Real-Time Detection Schemes for Memory DoS (M-DoS) Attacks on Cloud Computing Applications

被引:4
|
作者
Islam, Umar [1 ]
Al-Atawi, Abdullah [2 ]
Alwageed, Hathal Salamah [3 ]
Ahsan, Muhammad [4 ]
Awwad, Fuad A. [5 ]
Abonazel, Mohamed R. [6 ]
机构
[1] IQRA Natl Univ, Dept Comp Sci, Swat Campus, Khyber Pakhtunkhwa 19220, Pakistan
[2] Univ Tabuk, Appl Coll, Dept Comp Sci, Tabuk 47512, Saudi Arabia
[3] Jouf Univ, Coll Comp & Informat Sci, Sakaka 72388, Saudi Arabia
[4] Silesian Tech Univ, Dept Measurements & Control Syst, PL-44100 Gliwice, Poland
[5] King Saud Univ, Coll Business Adm, Dept Quantitat Anal, Riyadh 11587, Saudi Arabia
[6] Cairo Univ, Fac Grad Studies Stat Res, Dept Appl Stat & Econometr, Giza 12613, Egypt
关键词
DDOS; MDOS; cloud computing; memory attacks; ML; DL; DDOS ATTACKS;
D O I
10.1109/ACCESS.2023.3290910
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Memory Denial of Service (M-DoS) attacks refer to a class of cyber-attacks that aim to exhaust the memory resources of a system, rendering it unavailable to legitimate users. This type of attack is particularly dangerous in cloud computing environments, where multiple users share the same resources. Detection and mitigation of M-DoS attacks in real-time is a challenging task, as they often involve a large number of low-rate requests, making it difficult to distinguish them from legitimate traffic. Several real-time detection schemes have been proposed to identify and mitigate M-DoS attacks in cloud computing environments. These schemes can be broadly classified into two categories: signature-based and anomaly-based detection. Signature-based detection methods rely on the identification of specific patterns or characteristics of known M-DoS attack techniques, while anomaly-based detection methods identify abnormal behaviour that deviates from the normal pattern of usage. This study presents a hybrid model for real-time detection of cloud and MDOS attacks using SVM-KNN-LR. The dataset used in this study was collected from various sources and pre-processed to extract relevant features for attack detection. A feature selection process was also applied to identify the most important features for attack detection. The hybrid model achieved an accuracy of 96%, outperforming other individual models such as SVM, KNN, LR, Naive Bayes, Decision Trees, Extra Trees, Bagging Trees, and Random Forests. Confusion matrices were also used to evaluate the performance of each model. In the discussion section, we examined the performance of the hybrid model in detecting MDOS attacks and found that it had a high precision score of 0.97. However, the recall score was lower at 0.87, indicating that the model was not able to detect all instances of MDOS attacks.
引用
收藏
页码:74641 / 74656
页数:16
相关论文
共 50 条
  • [31] Techniques to Detect DoS and DDoS Attacks and an Introduction of a Mobile Agent System to Enhance it in Cloud Computing
    Saidi, Abdelali
    Bendriss, Elmehdi
    Kartit, Ali
    El Marraki, Mohamed
    INTERNATIONAL JOURNAL OF INTERACTIVE MULTIMEDIA AND ARTIFICIAL INTELLIGENCE, 2017, 4 (03): : 75 - 78
  • [32] A NEW MULTIPROCESSING TECHNIQUE BRINGS DOS TO REAL-TIME CONTROL
    DAVIDSON, R
    COMPUTER DESIGN, 1992, 31 (02): : 96 - 96
  • [33] Artificial Intelligence Based Real Time Packet Analysing to Detect DOS Attacks
    Makineedi, Sai Harsh
    Chowdhury, Soumya
    Manivannan, Vaidhehi
    THIRD INTERNATIONAL CONFERENCE ON IMAGE PROCESSING AND CAPSULE NETWORKS (ICIPCN 2022), 2022, 514 : 305 - 320
  • [34] Delays Have Dangerous Ends: Slow HTTP/2 DoS Attacks Into the Wild and Their Real-Time Detection Using Event Sequence Analysis
    Tripathi, Nikhil
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2024, 21 (03) : 1244 - 1256
  • [35] Detection of DoS attacks in cloud networks using intelligent rule based classification system
    Rakesh Rajendran
    S. V. N. Santhosh Kumar
    Yogesh Palanichamy
    Kannan Arputharaj
    Cluster Computing, 2019, 22 : 423 - 434
  • [36] Detection of DoS attacks in cloud networks using intelligent rule based classification system
    Rajendran, Rakesh
    Kumar, S. V. N. Santhosh
    Palanichamy, Yogesh
    Arputharaj, Kannan
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2019, 22 (Suppl 1): : 423 - 434
  • [37] A Reliable Real-Time Slow DoS Detection Framework for Resource-Constrained IoT Networks
    Reed, Andy
    Dooley, Laurence S.
    Mostefaoui, Soraya Kouadri
    2021 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2021,
  • [38] Cooperative Control of Air-Ground Swarms Under DoS Attacks via Cloud-Fog Computing
    Li, Jiacheng
    Yu, Dengxiu
    Ma, Wenhui
    Liu, Jason J. R.
    Liu, Yan-Jun
    IEEE TRANSACTIONS ON NETWORK SCIENCE AND ENGINEERING, 2024, 11 (05): : 4278 - 4292
  • [39] Fault Tolerance in Real-Time Cloud Computing
    Abeni, Luca
    Andreoli, Remo
    Gustafsson, Harald
    Mini, Raquel
    Cucinotta, Tommaso
    2023 IEEE 26TH INTERNATIONAL SYMPOSIUM ON REAL-TIME DISTRIBUTED COMPUTING, ISORC, 2023, : 170 - 175
  • [40] Adaptive Computing in Real-Time Applications
    Janssen, Benedikt
    Schwiegelshohn, Fynn
    Huebner, Michael
    2015 IEEE 13TH INTERNATIONAL NEW CIRCUITS AND SYSTEMS CONFERENCE (NEWCAS), 2015,