ansari, Manzoor [1 ]
Ambreen [2 ]
机构
[1] Jamia Millia Islamia, Dept Comp Sci, New Delhi, India
[2] Jamia Millia Islamia, New Delhi, India
来源
WORLD CONGRESS ON ENGINEERING, WCE 2015, VOL I | 2015年
关键词
Network security; DDoS; X-DoS; H-DoS; Cloud computing; Trace Back; Black hole; SECURITY ISSUES; MODELS;
D O I
暂无
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Cloud computing is one of the major technologies predicted to revolutionize the future of computing world. The concept of delivering IT as a service has several astounding features and advantages. Cloud is an enchanting option for small and medium enterprises to reduce upfront investment, enabling them to use sophisticated business intelligence applications that only large enterprises could previously afford. Cloud computing has huge potential to improve overall productivity and reduce cost. It is a new consumption and delivery model for IT services but its security is still a pitfall. Cloud computing is threatened by several security issues although most of them are already in place but there are still many attacks that need to be taken care of. Out of all the attacks in cloud environment one of the most serious attack to cloud is DDOS attack (H- DoS and X-DoS). This paper tries to find out the root cause for such attacks and suggests particular solutions regarding the same. The proposed solution is based on Cloud TraceBack (CTB) and Network Neural.
引用
收藏
页码:535 / 540
页数:6
相关论文
共 21 条
  • [1] Insider Attack Detection Using Deep Belief Neural Network in Cloud Computing
    Anakath, A. S.
    Kannadasan, R.
    Joseph, Niju P.
    Boominathan, P.
    Sreekanth, G. R.
    COMPUTER SYSTEMS SCIENCE AND ENGINEERING, 2022, 41 (02): : 479 - 492
  • [2] The design and implementation of IP trace back method of DDoS attack using fastICA traffic analysis
    Xiang, Gao
    Xin, Zhang
    Xiao, Wang
    Journal of Convergence Information Technology, 2012, 7 (23) : 57 - 65
  • [3] Network Attack Classification with a Shallow Neural Network for Internet and Internet of Things (IoT) Traffic
    Ehmer, Jorg
    Savaria, Yvon
    Granado, Bertrand
    David, Jean-Pierre
    Denoulet, Julien
    ELECTRONICS, 2024, 13 (16)
  • [4] A novel cloud architecture approach to detect network intrusions using an enhanced artificial neural network
    Lakhani P.
    Alankar B.
    Ashraf S.S.
    Parveen S.
    International Journal of Information Technology, 2024, 16 (6) : 3929 - 3939
  • [5] Effectively Mining Network Traffic Intelligence to Detect Malicious Stealthy Port Scanning to Cloud Servers
    Qu, Yanzhen
    Lu, Qikai
    JOURNAL OF INTERNET TECHNOLOGY, 2014, 15 (05): : 841 - 852
  • [6] Cyber security attack recognition on cloud computing networks based on graph convolutional neural network and graphsage models
    Abdullayeva, Fargana
    Suleymanzade, Suleyman
    RESULTS IN CONTROL AND OPTIMIZATION, 2024, 15
  • [7] THE RANDOM NEURAL NETWORK FOR COGNITIVE TRAFFIC ROUTING AND TASK ALLOCATION IN NETWORKS AND THE CLOUD
    Wang, Lan
    PROBABILITY IN THE ENGINEERING AND INFORMATIONAL SCIENCES, 2017, 31 (04) : 540 - 560
  • [8] An efficient metaheuristic algorithm based feature selection and recurrent neural network for DoS attack detection in cloud computing environment
    SaiSindhuTheja, Reddy
    Shyam, Gopal K.
    APPLIED SOFT COMPUTING, 2021, 100
  • [9] Applying Deep Convolutional Neural Network (DCNN) Algorithm in the Cloud Autonomous Vehicles Traffic Model
    Ramakrishnan, Dhaya
    Radhakrishnan, Kanthavel
    INTERNATIONAL ARAB JOURNAL OF INFORMATION TECHNOLOGY, 2022, 19 (02) : 186 - 194
  • [10] Privacy Preserving Back-Propagation Neural Network Learning Made Practical with Cloud Computing
    Yuan, Jiawei
    Yu, Shucheng
    IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2014, 25 (01) : 212 - 221