Abstract
The fundamental advantage of the cloud environment is its instant scalability in rendering the service according to the various demands. The recent technological growth in the cloud computing makes it accessible to people from everywhere at any time. Multitudes of user utilizes the cloud platform for their various needs and store their complete details that are personnel as well as confidential in the cloud architecture. The storage of the confidential information makes the cloud architecture attractive to its hackers, who aim in misusing the confidential/secret information's. The misuse of the services and the resources of the cloud architecture has become a common issue in the day to day usage due to the DDOS (distributed denial of service) attacks. The DDOS attacks are highly mature and continue to grow at a high speed making the detecting and the counter measures a challenging task. So the paper uses the soft computing based autonomous detection for the Low rate-DDOS attacks in the cloud architecture. The proposed method utilizes the hidden Markov Model for observing the flow in the network and the Random forest in classifying the detected attacks from the normal flow. The proffered method is evaluated to measure the performance improvement attained in terms of the Recall, Precision, specificity, accuracy and F-measure.
References
- Bravo, Silvia, and David Mauricio. "Systematic review of aspects of DDoS attacks detection." Indonesian Journal of Electrical Engineering and Computer Science 14, no. 1 (2019): 162-176.
- Behal, Sunny, and Krishan Kumar. "Characterization and Comparison of DDoS Attack Tools and Traffic Generators: A Review." IJ Network Security 19, no. 3 (2017): 383-393.
- Dong, Shi, Khushnood Abbas, and Raj Jain. "A survey on distributed denial of service (DDoS) attacks in SDN and cloud computing environments." IEEE Access 7 (2019): 80813-80828.
- Sherazi, Hafiz Husnain Raza, Razi Iqbal, Farooq Ahmad, Zuhaib Ashfaq Khan, and Muhammad Hasanain Chaudary. "DDoS attack detection: A key enabler for sustainable communication in internet of vehicles." Sustainable Computing: Informatics and Systems 23 (2019): 13-20.
- Kumar, P. Arun Raj, and S. Selvakumar. "Distributed denial of service attack detection using an ensemble of neural classifier." Computer Communications 34, no. 11 (2011): 1328-1341.
- Devi, BS Kiruthika, and T. Subbulakshmi. "A comparative analysis of security methods for DDoS attacks in the cloud computing environment." Indian Journal of Science and Technology 9, no. 34 (2016): 1-7.
- Zekri, Marwane, Said El Kafhali, Noureddine Aboutabit, and Youssef Saadi. "DDoS attack detection using machine learning techniques in cloud computing environments." In 2017 3rd International Conference of Cloud Computing Technologies and Applications (CloudTech), pp. 1-7. IEEE, 2017.
- Bhadauria, Rohit, Rituparna Chaki, Nabendu Chaki, and Sugata Sanyal. "A survey on security issues in cloud computing." arXiv preprint arXiv:1109.5388 (2011): 1-15.
- Singh, Ravinder, Kashish Thakur, Gurpreet Singh, and Shaina Gupta. "Prevention of IP spoofing attack in cyber using artificial Bee colony and artificial neural network." In Proceedings of the Third International Conference on Advanced Informatics for Computing Research, p. 16. ACM, 2019.
- Agrawal, Neha, and Shashikala Tapaswi. "Defense Mechanisms against DDoS Attacks in a Cloud Computing Environment: State-of-the-Art and Research Challenges." IEEE Communications Surveys & Tutorials (2019).
- Verma, Priyanka, Shashikala Tapaswi, and W. Wilfred Godfrey. "An Adaptive Threshold-Based Attribute Selection to Classify Requests Under DDoS Attack in Cloud-Based Systems." Arabian Journal for Science and Engineering (2019): 1-22.
- Atif, Muhammad, Siddique Latif, Rizwan Ahmad, Adnan K. Kiani, Junaid Qadir, Adeel Baig, Hisao Ishibuchi, and Waseem Abbas. "Soft Computing Techniques for Dependable Cyber-Physical Systems." IEEE Access (2019).
- Lara, Pablo Daniel Marcillo, Daniel Alejandro Maldonado-Ruiz, Santiago Daniel Arrais Díaz, Lorena Isabel Barona López, and Ángel Leonardo Valdivieso Caraguay. "Trends on Computer Security: Cryptography, User Authentication, Denial of Service and Intrusion Detection." arXiv preprint arXiv:1903.08052 (2019).
- Ko, Ili, Desmond Chambers, and Enda Barrett. "Feature dynamic deep learning approach for DDoS mitigation within the ISP domain." International Journal of Information Security (2019): 1-18.
- Samaria, Ferdinando, and Frank Fallside. Face identification and feature extraction using hidden markov models. Olivetti Research Limited, 1993.
- Rényi, Alfred. Foundations of probability. Courier Corporation, 2007.
- Wani, Abdul Raoof, Q. P. Rana, U. Saxena, and Nitin Pandey. "Analysis and Detection of DDoS Attacks on Cloud Computing Environment using Machine Learning Techniques." In 2019 Amity International Conference on Artificial Intelligence (AICAI), pp. 870-875. IEEE, 2019.
