Real-Time Detection Schemes for Memory DoS (M-DoS) Attacks on Cloud Computing Applications

被引:4
|
作者
Islam, Umar [1 ]
Al-Atawi, Abdullah [2 ]
Alwageed, Hathal Salamah [3 ]
Ahsan, Muhammad [4 ]
Awwad, Fuad A. [5 ]
Abonazel, Mohamed R. [6 ]
机构
[1] IQRA Natl Univ, Dept Comp Sci, Swat Campus, Khyber Pakhtunkhwa 19220, Pakistan
[2] Univ Tabuk, Appl Coll, Dept Comp Sci, Tabuk 47512, Saudi Arabia
[3] Jouf Univ, Coll Comp & Informat Sci, Sakaka 72388, Saudi Arabia
[4] Silesian Tech Univ, Dept Measurements & Control Syst, PL-44100 Gliwice, Poland
[5] King Saud Univ, Coll Business Adm, Dept Quantitat Anal, Riyadh 11587, Saudi Arabia
[6] Cairo Univ, Fac Grad Studies Stat Res, Dept Appl Stat & Econometr, Giza 12613, Egypt
关键词
DDOS; MDOS; cloud computing; memory attacks; ML; DL; DDOS ATTACKS;
D O I
10.1109/ACCESS.2023.3290910
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Memory Denial of Service (M-DoS) attacks refer to a class of cyber-attacks that aim to exhaust the memory resources of a system, rendering it unavailable to legitimate users. This type of attack is particularly dangerous in cloud computing environments, where multiple users share the same resources. Detection and mitigation of M-DoS attacks in real-time is a challenging task, as they often involve a large number of low-rate requests, making it difficult to distinguish them from legitimate traffic. Several real-time detection schemes have been proposed to identify and mitigate M-DoS attacks in cloud computing environments. These schemes can be broadly classified into two categories: signature-based and anomaly-based detection. Signature-based detection methods rely on the identification of specific patterns or characteristics of known M-DoS attack techniques, while anomaly-based detection methods identify abnormal behaviour that deviates from the normal pattern of usage. This study presents a hybrid model for real-time detection of cloud and MDOS attacks using SVM-KNN-LR. The dataset used in this study was collected from various sources and pre-processed to extract relevant features for attack detection. A feature selection process was also applied to identify the most important features for attack detection. The hybrid model achieved an accuracy of 96%, outperforming other individual models such as SVM, KNN, LR, Naive Bayes, Decision Trees, Extra Trees, Bagging Trees, and Random Forests. Confusion matrices were also used to evaluate the performance of each model. In the discussion section, we examined the performance of the hybrid model in detecting MDOS attacks and found that it had a high precision score of 0.97. However, the recall score was lower at 0.87, indicating that the model was not able to detect all instances of MDOS attacks.
引用
收藏
页码:74641 / 74656
页数:16
相关论文
共 50 条
  • [11] A Survey on DoS Attacks and Detection Schemes in Wireless Mesh Networks
    Anto, Sanam E.
    Seetha, S.
    Kuriakose, Robin K.
    INTERNATIONAL CONFERENCE ON MODELLING OPTIMIZATION AND COMPUTING, 2012, 38 : 2329 - 2336
  • [12] DoS Attacks on Real-Time Media through Indirect Contention-in-Hosts
    Poroor, Jayaraj
    Jayaraman, Bharat
    IEEE INTERNET COMPUTING, 2009, 13 (06) : 22 - 30
  • [13] EXPLOITING ARTIFICIAL IMMUNE SYSTEMS TO DETECT UNKNOWN DoS ATTACKS IN REAL-TIME
    Wang, Dawei
    He, Longtao
    Xue, Yibo
    Dong, Yingfei
    2012 IEEE 2nd International Conference on Cloud Computing and Intelligent Systems (CCIS) Vols 1-3, 2012, : 646 - 650
  • [14] Research of DoS intrusion real-time detection based on danger theory
    Xu Chun
    Chen Xing-shu
    Zhao Hui
    Jiang Yu-ming
    Liu Nian
    Wang Tie-fang
    PROCEEDINGS OF THE FIRST INTERNATIONAL SYMPOSIUM ON DATA, PRIVACY, AND E-COMMERCE, 2007, : 209 - 211
  • [15] REAL-TIME MODELING WITH MS-DOS
    BOWLING, D
    DR DOBBS JOURNAL, 1989, 14 (02): : 26 - &
  • [16] Real Time Detection of MAC Layer DoS Attacks in IEEE 802.11 Wireless Networks
    Dasari, Mallesham
    2017 14TH IEEE ANNUAL CONSUMER COMMUNICATIONS & NETWORKING CONFERENCE (CCNC), 2017, : 939 - 944
  • [17] Taxonomy of DoS and DDoS attacks and desirable defense mechanism in a Cloud computing environment
    Gupta, B. B.
    Badve, Omkar P.
    NEURAL COMPUTING & APPLICATIONS, 2017, 28 (12): : 3655 - 3682
  • [18] Taxonomy of DoS and DDoS attacks and desirable defense mechanism in a Cloud computing environment
    B. B. Gupta
    Omkar P. Badve
    Neural Computing and Applications, 2017, 28 : 3655 - 3682
  • [19] Detection and Prevention of DoS attacks in Software-Defined Cloud Networks
    Rengaraju, Perumalraja
    Ramanan, Raja, V
    Lung, Chung-Horng
    2017 IEEE CONFERENCE ON DEPENDABLE AND SECURE COMPUTING, 2017, : 217 - 223
  • [20] Enhancing IoT device security: CNN-SVM hybrid approach for real-time detection of DoS and DDoS attacks
    Al-Na'amneh, Qais
    Aljaidi, Mohammad
    Nasayreh, Ahmad
    Gharaibeh, Hasan
    Al Mamlook, Rabia Emhamed
    Jaradat, Ameera S.
    Alsarhan, Ayoub
    Samara, Ghassan
    JOURNAL OF INTELLIGENT SYSTEMS, 2024, 33 (01)