Design and analysis of behaviour based DDoS detection algorithm for data centres in cloud

被引:0
|
作者
Qubeb Shaik Mohammed Penukonda
Ilango Paramasivam
机构
[1] Bharatiyar University,School of CSE
[2] PSG Institute of Technology and Applied Research,Department of CSE
来源
Evolutionary Intelligence | 2021年 / 14卷
关键词
Cloud computing; Network; Traffic; DDoS; Packet analyzer; Trust management;
D O I
暂无
中图分类号
学科分类号
摘要
In the recent years, security is the major concern in cloud computing. One of the major security threats to the cloud is distributed denial of service (DDoS). This DDoS attacks results in data corruption, losing of sensitive information and leads to denial of cloud service. To overcome the drawbacks of security, we proposed the behaviour-based DDoS detection algorithm that is based on the behaviour of the user which generates the traffic. The proposed work is divided into two phases which can be executed in parallel. In general, the hackers or illegitimate user floods the traffic and uses more bandwidth. In first phase, the analysis of the dynamic traffic and effectively differentiating the genuine traffic and attacker’s traffic is done in the proposed algorithm. The packet analyzer is responsible to identify the genuine packets from the flooding traffic. In second phase, the CPU utilization is monitored and the process consuming more CPU power or the source is illegitimate, the process is rejected. The simulation is carried by using the OPNET simulator. The simulation results are tested with three different scenarios. It is proved that the proposed model has efficient response time and it has better efficiency in DDoS prone zones.
引用
收藏
页码:395 / 404
页数:9
相关论文
共 50 条
  • [21] Analysis of Data Point Cloud Preprocessing and Feature Angle Detection Algorithm
    Zhao, Feng
    Dhiman, Gaurav
    [J]. RECENT ADVANCES IN ELECTRICAL & ELECTRONIC ENGINEERING, 2021, 14 (07) : 700 - 707
  • [22] Research on Intrusion Detection Algorithm of User Data based on Cloud Computing
    Zhang Hongdong
    Song Yuli
    [J]. INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2015, 9 (09): : 275 - 283
  • [23] The Legitimacy Detection for Multilevel Hybrid Cloud Algorithm Based Data Access
    Li, Na
    Dong, Yunwei
    Che Tianwei
    Wang, Chao
    Gao, Yang
    [J]. 2015 IEEE INTERNATIONAL CONFERENCE ON SOFTWARE QUALITY, RELIABILITY AND SECURITY - COMPANION (QRS-C 2015), 2015, : 169 - 172
  • [24] Cloud detection algorithm based on GF-5 DPC data
    Wei, Lesi
    Shang, Huazhe
    Husi, Letu
    Ma, Run
    Hu, Dahai
    Chao, Kefu
    Si, Fuqi
    Shi, Jiancheng
    [J]. National Remote Sensing Bulletin, 2021, 25 (10) : 2053 - 2066
  • [25] Cloud DDoS Attack Detection Model with Data Fusion & Machine Learning Classifiers
    Pattnaik, Lal Mohan
    Swain, Pratik Kumar
    Satpathy, Suneeta
    Panda, Aditya N.
    [J]. EAI ENDORSED TRANSACTIONS ON SCALABLE INFORMATION SYSTEMS, 2023, 10 (06)
  • [26] A Spark-Based DDoS Attack Detection Model in Cloud Services
    Zhang, Jian
    Zhang, Yawei
    Liu, Pin
    He, Jianbiao
    [J]. INFORMATION SECURITY PRACTICE AND EXPERIENCE, ISPEC 2016, 2016, 10060 : 48 - 64
  • [27] Classification Based Machine Learning for Detection of DDoS attack in Cloud Computing
    Mishra, Anupama
    Gupta, B. B.
    Perakovic, Dragan
    Garcia Penalvo, Francisco Jose
    Hsu, Ching-Hsien
    [J]. 2021 IEEE INTERNATIONAL CONFERENCE ON CONSUMER ELECTRONICS (ICCE), 2021,
  • [28] An anomaly-based approach for DDoS attack detection in cloud environment
    Rawashdeh, Adnan
    Alkasassbeh, Mouhammd
    Al-Hawawreh, Muna
    [J]. INTERNATIONAL JOURNAL OF COMPUTER APPLICATIONS IN TECHNOLOGY, 2018, 57 (04) : 312 - 324
  • [29] Early DDoS Detection Based on Data Mining Techniques
    Xylogiannopoulos, Konstantinos
    Karampelas, Panagiotis
    Alhajj, Reda
    [J]. INFORMATION SECURITY THEORY AND PRACTICE: SECURING THE INTERNET OF THINGS, 2014, 8501 : 190 - 199
  • [30] A DDOS Intrusion Detection Method Based On Data Mining
    Tian Jun-feng
    Pang Tao
    Du Rui-zhong
    [J]. 2008 INTERNATIONAL WORKSHOP ON INFORMATION TECHNOLOGY AND SECURITY, 2008, : 42 - 46