Skip to main content

Machine Learning Methods for DDoS Attacks Detection in the Cloud Environment

  • Conference paper
  • First Online:
Advanced Intelligent Systems for Sustainable Development (AI2SD’2020) (AI2SD 2020)

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 1418))

  • 1149 Accesses

Abstract

In the era of evolution of information technologies (IT), cloud computing plays a vital role in providing services through the internet. Cloud computing has many challenges, the major is security issues. Distributed denial of service (DDoS) is one of the most attacks treating cloud systems, it is able to make the service unavailable. So, it is necessary to deploy a mechanism of defense to detect these attacks earliest. Serval DDoS detection methods are challenged by the huge number of network flows generated by different distributed devices and high false-positive rate. In this paper, we present anomaly-based detection method of DDoS attack in the cloud environment based on a combination of deep neural networks and machine learning algorithms to improve accuracy and reduce false-positive rate, we evaluate our approach with various experiments were performed on the CIDDS-001 dataset. The approach conducted a satisfactory result accuracy of 0.99, a f1-score of 0.99.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 189.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 249.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Khan, M.: A survey of security issues for cloud computing. J. Netw. Comput. Appl. 71, 11–29 (2016). https://doi.org/10.1016/j.jnca.2016.05.010

    Article  Google Scholar 

  2. Goyal, A., Dadizadeh, S.: A survey on cloud computing. Univ. Br. Columbia Tech. Rep. CS 508, 55–58 (2009)

    Google Scholar 

  3. Durcevic, S.: 10 cloud computing risks & challenges businesses are facing in these days. https://www.datapine.com/blog/cloud-computing-risks-and-challenges/. Accessed 14 July 2020

  4. Wong, F., Tan, C.X.: A survey of trends in massive DDoS attacks and cloud-based mitigations. Int. J. Netw. Secur. Appl. 6(3), 57 (2014)

    Google Scholar 

  5. Dong, S., Abbas, K., Jain, R.: A survey on distributed denial of service (DDoS) attacks in SDN and cloud computing environments. IEEE Access 7, 80813–80828 (2019)

    Article  Google Scholar 

  6. Lee, S., Kim, G., Kim, S.: Sequence-order-independent network profiling for detecting application layer DDoS attacks. EURASIP J. Wirel. Commun. Netw. 2011(1), 1–9 (2011)

    Article  Google Scholar 

  7. Choi, J., Choi, C., Ko, B., Kim, P.: A method of DDoS attack detection using HTTP packet pattern and rule engine in cloud computing environment. Soft. Comput. 18(9), 1697–1703 (2014). https://doi.org/10.1007/s00500-014-1250-8

    Article  Google Scholar 

  8. He, Z., Zhang, T., Lee, R.B.: Machine learning based DDoS attack detection from source side in cloud. In: 2017 IEEE 4th International Conference on Cyber Security and Cloud Computing (CSCloud), pp. 114–120. IEEE, June 2017

    Google Scholar 

  9. Idhammad, M., Afdel, K., Belouch, M.: Detection system of HTTP DDoS attacks in a cloud environment based on information theoretic entropy and random forest. Secur. Commun. Netw.  2018 (2018). Article no 1263123

    Google Scholar 

  10. Lonea, A.M., Popescu, D.E., Tianfield, H.: Detecting DDoS attacks in cloud computing environment. Int. J. Comput. Commun. Control 8(1), 70–78 (2012)

    Article  Google Scholar 

  11. Giralte, L.C., Conde, C., De Diego, I.M., Cabello, E.: Detecting denial of service by modelling web-server behaviour. Comput. Electr. Eng. 39(7), 2252–2262 (2013)

    Article  Google Scholar 

  12. Hoque, N., Kashyap, H., Bhattacharyya, D.K.: Real-time DDoS attack detection using FPGA. Comput. Commun. 110, 48–58 (2017)

    Article  Google Scholar 

  13. Sreeram, I., Vuppala, V.P.K.: HTTP flood attack detection in application layer using machine learning metrics and bio inspired bat algorithm. Appl. Comput. Inform. 15(1), 59–66 (2019)

    Article  Google Scholar 

  14. Verma, A., Ranga, V.: Statistical analysis of CIDDS-001 dataset for network intrusion detection systems using distance-based machine learning. Procedia Comput. Sci. 125, 709–716 (2018)

    Article  Google Scholar 

  15. Liu, Y., Zhang, D., Lu, G.: Region-based image retrieval with high-level semantics using decision tree learning. Pattern Recogn. 41(8), 2554–2570 (2008)

    Article  Google Scholar 

  16. Rodriguez-Galiano, V.F., Ghimire, B., Rogan, J., Chica-Olmo, M., Rigol-Sanchez, J.P.: An assessment of the effectiveness of a random forest classifier for land-cover classification. ISPRS J. Photogramm. Remote. Sens. 67, 93–104 (2012)

    Article  Google Scholar 

  17. Acharya, U.R., et al.: A deep convolutional neural network model to classify heartbeats. Comput. Biol. Med. 89, 389–396 (2017)

    Article  Google Scholar 

  18. Graves, A., Schmidhuber, J.: Framewise phoneme classification with bidirectional LSTM and other neural network architectures. Neural Netw. 18(5–6), 602–610 (2005)

    Article  Google Scholar 

  19. Ranga, V.: On evaluation of network intrusion detection systems: statistical analysis of CIDDS-001 dataset using machine learning techniques. Pertanika J. Sci. Technol. 26(3), 1307–1332 (2018)

    Google Scholar 

  20. Abdulhammed, R., Faezipour, M., Abuzneid, A., AbuMallouh, A.: Deep and machine learning approaches for anomaly-based intrusion detection of imbalanced network traffic. IEEE Sens. Lett. 3(1), 1–4 (2018)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Mohamed Ouhssini .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2022 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Ouhssini, M., Afdel, K. (2022). Machine Learning Methods for DDoS Attacks Detection in the Cloud Environment. In: Kacprzyk, J., Balas, V.E., Ezziyyani, M. (eds) Advanced Intelligent Systems for Sustainable Development (AI2SD’2020). AI2SD 2020. Advances in Intelligent Systems and Computing, vol 1418. Springer, Cham. https://doi.org/10.1007/978-3-030-90639-9_32

Download citation

Publish with us

Policies and ethics