Protocol specific Multi-threaded Network Intrusion Detection System (PM-NIDS) for DoS/DDoS Attack Detection in Cloud

被引:0
作者
Patil, Rajendra [1 ]
Dudeja, Harsha [1 ]
Gawade, Snehal [1 ]
Modi, Chirag [1 ]
机构
[1] NIT Goa, Ponda, Goa, India
来源
2018 9TH INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION AND NETWORKING TECHNOLOGIES (ICCCNT) | 2018年
关键词
Cloud Computing; Security; Denial of Service (DoS); Distributed Denial of Service (DDoS); Intrusion Detection;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Cloud computing has added new dimensions to the world of computing technology. However, it has various security and privacy concerns. The major threats are Denial of service (DoS) and Distributed Denial of Service (DDoS) attacks to the cloud technology in recent years. In this paper, we design an efficient security framework which is protocol specific Multithreaded Network Intrusion Detection System (PM-NIDS) aiming at detecting DoS/DDoS attacks in the cloud. Here, the incoming packets are separated according to the protocol and queued for further processing. Each queue is handled by a framework thread which extracts the relevant features and applies protocol specific classifiers for each packet in the queue. Finally, it generates the alerts for the detected intrusions. We have performed different experiments for the feasibility analysis and validation of the proposed framework
引用
收藏
页数:7
相关论文
共 22 条
[1]  
[Anonymous], 2012, ARXIV12083557
[2]  
Buragohain Chaitanya, 2016, 2016 3rd International Conference on Signal Processing and Integrated Networks (SPIN), P519, DOI 10.1109/SPIN.2016.7566750
[3]  
Du W., 2002, P IEEE INT C PRIV SE, V14, P1
[4]  
Gimes K. H., 2005, P 3 ANN C PRIV SEC T
[5]   Analysis of DDoS Attacks and an Introduction of a Hybrid Statistical Model to Detect DDoS Attacks on Cloud Computing Environment [J].
Girma, Anteneh ;
Garuba, Moses ;
Li, Jiang ;
Liu, Chunmei .
2015 12TH INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY - NEW GENERATIONS, 2015, :212-217
[6]   Evaluation Measures of the Classification Performance of Imbalanced Data Sets [J].
Gu, Qiong ;
Zhu, Li ;
Cai, Zhihua .
COMPUTATIONAL INTELLIGENCE AND INTELLIGENT SYSTEMS, 2009, 51 :461-+
[7]  
Jain R., 2013, INTRO SOFTWARE DEFIN, V11, P1
[8]  
Kleber V., 2012, IT PROFESSIONAL COMP, V12, P38
[9]  
Ling C.H., 2016, International Journal of Network Security, V18, P397
[10]   A survey of intrusion detection techniques in Cloud [J].
Modi, Chirag ;
Patel, Dhiren ;
Borisaniya, Bhavesh ;
Patel, Hiren ;
Patel, Avi ;
Rajarajan, Muttukrishnan .
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2013, 36 (01) :42-57