Real-Time Detection Schemes for Memory DoS (M-DoS) Attacks on Cloud Computing Applications

被引:4
|
作者
Islam, Umar [1 ]
Al-Atawi, Abdullah [2 ]
Alwageed, Hathal Salamah [3 ]
Ahsan, Muhammad [4 ]
Awwad, Fuad A. [5 ]
Abonazel, Mohamed R. [6 ]
机构
[1] IQRA Natl Univ, Dept Comp Sci, Swat Campus, Khyber Pakhtunkhwa 19220, Pakistan
[2] Univ Tabuk, Appl Coll, Dept Comp Sci, Tabuk 47512, Saudi Arabia
[3] Jouf Univ, Coll Comp & Informat Sci, Sakaka 72388, Saudi Arabia
[4] Silesian Tech Univ, Dept Measurements & Control Syst, PL-44100 Gliwice, Poland
[5] King Saud Univ, Coll Business Adm, Dept Quantitat Anal, Riyadh 11587, Saudi Arabia
[6] Cairo Univ, Fac Grad Studies Stat Res, Dept Appl Stat & Econometr, Giza 12613, Egypt
关键词
DDOS; MDOS; cloud computing; memory attacks; ML; DL; DDOS ATTACKS;
D O I
10.1109/ACCESS.2023.3290910
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Memory Denial of Service (M-DoS) attacks refer to a class of cyber-attacks that aim to exhaust the memory resources of a system, rendering it unavailable to legitimate users. This type of attack is particularly dangerous in cloud computing environments, where multiple users share the same resources. Detection and mitigation of M-DoS attacks in real-time is a challenging task, as they often involve a large number of low-rate requests, making it difficult to distinguish them from legitimate traffic. Several real-time detection schemes have been proposed to identify and mitigate M-DoS attacks in cloud computing environments. These schemes can be broadly classified into two categories: signature-based and anomaly-based detection. Signature-based detection methods rely on the identification of specific patterns or characteristics of known M-DoS attack techniques, while anomaly-based detection methods identify abnormal behaviour that deviates from the normal pattern of usage. This study presents a hybrid model for real-time detection of cloud and MDOS attacks using SVM-KNN-LR. The dataset used in this study was collected from various sources and pre-processed to extract relevant features for attack detection. A feature selection process was also applied to identify the most important features for attack detection. The hybrid model achieved an accuracy of 96%, outperforming other individual models such as SVM, KNN, LR, Naive Bayes, Decision Trees, Extra Trees, Bagging Trees, and Random Forests. Confusion matrices were also used to evaluate the performance of each model. In the discussion section, we examined the performance of the hybrid model in detecting MDOS attacks and found that it had a high precision score of 0.97. However, the recall score was lower at 0.87, indicating that the model was not able to detect all instances of MDOS attacks.
引用
收藏
页码:74641 / 74656
页数:16
相关论文
共 50 条
  • [41] HYDRA - A C-LANGUAGE ENVIRONMENT FOR REAL-TIME DOS MULTITASKING AT THE BEDSIDE
    DEGAETANO, A
    COLEMAN, WP
    PIZZI, R
    TOMASELLA, E
    CASTAGNETO, M
    GRECO, AV
    INTERNATIONAL JOURNAL OF CLINICAL MONITORING AND COMPUTING, 1993, 10 (03): : 147 - 154
  • [42] Real-time Personalized Cardiac Arrhythmia Detection and Diagnosis: A Cloud Computing Architecture
    Chen, Xuhui
    Ji, Jinlong
    Loparo, Kenneth
    Li, Pan
    2017 IEEE EMBS INTERNATIONAL CONFERENCE ON BIOMEDICAL & HEALTH INFORMATICS (BHI), 2017, : 201 - 204
  • [43] Hawkeye: Cloud Computing Based Automated Video Error Detection in Real-Time
    Hasan, Md Mehedi
    Rahman, Tasneem
    Roy, Kaushik
    Ahn, Kiok
    Chae, Oksam
    JOURNAL OF INTERNET TECHNOLOGY, 2017, 18 (01): : 45 - 53
  • [44] Machine Learning Enabled Novel Real-Time IoT Targeted DoS/DDoS Cyber Attack Detection System
    Alabdulatif, Abdullah
    Thilakarathne, Navod Neranjan
    Aashiq, Mohamed
    CMC-COMPUTERS MATERIALS & CONTINUA, 2024, 80 (03): : 3655 - 3683
  • [45] Use of fast-time and real-time simulation in harbour design:: The Dos Bocas case
    Arndal, N
    Yañez, MA
    COASTAL ENGINEERING AND MARINA DEVELOPMENTS, 1999, 3 : 577 - 592
  • [46] Building a Private Cloud Computing and The Analysis against DoS (Denial of Service) attacks Case Study at SMKN 6 Jakarta
    Bahaweres, Rizal Broer
    Sharif, Johan
    Alaydrus, Mudrik
    2016 4TH INTERNATIONAL CONFERENCE ON CYBER AND IT SERVICE MANAGEMENT, 2016, : 233 - 238
  • [47] Energy Aware Scheduling of Real-Time and Non Real-Time Tasks on Cloud Processors (Green Cloud Computing)
    Reddy, Sonika P.
    Chandan, H. K. S.
    2014 INTERNATIONAL CONFERENCE ON INFORMATION COMMUNICATION AND EMBEDDED SYSTEMS (ICICES), 2014,
  • [48] Scheduling for Cloud-Based Computing Systems to Support Soft Real-Time Applications
    Du, Yuhuan
    de Veciana, Gustavo
    IEEE INFOCOM 2016 - THE 35TH ANNUAL IEEE INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATIONS, 2016,
  • [49] Networking-computing resource allocation for hard real-time Green Cloud applications
    20153001072859
    (1) Sapienza University, Rome, Italy; (2) University of Calabria, Italy, 1600, Comite Gestor da Internet no Brasil (CGI.br); Coordenacao de Aperfeicoamento de Pessoal de Nivel Superior (Capes); et al.; Fundacao Carlos Chagas Filho de Amparo a Pesquisa do Estado do Rio de Janeiro (FAPERJ); Globo.com; Nucleo de Informacao e Coordenacao do Ponto BR (NIC.br) (IEEE Computer Society):
  • [50] Networking-Computing resource allocation for Hard Real-Time Green Cloud applications
    Cordeschi, N.
    Amendola, D.
    De Rango, F.
    Baccarelli, E.
    2014 IFIP WIRELESS DAYS (WD), 2014,