Abstract
In the era of evolution of information technologies (IT), cloud computing plays a vital role in providing services through the internet. Cloud computing has many challenges, the major is security issues. Distributed denial of service (DDoS) is one of the most attacks treating cloud systems, it is able to make the service unavailable. So, it is necessary to deploy a mechanism of defense to detect these attacks earliest. Serval DDoS detection methods are challenged by the huge number of network flows generated by different distributed devices and high false-positive rate. In this paper, we present anomaly-based detection method of DDoS attack in the cloud environment based on a combination of deep neural networks and machine learning algorithms to improve accuracy and reduce false-positive rate, we evaluate our approach with various experiments were performed on the CIDDS-001 dataset. The approach conducted a satisfactory result accuracy of 0.99, a f1-score of 0.99.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Khan, M.: A survey of security issues for cloud computing. J. Netw. Comput. Appl. 71, 11–29 (2016). https://doi.org/10.1016/j.jnca.2016.05.010
Goyal, A., Dadizadeh, S.: A survey on cloud computing. Univ. Br. Columbia Tech. Rep. CS 508, 55–58 (2009)
Durcevic, S.: 10 cloud computing risks & challenges businesses are facing in these days. https://www.datapine.com/blog/cloud-computing-risks-and-challenges/. Accessed 14 July 2020
Wong, F., Tan, C.X.: A survey of trends in massive DDoS attacks and cloud-based mitigations. Int. J. Netw. Secur. Appl. 6(3), 57 (2014)
Dong, S., Abbas, K., Jain, R.: A survey on distributed denial of service (DDoS) attacks in SDN and cloud computing environments. IEEE Access 7, 80813–80828 (2019)
Lee, S., Kim, G., Kim, S.: Sequence-order-independent network profiling for detecting application layer DDoS attacks. EURASIP J. Wirel. Commun. Netw. 2011(1), 1–9 (2011)
Choi, J., Choi, C., Ko, B., Kim, P.: A method of DDoS attack detection using HTTP packet pattern and rule engine in cloud computing environment. Soft. Comput. 18(9), 1697–1703 (2014). https://doi.org/10.1007/s00500-014-1250-8
He, Z., Zhang, T., Lee, R.B.: Machine learning based DDoS attack detection from source side in cloud. In: 2017 IEEE 4th International Conference on Cyber Security and Cloud Computing (CSCloud), pp. 114–120. IEEE, June 2017
Idhammad, M., Afdel, K., Belouch, M.: Detection system of HTTP DDoS attacks in a cloud environment based on information theoretic entropy and random forest. Secur. Commun. Netw. 2018 (2018). Article no 1263123
Lonea, A.M., Popescu, D.E., Tianfield, H.: Detecting DDoS attacks in cloud computing environment. Int. J. Comput. Commun. Control 8(1), 70–78 (2012)
Giralte, L.C., Conde, C., De Diego, I.M., Cabello, E.: Detecting denial of service by modelling web-server behaviour. Comput. Electr. Eng. 39(7), 2252–2262 (2013)
Hoque, N., Kashyap, H., Bhattacharyya, D.K.: Real-time DDoS attack detection using FPGA. Comput. Commun. 110, 48–58 (2017)
Sreeram, I., Vuppala, V.P.K.: HTTP flood attack detection in application layer using machine learning metrics and bio inspired bat algorithm. Appl. Comput. Inform. 15(1), 59–66 (2019)
Verma, A., Ranga, V.: Statistical analysis of CIDDS-001 dataset for network intrusion detection systems using distance-based machine learning. Procedia Comput. Sci. 125, 709–716 (2018)
Liu, Y., Zhang, D., Lu, G.: Region-based image retrieval with high-level semantics using decision tree learning. Pattern Recogn. 41(8), 2554–2570 (2008)
Rodriguez-Galiano, V.F., Ghimire, B., Rogan, J., Chica-Olmo, M., Rigol-Sanchez, J.P.: An assessment of the effectiveness of a random forest classifier for land-cover classification. ISPRS J. Photogramm. Remote. Sens. 67, 93–104 (2012)
Acharya, U.R., et al.: A deep convolutional neural network model to classify heartbeats. Comput. Biol. Med. 89, 389–396 (2017)
Graves, A., Schmidhuber, J.: Framewise phoneme classification with bidirectional LSTM and other neural network architectures. Neural Netw. 18(5–6), 602–610 (2005)
Ranga, V.: On evaluation of network intrusion detection systems: statistical analysis of CIDDS-001 dataset using machine learning techniques. Pertanika J. Sci. Technol. 26(3), 1307–1332 (2018)
Abdulhammed, R., Faezipour, M., Abuzneid, A., AbuMallouh, A.: Deep and machine learning approaches for anomaly-based intrusion detection of imbalanced network traffic. IEEE Sens. Lett. 3(1), 1–4 (2018)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2022 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this paper
Cite this paper
Ouhssini, M., Afdel, K. (2022). Machine Learning Methods for DDoS Attacks Detection in the Cloud Environment. In: Kacprzyk, J., Balas, V.E., Ezziyyani, M. (eds) Advanced Intelligent Systems for Sustainable Development (AI2SD’2020). AI2SD 2020. Advances in Intelligent Systems and Computing, vol 1418. Springer, Cham. https://doi.org/10.1007/978-3-030-90639-9_32
Download citation
DOI: https://doi.org/10.1007/978-3-030-90639-9_32
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-90638-2
Online ISBN: 978-3-030-90639-9
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)