FQBDDA: fuzzy Q-learning based DDoS attack detection algorithm for cloud computing environment

被引:1
|
作者
Kumar A. [1 ]
Dutta S. [1 ]
Pranav P. [1 ]
机构
[1] Department of Computer Science and Engineering, Birla Institute of Technology, Mesra, Ranchi
关键词
Cloud computing; DDoS attack; Fuzzy logic; Fuzzy Q-learning; Optimization; Q-learning; Security;
D O I
10.1007/s41870-023-01509-y
中图分类号
学科分类号
摘要
With on-demand resources, flexibility, scalability, dynamic nature, and cheaper maintenance costs, cloud computing technology has revolutionized the Information Technology sector, and almost everyone using the internet relies in some manner on the use of cloud services. Distributed denial of service (DDoS) attack blocks the services by flooding high or low volumes of malicious traffic to exhaust the servers, resources, etc. of the Cloud environment. In today’s era, they are challenging to detect because of low-rate traffic and its hidden approach in the cloud. Studying all DDoS attacks with their possible solution is essential to protect the cloud computing environment. In this paper, we have proposed a fuzzy Q learning algorithm and Chebyshev’s Inequality principle to counter the problem of DDoS attacks. The proposed framework follows the inclusion of Chebyshev’s inequality for workload prediction in the cloud in the analysis phase and fuzzy Q-learning in the planning phase. Experimental results prove that our proposed fuzzy Q-learning based DDoS attack detection algorithm for cloud computing environment (FQBDDA) model prevent DDoS attack. © The Author(s), under exclusive licence to Bharati Vidyapeeth's Institute of Computer Applications and Management 2023.
引用
收藏
页码:891 / 900
页数:9
相关论文
共 50 条
  • [31] A method of DDoS attack detection using HTTP packet pattern and rule engine in cloud computing environment
    Junho Choi
    Chang Choi
    Byeongkyu Ko
    Pankoo Kim
    Soft Computing, 2014, 18 : 1697 - 1703
  • [32] DeepDefend: A comprehensive framework for DDoS attack detection and prevention in cloud computing
    Ouhssini, Mohamed
    Afdel, Karim
    Agherrabi, Elhafed
    Akouhar, Mohamed
    Abarda, Abdallah
    JOURNAL OF KING SAUD UNIVERSITY-COMPUTER AND INFORMATION SCIENCES, 2024, 36 (02)
  • [33] Intent-Based Allocation of Cloud Computing Resources Using Q-Learning
    Kokkinos, Panagiotis
    Varvarigos, Andreas
    Konidaris, Dimitrios
    Tserpes, Konstantinos
    ALGORITHMIC ASPECTS OF CLOUD COMPUTING, ALGOCLOUD 2023, 2024, 14053 : 184 - 196
  • [34] Privacy-preserving Decision Making Based on Q-Learning in Cloud Computing
    Zhou, Zhipeng
    Dong, Chenyu
    Mo, Donger
    Zheng, Peijia
    2022 IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS, TRUSTCOM, 2022, : 727 - 732
  • [35] A Confidence Interval Based Filtering Against DDoS Attack in Cloud Environment: A Confidence Interval Against DDoS Attack in the Cloud
    Haddadi, Mohamed
    Beghdad, Rachid
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY AND PRIVACY, 2020, 14 (04) : 42 - 56
  • [36] DDoS attack detection algorithms based on entropy computing
    Li, Liying
    Zhou, Jianying
    Xiao, Ning
    INFORMATION AND COMMUNICATIONS SECURITY, PROCEEDINGS, 2007, 4681 : 452 - +
  • [37] Virtual machine migration policy for multi-tier application in cloud computing based on Q-learning algorithm
    Cong Hung Tran
    Thanh Khiet Bui
    Tran Vu Pham
    Computing, 2022, 104 : 1285 - 1306
  • [38] Virtual machine migration policy for multi-tier application in cloud computing based on Q-learning algorithm
    Cong Hung Tran
    Thanh Khiet Bui
    Tran Vu Pham
    COMPUTING, 2022, 104 (06) : 1285 - 1306
  • [39] An Anomaly Detection Algorithm based on Online Learning Lagrangian SVM for Cloud Computing Environment
    Wang, GuiPing
    Li, Ren
    Yuan, XiaoYi
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2016, 10 (12): : 173 - 185
  • [40] Federated Incremental Learning Based DDoS Attack Detection Model in SDN Environment
    Liu, Yan-Hua
    Fang, Wen-Yu
    Guo, Wen-Zhong
    Zhao, Bao-Kang
    Huang, Wei
    Jisuanji Xuebao/Chinese Journal of Computers, 2024, 47 (12): : 2852 - 2866