Mitigation of DDoS Attack in Cloud Computing Domain by Integrating the DCLB Algorithm with Fuzzy Logic

被引:0
作者
Nair, Amrutha Muralidharan [1 ]
Santhosh, R. [1 ]
机构
[1] Karpagam Acad Higher Educ, Dept Comp Sci Engn, Coimbatore, Tamil Nadu, India
关键词
DDoS attack; resource scaling; DCLB; fuzzy logic; traffic parameters;
D O I
10.14569/IJACSA.2022.0131059
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Cloud computing would be an easy method to obtain services, resources and applications from any location on the internet. In the future of data generation, it is an unavoidable conclusion. Despite its many attractive properties, the cloud is vulnerable to a variety of attacks. One such well-known attack that emphasizes the availability of amenities is the Distributed Denial of Service (DDoS). A DDoS assault overwhelms the server with massive quantities of regular or intermittent traffic. It compromises with the cloud servers' services and makes it harder to reply to legitimate users of the cloud. A monitoring system with correct resource scaling approach should be created to regulate and monitor the DDoS assault. The network is overwhelmed with excessive traffic of significant resource usage requests during the attack, resulting in the denial of needed services to genuine users. In this research, a unique way to the analyze resources used by the cloud users, lowering of the resources consumed is done when the network is overburdened with excessive traffic, and the dynamic cloud load balancing algorithm DCLB (Dynamic Cloud Load Balancing) is used to balance the overhead towards the server. The core premise is to monitor traffic using the fuzzy logic approach, which employs different traffic parameters in conjunction with various built in measured to recognize the DDoS attack traffic in the network. Finally, the proposed method shows a 93% of average detection rate when compared to the existing model. This method is a unique attempt to comprehend the importance of DDoS mitigation techniques as well as good resource management during an attack and analysis of the.
引用
收藏
页码:507 / 516
页数:10
相关论文
共 25 条
[1]  
Alsirhani A, 2018, CAN CON EL COMP EN
[2]  
Arbor Networks, 2015, WORLDW INFR SEC REP, V11
[3]  
Arbor Networks Technical Report, 2016, WORLDW INFR SEC REP, V12
[4]   Cloud security defence to protect cloud computing against HTTP-DoS and XML-DoS attacks [J].
Chonka, Ashley ;
Xiang, Yang ;
Zhou, Wanlei ;
Bonti, Alessio .
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2011, 34 (04) :1097-1107
[5]  
Jeyanthi N, 2013, INT J COMMUN NETW DI, V11, P262
[6]  
Khadka Bikram, 2015, SCH COMPUTING MATH C, P1
[7]  
Kousar H., 2021, 2021 INT C COMP COMM, P1, DOI [10.1109/ICCCI50826.2021.9457012, DOI 10.1109/ICCCI50826.2021.9457012]
[8]  
Lee TY, 2009, IEEE PAC VIS SYMP, P1, DOI 10.1109/PACIFICVIS.2009.4906831
[9]  
Liang XY, 2019, INT CONF COMPUT NETW, P821, DOI [10.1109/iccnc.2019.8685519, 10.1109/ICCNC.2019.8685519]
[10]  
Liu ZG, 2016, INT CONF ADV COMMUN, P66, DOI 10.1109/ICACT.2016.7423276