A Profile-Based Novel Framework for Detecting EDoS Attacks in the Cloud Environment

被引:8
作者
Dennis, J. Britto [1 ]
Priya, M. Shanmuga [2 ]
机构
[1] Dhanalakshmi Srinivasan Engn Coll, Dept Informat Technol, Perambalur, Tamil Nadu, India
[2] MAM Coll Engn, Dept Comp Sci & Engn, Trichy, Tamil Nadu, India
关键词
DDoS attacks; EDoS attacks; On-demand services; Cloud computing;
D O I
10.1007/s11277-021-08280-y
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
The future of information technology mainly depends upon cloud computing. Hence security in cloud computing is highly essential for the consumers as well as the service providers of the particular cloud environment. There are many security threats are challenging the current cloud environment. One of the important security threat ever in cloud environment is considered to be the Distributed Denial of Service (DDoS) attack. Where cloud is of greater benefit in terms of providing on-demand services, a certain kind of attack named as Economic Denial of Sustainability (EDoS) occurs in pay per use payment model. Due to the occurrence of this attack the consumers are forced to pay additional amount for the services offered. EDoS attacks are similar to that of DDoS attacks Which is classified as-attacks associated with bandwidth consuming, application targeted attacks and the exhaustion of the connection layer. The main objective of the proposed work is to design a profile-based novel framework for maximizing the detection of various types of EDoS attacks. During this process, the proposed framework consisting Feature Classification (FC) algorithm ensures that false positives and negatives along with bandwidth and memory consumption are highly minimized. The proposed algorithm allows only the limited resources for allocation to the available virtual machines which increases the chances of the detecting the attack and preventing the misuse propagation of resources. The accuracy and efficiency of this approach is proven to be higher with lesser computational complexity when compare to the existing approaches.
引用
收藏
页码:3487 / 3503
页数:17
相关论文
共 20 条
[1]  
Abbasi H., 2019, J Hardw Syst Secur, V3, P164, DOI [10.1007/s41635-018-0061-2, DOI 10.1007/S41635-018-0061-2]
[2]   Hybrid clustering analysis using improved krill herd algorithm [J].
Abualigah, Laith Mohammad ;
Khader, Ahamad Tajudin ;
Hanandeh, Essam Said .
APPLIED INTELLIGENCE, 2018, 48 (11) :4047-4071
[3]   A new feature selection method to improve the document clustering using particle swarm optimization algorithm [J].
Abualigah, Laith Mohammad ;
Khader, Ahamad Tajudin ;
Hanandeh, Essam Said .
JOURNAL OF COMPUTATIONAL SCIENCE, 2018, 25 :456-466
[4]   Defense Mechanisms Against DDoS Attacks in a Cloud Computing Environment: State-of-the-Art and Research Challenges [J].
Agrawal, Neha ;
Tapaswi, Shashikala .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2019, 21 (04) :3769-3795
[5]  
[Anonymous], 2018, DDOS ATTACKERS INCRE
[6]  
Dagenais, 2018, P OTT LIN S
[7]   A Survey on Distributed Denial of Service (DDoS) Attacks in SDN and Cloud Computing Environments [J].
Dong, Shi ;
Abbas, Khushnood ;
Jain, Raj .
IEEE ACCESS, 2019, 7 :80813-80828
[8]   Benchmark-Based Reference Model for Evaluating Botnet Detection Tools Driven by Traffic-Flow Analytics [J].
Huancayo Ramos, Katherinne Shirley ;
Sotelo Monge, Marco Antonio ;
Maestre Vidal, Jorge .
SENSORS, 2020, 20 (16) :1-31
[9]   Identifying (Quasi) Equally Informative Subsets in Feature Selection Problems for Classification: A Max-Relevance Min-Redundancy Approach [J].
Karakaya, Gulsah ;
Galelli, Stefano ;
Ahipasaoglu, Selin Damla ;
Taormina, Riccardo .
IEEE TRANSACTIONS ON CYBERNETICS, 2016, 46 (06) :1424-1437
[10]  
Karan B. V., 2018, 2018 3rd International Conference on Computational Systems and Information Technology for Sustainable Solutions (CSITSS), P265, DOI 10.1109/CSITSS.2018.8768551