Resilient Back Propagation Neural Network Security Model For Containerized Cloud Computing

被引:22
作者
Almiani, Muder [1 ]
Abughazleh, Alia [2 ]
Jararweh, Yaser [2 ]
Razaque, Abdul [3 ]
机构
[1] Gulf Univ Sci & Technol, Dept Management Informat Syst, Kuwait, Kuwait
[2] Jordan Univ Sci & Technol, Irbid 22110, Jordan
[3] Int IT Univ, Dept Comp Engn & Telecommun, Alma Ata, Kazakhstan
关键词
Cloud-Native Computing; Containers; DDoS Attack; Microservices; Resilient Neural Network; Deep Learning; Intrusion Detection;
D O I
10.1016/j.simpat.2022.102544
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Cloud-native computing is getting more and more popular in recent years where containerized microservices architectural designs play a central role in building a distributed systems and services. On one hand, they bring convenience and simplicity to build massively scalable distributed cloud-native applications and enable continuous development and delivery for their services. On the other hand, they widen the surface of malicious intrusions, which, in turn, without proper defense mechanisms, lessens their benefits to a certain degree. Among the biggest threats of malicious intrusions are those that belong to the Distributed Denial of Service (DDoS) family. Such type of attacks are challenging because DDoS attacks are elevated hard-to-absorbed threats and have a high degree of variability in types, design, and complexity. In this work, resilient backpropagation neural network was used to build an intelligent network intrusion detection model against the most modernistic DDoS attacks in the cloud-native computing environment. We evaluated our proposed model using the benchmarking Canadian Institute for Cybersecurity evaluation CICDDoS 2019 dataset. Our proposed detection model has achieved high reflective DDoS attack detection. Therefore, it is appropriate to defend against reflective DDoS attacks in containerized cloud-native platforms. Experimental results indicate that the DDoS attack detection accuracy of the proposed resilient neural network model is as high as 97.07% which outperforms most of the well-known learning models mentioned in the most related work. Moreover, the proposed model has achieved a competitive run time performance that highly meets the delay requirements of containerized cloud computing.
引用
收藏
页数:11
相关论文
共 19 条
[1]   Enabling multiple health security threats detection using mobile edge computing [J].
Al-Zinati, Mohammad ;
Almasri, Taha ;
Alsmirat, Mohammad ;
Jararweh, Yaser .
SIMULATION MODELLING PRACTICE AND THEORY, 2020, 101
[2]   DDoS Detection System: Using a Set of Classification Algorithms Controlled by Fuzzy Logic System in Apache Spark [J].
Alsirhani, Amjad ;
Sampalli, Srinivas ;
Bodorik, Peter .
IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT, 2019, 16 (03) :936-949
[3]  
[Anonymous], 2013, Neural networks: a systematic introduction
[4]   Low-latency vehicular edge: A vehicular infrastructure model for 5G [J].
Balasubramanian, Venkatraman ;
Otoum, Safa ;
Aloqaily, Moayad ;
Al Ridhawi, Ismaeel ;
Jararweh, Yaser .
SIMULATION MODELLING PRACTICE AND THEORY, 2020, 98
[5]   Detection of DDoS attacks with feed forward based deep neural network model [J].
Cil, Abdullah Emir ;
Yildiz, Kazim ;
Buldu, Ali .
EXPERT SYSTEMS WITH APPLICATIONS, 2021, 169
[6]  
Cloud-Native Computing Foundation, 2020, CNCF SURV 2020
[7]  
Gartner Inc, 2020, GARTN FOR STRONG REV
[8]   INCREASED RATES OF CONVERGENCE THROUGH LEARNING RATE ADAPTATION [J].
JACOBS, RA .
NEURAL NETWORKS, 1988, 1 (04) :295-307
[9]   FlowGuard: An Intelligent Edge Defense Mechanism Against IoT DDoS Attacks [J].
Jia, Yizhen ;
Zhong, Fangtian ;
Alrawais, Arwa ;
Gong, Bei ;
Cheng, Xiuzhen .
IEEE INTERNET OF THINGS JOURNAL, 2020, 7 (10) :9552-9562
[10]   ACCELERATED STOCHASTIC-APPROXIMATION [J].
KESTEN, H .
ANNALS OF MATHEMATICAL STATISTICS, 1958, 29 (01) :41-59