Real-Time Detection Schemes for Memory DoS (M-DoS) Attacks on Cloud Computing Applications

被引:4
|
作者
Islam, Umar [1 ]
Al-Atawi, Abdullah [2 ]
Alwageed, Hathal Salamah [3 ]
Ahsan, Muhammad [4 ]
Awwad, Fuad A. [5 ]
Abonazel, Mohamed R. [6 ]
机构
[1] IQRA Natl Univ, Dept Comp Sci, Swat Campus, Khyber Pakhtunkhwa 19220, Pakistan
[2] Univ Tabuk, Appl Coll, Dept Comp Sci, Tabuk 47512, Saudi Arabia
[3] Jouf Univ, Coll Comp & Informat Sci, Sakaka 72388, Saudi Arabia
[4] Silesian Tech Univ, Dept Measurements & Control Syst, PL-44100 Gliwice, Poland
[5] King Saud Univ, Coll Business Adm, Dept Quantitat Anal, Riyadh 11587, Saudi Arabia
[6] Cairo Univ, Fac Grad Studies Stat Res, Dept Appl Stat & Econometr, Giza 12613, Egypt
关键词
DDOS; MDOS; cloud computing; memory attacks; ML; DL; DDOS ATTACKS;
D O I
10.1109/ACCESS.2023.3290910
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Memory Denial of Service (M-DoS) attacks refer to a class of cyber-attacks that aim to exhaust the memory resources of a system, rendering it unavailable to legitimate users. This type of attack is particularly dangerous in cloud computing environments, where multiple users share the same resources. Detection and mitigation of M-DoS attacks in real-time is a challenging task, as they often involve a large number of low-rate requests, making it difficult to distinguish them from legitimate traffic. Several real-time detection schemes have been proposed to identify and mitigate M-DoS attacks in cloud computing environments. These schemes can be broadly classified into two categories: signature-based and anomaly-based detection. Signature-based detection methods rely on the identification of specific patterns or characteristics of known M-DoS attack techniques, while anomaly-based detection methods identify abnormal behaviour that deviates from the normal pattern of usage. This study presents a hybrid model for real-time detection of cloud and MDOS attacks using SVM-KNN-LR. The dataset used in this study was collected from various sources and pre-processed to extract relevant features for attack detection. A feature selection process was also applied to identify the most important features for attack detection. The hybrid model achieved an accuracy of 96%, outperforming other individual models such as SVM, KNN, LR, Naive Bayes, Decision Trees, Extra Trees, Bagging Trees, and Random Forests. Confusion matrices were also used to evaluate the performance of each model. In the discussion section, we examined the performance of the hybrid model in detecting MDOS attacks and found that it had a high precision score of 0.97. However, the recall score was lower at 0.87, indicating that the model was not able to detect all instances of MDOS attacks.
引用
收藏
页码:74641 / 74656
页数:16
相关论文
共 50 条
  • [1] Impact of Memory DoS Attacks on Cloud Applications and Real-Time Detection Schemes
    Li, Zhuozhao
    Sen, Tanmoy
    Shen, Haiying
    Chuah, Mooi Choo
    PROCEEDINGS OF THE 49TH INTERNATIONAL CONFERENCE ON PARALLEL PROCESSING, ICPP 2020, 2020,
  • [2] Impact of Memory DoS Attacks on Cloud Applications and Real-Time Detection Schemes
    Li, Zhuozhao
    Sen, Tanmoy
    Shen, Haiying
    Chuah, Mooi Choo
    2020 IEEE 40TH INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS (ICDCS), 2020, : 1191 - 1192
  • [3] A Study on the Impact of Memory DoS Attacks on Cloud Applications and Exploring Real-Time Detection Schemes
    Li, Zhuozhao
    Sen, Tanmoy
    Shen, Haiying
    Chuah, Mooi Choo
    IEEE-ACM TRANSACTIONS ON NETWORKING, 2022, 30 (04) : 1644 - 1658
  • [4] DoS Attacks on Your Memory in the Cloud
    Zhang, Tianwei
    Zhang, Yinqian
    Lee, Ruby B.
    PROCEEDINGS OF THE 2017 ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (ASIA CCS'17), 2017, : 253 - 265
  • [5] Real-time Detection and Localization of DoS Attacks in NoC based SoCs
    Charles, Subodha
    Lyu, Yangdi
    Mishra, Prabhat
    2019 DESIGN, AUTOMATION & TEST IN EUROPE CONFERENCE & EXHIBITION (DATE), 2019, : 1160 - 1165
  • [6] A survey and taxonomy of DoS attacks in cloud computing
    Masdari, Mohammad
    Jalali, Marzie
    SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (16) : 3724 - 3751
  • [7] Analysis and Detection of DoS Attacks in Cloud Computing by Using QSE Algorithm
    Reddy, Pallavali Radha Krishna
    Bouzefrane, Samia
    2014 IEEE INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE COMPUTING AND COMMUNICATIONS, 2014 IEEE 6TH INTL SYMP ON CYBERSPACE SAFETY AND SECURITY, 2014 IEEE 11TH INTL CONF ON EMBEDDED SOFTWARE AND SYST (HPCC,CSS,ICESS), 2014, : 1089 - 1096
  • [8] Real-Time Detection and Localization of Distributed DoS Attacks in NoC-Based SoCs
    Charles, Subodha
    Lyu, Yangdi
    Mishra, Prabhat
    IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, 2020, 39 (12) : 4510 - 4523
  • [9] Cloud security defence to protect cloud computing against HTTP-DoS and XML-DoS attacks
    Chonka, Ashley
    Xiang, Yang
    Zhou, Wanlei
    Bonti, Alessio
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2011, 34 (04) : 1097 - 1107
  • [10] Real-Time Detection of DoS Attacks in IEEE 802.11p Using Fog Computing for a Secure Intelligent Vehicular Network
    Erskine, Samuel Kofi
    Elleithy, Khaled M.
    ELECTRONICS, 2019, 8 (07)