FQBDDA: fuzzy Q-learning based DDoS attack detection algorithm for cloud computing environment

被引:1
|
作者
Kumar A. [1 ]
Dutta S. [1 ]
Pranav P. [1 ]
机构
[1] Department of Computer Science and Engineering, Birla Institute of Technology, Mesra, Ranchi
关键词
Cloud computing; DDoS attack; Fuzzy logic; Fuzzy Q-learning; Optimization; Q-learning; Security;
D O I
10.1007/s41870-023-01509-y
中图分类号
学科分类号
摘要
With on-demand resources, flexibility, scalability, dynamic nature, and cheaper maintenance costs, cloud computing technology has revolutionized the Information Technology sector, and almost everyone using the internet relies in some manner on the use of cloud services. Distributed denial of service (DDoS) attack blocks the services by flooding high or low volumes of malicious traffic to exhaust the servers, resources, etc. of the Cloud environment. In today’s era, they are challenging to detect because of low-rate traffic and its hidden approach in the cloud. Studying all DDoS attacks with their possible solution is essential to protect the cloud computing environment. In this paper, we have proposed a fuzzy Q learning algorithm and Chebyshev’s Inequality principle to counter the problem of DDoS attacks. The proposed framework follows the inclusion of Chebyshev’s inequality for workload prediction in the cloud in the analysis phase and fuzzy Q-learning in the planning phase. Experimental results prove that our proposed fuzzy Q-learning based DDoS attack detection algorithm for cloud computing environment (FQBDDA) model prevent DDoS attack. © The Author(s), under exclusive licence to Bharati Vidyapeeth's Institute of Computer Applications and Management 2023.
引用
收藏
页码:891 / 900
页数:9
相关论文
共 50 条
  • [41] An Anomaly Detection Algorithm based on Online Learning Lagrangian SVM for Cloud Computing Environment
    Wang, GuiPing
    Li, Ren
    Yuan, XiaoYi
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2016, 10 (12): : 173 - 185
  • [42] A DDoS Detection Approach Based on CNN in Cloud Computing
    Yang, Zhongxue
    Qin, Xiaolin
    Li, Wenrui
    Yang, Yingjie
    APPLIED SCIENCE, MATERIALS SCIENCE AND INFORMATION TECHNOLOGIES IN INDUSTRY, 2014, 513-517 : 579 - 584
  • [43] Implementation of Fuzzy Q-Learning Based on Modular Fuzzy Model and Parallel Structured Learning
    Watanabe, Toshihiko
    2009 IEEE INTERNATIONAL CONFERENCE ON SYSTEMS, MAN AND CYBERNETICS (SMC 2009), VOLS 1-9, 2009, : 1338 - 1344
  • [44] SDN, A Research on SDN Assets and Tools to Defense DDoS Attack in Cloud Computing Environment
    Tamanna, Tasnim
    Fatema, Tasmiah
    Saha, Reepa
    2017 2ND IEEE INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, SIGNAL PROCESSING AND NETWORKING (WISPNET), 2017, : 1670 - 1674
  • [45] DDoS Detection Algorithm Based on Fuzzy Logic
    Ates, Cagatay
    Ozdel, Suleyman
    Anarim, Emin
    2020 28TH SIGNAL PROCESSING AND COMMUNICATIONS APPLICATIONS CONFERENCE (SIU), 2020,
  • [46] NAO robot obstacle avoidance based on fuzzy Q-learning
    Wen, Shuhuan
    Hu, Xueheng
    Li, Zhen
    Lam, Hak Keung
    Sun, Fuchun
    Fang, Bin
    INDUSTRIAL ROBOT-THE INTERNATIONAL JOURNAL OF ROBOTICS RESEARCH AND APPLICATION, 2020, 47 (06): : 801 - 811
  • [47] QLLog: A log anomaly detection method based on Q-learning algorithm
    Duan, Xiaoyu
    Ying, Shi
    Yuan, Wanli
    Cheng, Hailong
    Yin, Xiang
    INFORMATION PROCESSING & MANAGEMENT, 2021, 58 (03)
  • [48] A New Framework for Classification of Distributed Denial of Service (DDOS) Attack in Cloud Computing by Machine Learning Techniques
    Behzadi, Mostafa
    Mahmod, Ramlan
    Barati, Mehdi
    Abdullah, Azizol Bin Hj
    Noura, Mahda
    ADVANCED SCIENCE LETTERS, 2014, 20 (01) : 175 - 178
  • [49] An Efficient DDoS TCP Flood Attack Detection and Prevention System in a Cloud Environment
    Sahi, Aqeel
    Lai, David
    Li, Yan
    Diykh, Mohammed
    IEEE ACCESS, 2017, 5 : 6036 - 6048
  • [50] Dynamic Attack Detection in IoT Networks: An Ensemble Learning Approach With Q-Learning and Explainable AI
    Turaka, Padmasri
    Panigrahy, Saroj Kumar
    IEEE ACCESS, 2024, 12 : 161925 - 161940