Real-Time Detection Schemes for Memory DoS (M-DoS) Attacks on Cloud Computing Applications

被引:4
|
作者
Islam, Umar [1 ]
Al-Atawi, Abdullah [2 ]
Alwageed, Hathal Salamah [3 ]
Ahsan, Muhammad [4 ]
Awwad, Fuad A. [5 ]
Abonazel, Mohamed R. [6 ]
机构
[1] IQRA Natl Univ, Dept Comp Sci, Swat Campus, Khyber Pakhtunkhwa 19220, Pakistan
[2] Univ Tabuk, Appl Coll, Dept Comp Sci, Tabuk 47512, Saudi Arabia
[3] Jouf Univ, Coll Comp & Informat Sci, Sakaka 72388, Saudi Arabia
[4] Silesian Tech Univ, Dept Measurements & Control Syst, PL-44100 Gliwice, Poland
[5] King Saud Univ, Coll Business Adm, Dept Quantitat Anal, Riyadh 11587, Saudi Arabia
[6] Cairo Univ, Fac Grad Studies Stat Res, Dept Appl Stat & Econometr, Giza 12613, Egypt
关键词
DDOS; MDOS; cloud computing; memory attacks; ML; DL; DDOS ATTACKS;
D O I
10.1109/ACCESS.2023.3290910
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Memory Denial of Service (M-DoS) attacks refer to a class of cyber-attacks that aim to exhaust the memory resources of a system, rendering it unavailable to legitimate users. This type of attack is particularly dangerous in cloud computing environments, where multiple users share the same resources. Detection and mitigation of M-DoS attacks in real-time is a challenging task, as they often involve a large number of low-rate requests, making it difficult to distinguish them from legitimate traffic. Several real-time detection schemes have been proposed to identify and mitigate M-DoS attacks in cloud computing environments. These schemes can be broadly classified into two categories: signature-based and anomaly-based detection. Signature-based detection methods rely on the identification of specific patterns or characteristics of known M-DoS attack techniques, while anomaly-based detection methods identify abnormal behaviour that deviates from the normal pattern of usage. This study presents a hybrid model for real-time detection of cloud and MDOS attacks using SVM-KNN-LR. The dataset used in this study was collected from various sources and pre-processed to extract relevant features for attack detection. A feature selection process was also applied to identify the most important features for attack detection. The hybrid model achieved an accuracy of 96%, outperforming other individual models such as SVM, KNN, LR, Naive Bayes, Decision Trees, Extra Trees, Bagging Trees, and Random Forests. Confusion matrices were also used to evaluate the performance of each model. In the discussion section, we examined the performance of the hybrid model in detecting MDOS attacks and found that it had a high precision score of 0.97. However, the recall score was lower at 0.87, indicating that the model was not able to detect all instances of MDOS attacks.
引用
收藏
页码:74641 / 74656
页数:16
相关论文
共 50 条
  • [21] Machine Learning Algorithms for DoS and DDoS Cyberattacks Detection in Real-time Environment
    Berei, Ethan
    Khan, M. Ajmal
    Oun, Ahmed
    2024 IEEE 21ST CONSUMER COMMUNICATIONS & NETWORKING CONFERENCE, CCNC, 2024, : 1048 - 1049
  • [22] USING PC-DOS FOR REAL-TIME CONTROL
    WIATROWSKI, CA
    I&CS-CONTROL TECHNOLOGY FOR ENGINEERS AND ENGINEERING MANAGEMENT, 1986, 59 (09): : 51 - 54
  • [23] REAL-TIME CLOCKS AND PC-DOS 20
    BROADWELL, DK
    BYTE, 1984, 9 (01): : 442 - 450
  • [24] Generating Synthetic Data for Real World Detection of DoS Attacks in the IoT
    Arnaboldi, Luca
    Morisset, Charles
    SOFTWARE TECHNOLOGIES: APPLICATIONS AND FOUNDATIONS, 2018, 11176 : 130 - 145
  • [25] A protocol-free detection against cloud oriented reflection DoS attacks
    Xiao, Le
    Wei, Wei
    Yang, Weidong
    Shen, Yulong
    Wu, Xianglin
    SOFT COMPUTING, 2017, 21 (13) : 3713 - 3721
  • [26] A protocol-free detection against cloud oriented reflection DoS attacks
    Le Xiao
    Wei Wei
    Weidong Yang
    Yulong Shen
    Xianglin Wu
    Soft Computing, 2017, 21 : 3713 - 3721
  • [27] Real-time CBR-agent with a mixture of experts in the reuse stage to classify and detect DoS attacks
    Pinzon, Cristian I.
    De Paz, Juan F.
    Navarro, Marti
    Bajo, Javier
    Julian, Vicente
    Corchado, Juan. M.
    APPLIED SOFT COMPUTING, 2011, 11 (07) : 4384 - 4398
  • [28] An Accurate and Real-Time Detection Method for Concealed Slow HTTP DoS in Backbone Network
    Chen, Jinfeng
    Wu, Hua
    Wang, Suyue
    Cheng, Guang
    Hu, Xiaoyan
    ICT SYSTEMS SECURITY AND PRIVACY PROTECTION, IFIP SEC 2023, 2024, 679 : 207 - 221
  • [29] The Guardian Node Slow DoS Detection Model for Real-Time Application in IoT Networks
    Reed, Andy
    Dooley, Laurence
    Mostefaoui, Soraya Kouadri
    SENSORS, 2024, 24 (17)
  • [30] Cloud vs Fog Computing - Scheduling Real-Time Applications
    Karatza, Helen
    2020 9TH MEDITERRANEAN CONFERENCE ON EMBEDDED COMPUTING (MECO), 2020, : 2 - 2