Real-time DDoS flood attack monitoring and detection (RT-AMD) model for cloud computing

被引:10
作者
Bamasag, Omaimah [1 ]
Alsaeedi, Alaa [2 ]
Munshi, Asmaa [3 ]
Alghazzawi, Daniyal [4 ]
Alshehri, Suhair [5 ]
Jamjoom, Arwa [4 ]
机构
[1] King Abdulaziz Univ, Fac Comp & Informat Technol, Dept Comp Sci, Jeddah, Saudi Arabia
[2] Univ Jeddah, Dept Comp Sci, Jeddah, Saudi Arabia
[3] Univ Jeddah, Cybersecur Dept, Jeddah, Saudi Arabia
[4] King Abdulaziz Univ, Fac Comp & Informat Technol, Dept Informat Syst, Jeddah, Saudi Arabia
[5] King Abdulaziz Univ, Fac Comp & Informat Technol, Dept Informat Technol, Jeddah, Saudi Arabia
关键词
Machine learning; Distributed denial of service attack; Cloud computing; Incremental learning; SECURITY ISSUES;
D O I
10.7717/peerj-cs.814
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In recent years, the advent of cloud computing has transformed the field of computing and information technology. It has been enabling customers to rent virtual resources and take advantage of various on-demand services with the lowest costs. Despite the advantages of cloud computing, it faces several threats; an example is a distributed denial of service (DDoS) attack, which is considered among the most serious. This article presents real-time monitoring and detection of DDoS attacks on the cloud using a machine learning approach. Naive Bayes, K-nearest neighbor, decision tree, and random forest machine learning classifiers have been selected to build a predictive model named "Real-Time DDoS flood Attack Monitoring and Detection RT-AMD." The DDoS-2020 dataset was constructed with 70,020 records to evaluate RT-AMD's accuracy. The DDoS-2020 contains three protocols for network/transport-level, which are TCP, DNS, and ICMP. This article evaluates the proposed model by comparing its accuracy with related works. Our model has shown improvement in the results and reached real-time attack detection using incremental learning. The model achieved 99.38% accuracy for the random forest in real-time on the cloud environment and 99.39% on local testing. The RT-AMD was evaluated on the NSL-KDD dataset as well, in which it achieved 99.30% accuracy in real-time in a cloud environment.
引用
收藏
页数:21
相关论文
共 33 条
[1]   Cloud-Based DDoS HTTP Attack Detection Using Covariance Matrix Approach [J].
Aborujilah, Abdulaziz ;
Musa, Shahrulniza .
Journal of Computer Networks and Communications, 2017, 2017
[2]  
Alzahrani Sabah., 2017, Journal of Information Security, V9, P45, DOI DOI 10.4236/JIS.2018.91005
[3]  
Bakshi Aman, 2010, Proceedings of the Second International Conference on Communication Software and Networks (ICCSN 2010), P260, DOI 10.1109/ICCSN.2010.56
[4]  
CAIDA: Center for Applied Internet Data Analysis, DAT COLL CUR SHAR
[5]   A method of DDoS attack detection using HTTP packet pattern and rule engine in cloud computing environment [J].
Choi, Junho ;
Choi, Chang ;
Ko, Byeongkyu ;
Kim, Pankoo .
SOFT COMPUTING, 2014, 18 (09) :1697-1703
[6]   Smart Detection: An Online Approach for DoS/DDoS Attack Detection Using Machine Learning [J].
de Lima Filho, Francisco Sales ;
Silveira, Frederico A. F. ;
Brito Junior, Agostinho de Medeiros ;
Vargas-Solar, Genoveva ;
Silveira, Luiz F. .
SECURITY AND COMMUNICATION NETWORKS, 2019, 2019
[7]   DDoS attacks and defense mechanisms: classification and state-of-the-art [J].
Douligeris, C ;
Mitrokotsa, A .
COMPUTER NETWORKS, 2004, 44 (05) :643-666
[8]  
Ghaffari F, 2019, 2019 5TH INTERNATIONAL CONFERENCE ON WEB RESEARCH (ICWR), P196, DOI [10.1109/icwr.2019.8765295, 10.1109/ICWR.2019.8765295]
[9]   Adaptive random forests for evolving data stream classification [J].
Gomes, Heitor M. ;
Bifet, Albert ;
Read, Jesse ;
Barddal, Jean Paul ;
Enembreck, Fabricio ;
Pfharinger, Bernhard ;
Holmes, Geoff ;
Abdessalem, Talel .
MACHINE LEARNING, 2017, 106 (9-10) :1469-1495
[10]   A Deep CNN Ensemble Framework for Efficient DDoS Attack Detection in Software Defined Networks [J].
Haider, Shahzeb ;
Akhunzada, Adnan ;
Mustafa, Iqra ;
Patel, Tanil Bharat ;
Fernandez, Amanda ;
Choo, Kim-Kwang Raymond ;
Iqbal, Javed .
IEEE ACCESS, 2020, 8 :53972-53983