DDoS Attacks Detection in Cloud Computing Using ANN and Imperialistic Competitive Algorithm

Author(s):  
Gopal Singh Kushwah ◽  
Virender Ranga
2019 ◽  
Vol 2019 (2) ◽  
pp. 80-90 ◽  
Author(s):  
Mugunthan S. R.

The fundamental advantage of the cloud environment is its instant scalability in rendering the service according to the various demands. The recent technological growth in the cloud computing makes it accessible to people from everywhere at any time. Multitudes of user utilizes the cloud platform for their various needs and store their complete details that are personnel as well as confidential in the cloud architecture. The storage of the confidential information makes the cloud architecture attractive to its hackers, who aim in misusing the confidential/secret information’s. The misuse of the services and the resources of the cloud architecture has become a common issue in the day to day usage due to the DDOS (distributed denial of service) attacks. The DDOS attacks are highly mature and continue to grow at a high speed making the detecting and the counter measures a challenging task. So the paper uses the soft computing based autonomous detection for the Low rate-DDOS attacks in the cloud architecture. The proposed method utilizes the hidden Markov Model for observing the flow in the network and the Random forest in classifying the detected attacks from the normal flow. The proffered method is evaluated to measure the performance improvement attained in terms of the Recall, Precision, specificity, accuracy and F-measure.


Author(s):  
Baldev Singh ◽  
Surya Narayan Panda

Cloud computing environment is very much malicious intrusion prone hence cloud security is very vital. Existing network security mechanisms face new challenges in the cloud such as DDOS attacks, virtual machine intrusion attacks and malicious user activities. This chapter includes brief introduction about cloud computing, concept of virtualization, cloud security, various DDOS attacks, tools to run these attacks & various techniques to detect these attacks, review of threshold methods used for detection of DDOS attacks & abnormal network behavior and proposed dynamic threshold based algorithmic approach. Although various cloud security measures are prevailing to avoid virtual machine attacks and malicious user activities but these are not foolproof. Hence, new security methods are required to increase users' level of trust in clouds. By scrubbing traffic at major Internet points and backbone connection, a defense line is created for mitigation of DDOS attacks. Dynamic threshold algorithm based approach is proposed as a proactive approach to detect DDOS attacks for achieving secure cloud environment.


2019 ◽  
pp. 1952-1983
Author(s):  
Pourya Shamsolmoali ◽  
Masoumeh Zareapoor ◽  
M.Afshar Alam

Distributed Denial of Service (DDoS) attacks have become a serious attack for internet security and Cloud Computing environment. This kind of attacks is the most complex form of DoS (Denial of Service) attacks. This type of attack can simply duplicate its source address, such as spoofing attack, which defending methods do not able to disguises the real location of the attack. Therefore, DDoS attack is the most significant challenge for network. In this chapter we present different aspect of security in Cloud Computing, mostly we concentrated on DDOS Attacks. The Authors illustrated all types of Dos Attacks and discussed the most effective detection methods.


2019 ◽  
Vol 2019 ◽  
pp. 1-1
Author(s):  
Jieren Cheng ◽  
Mengyang Li ◽  
Xiangyan Tang ◽  
Victor S. Sheng ◽  
Yifu Liu ◽  
...  

2019 ◽  
Vol 76 (8) ◽  
pp. 6302-6329 ◽  
Author(s):  
Seyedeh Monireh Ggasemnezhad Kashikolaei ◽  
Ali Asghar Rahmani Hosseinabadi ◽  
Behzad Saemi ◽  
Morteza Babazadeh Shareh ◽  
Arun Kumar Sangaiah ◽  
...  

2017 ◽  
Vol 15 (3) ◽  
pp. 551-560 ◽  
Author(s):  
M. Hasanipanah ◽  
H. Bakhshandeh Amnieh ◽  
H. Khamesi ◽  
D. Jahed Armaghani ◽  
S. Bagheri Golzar ◽  
...  

Sign in / Sign up

Export Citation Format

Share Document