FQBDDA: fuzzy Q-learning based DDoS attack detection algorithm for cloud computing environment

被引:1
|
作者
Kumar A. [1 ]
Dutta S. [1 ]
Pranav P. [1 ]
机构
[1] Department of Computer Science and Engineering, Birla Institute of Technology, Mesra, Ranchi
关键词
Cloud computing; DDoS attack; Fuzzy logic; Fuzzy Q-learning; Optimization; Q-learning; Security;
D O I
10.1007/s41870-023-01509-y
中图分类号
学科分类号
摘要
With on-demand resources, flexibility, scalability, dynamic nature, and cheaper maintenance costs, cloud computing technology has revolutionized the Information Technology sector, and almost everyone using the internet relies in some manner on the use of cloud services. Distributed denial of service (DDoS) attack blocks the services by flooding high or low volumes of malicious traffic to exhaust the servers, resources, etc. of the Cloud environment. In today’s era, they are challenging to detect because of low-rate traffic and its hidden approach in the cloud. Studying all DDoS attacks with their possible solution is essential to protect the cloud computing environment. In this paper, we have proposed a fuzzy Q learning algorithm and Chebyshev’s Inequality principle to counter the problem of DDoS attacks. The proposed framework follows the inclusion of Chebyshev’s inequality for workload prediction in the cloud in the analysis phase and fuzzy Q-learning in the planning phase. Experimental results prove that our proposed fuzzy Q-learning based DDoS attack detection algorithm for cloud computing environment (FQBDDA) model prevent DDoS attack. © The Author(s), under exclusive licence to Bharati Vidyapeeth's Institute of Computer Applications and Management 2023.
引用
收藏
页码:891 / 900
页数:9
相关论文
共 50 条
  • [31] An Auto-Scaling Cloud Controller Using Fuzzy Q-Learning - Implementation in OpenStack
    Arabnejad, Hamid
    Jamshidi, Pooyan
    Estrada, Giovani
    El Ioini, Nabil
    Pahl, Claus
    SERVICE-ORIENTED AND CLOUD COMPUTING, (ESOCC 2016), 2016, 9846 : 152 - 167
  • [32] Fuzzy Q-learning obstacle avoidance algorithm of humanoid robot in unknown environment
    Wen, Shuhuan
    Chen, Jianhua
    Li, Zhen
    Rad, Ahmad B.
    Othman, Kamal Mohammed
    2018 37TH CHINESE CONTROL CONFERENCE (CCC), 2018, : 5186 - 5190
  • [33] Analysis and Detection of DDoS Attacks on Cloud Computing Environment using Machine Learning Techniques
    Wani, Abdul Raoof
    Rana, Q. P.
    Saxena, U.
    Pandey, Nitin
    PROCEEDINGS 2019 AMITY INTERNATIONAL CONFERENCE ON ARTIFICIAL INTELLIGENCE (AICAI), 2019, : 870 - 875
  • [34] SDMTA: Attack Detection and Mitigation Mechanism for DDoS Vulnerabilities in Hybrid Cloud Environment
    Kautish, Sandeep
    Reyana, A.
    Vidyarthi, Ankit
    IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2022, 18 (09) : 6455 - 6463
  • [35] A method of DDoS attack detection using HTTP packet pattern and rule engine in cloud computing environment
    Choi, Junho
    Choi, Chang
    Ko, Byeongkyu
    Kim, Pankoo
    SOFT COMPUTING, 2014, 18 (09) : 1697 - 1703
  • [36] A method of DDoS attack detection using HTTP packet pattern and rule engine in cloud computing environment
    Junho Choi
    Chang Choi
    Byeongkyu Ko
    Pankoo Kim
    Soft Computing, 2014, 18 : 1697 - 1703
  • [37] Privacy-preserving Decision Making Based on Q-Learning in Cloud Computing
    Zhou, Zhipeng
    Dong, Chenyu
    Mo, Donger
    Zheng, Peijia
    2022 IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS, TRUSTCOM, 2022, : 727 - 732
  • [38] Optimized multi-objective Q-learning with enhanced beetle swarm optimization based scientific workflows scheduling on cloud computing environment
    Nivethithai, S.
    Hariharan, B.
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2023, 35 (01)
  • [39] Machine Learning Based DDoS Attack Detection
    Ajeetha, G.
    Priya, Madhu G.
    2019 INNOVATIONS IN POWER AND ADVANCED COMPUTING TECHNOLOGIES (I-PACT), 2019,
  • [40] Autonomous Navigation based on a Q-learning algorithm for a Robot in a Real Environment
    Strauss, Clement
    Sahin, Ferat
    2008 IEEE INTERNATIONAL CONFERENCE ON SYSTEM OF SYSTEMS ENGINEERING (SOSE), 2008, : 361 - 365