Advertisement

Cluster Computing

, Volume 22, Supplement 5, pp 10615–10623 | Cite as

Intrusion detection of distributed denial of service attack in cloud

  • S. VelliangiriEmail author
  • J. Premalatha
Article

Abstract

Security issue in cloud environment is one of the major obstacle in cloud implementation. Network attacks make use of the vulnerability in the network and the protocol to damage the data and application. Cloud follows distributed technology; hence it is vulnerable for intrusions by malicious entities. Intrusion detection systems (IDS) has become a basic component in network protection infrastructure and a necessary method to defend systems from various attacks. Distributed denial of service (DDoS) attacks are a great problem for a user of computers linked to the Internet. Data mining techniques are widely used in IDS to identify attacks using the network traffic. This paper presents and evaluates a Radial basis function neural network (RBF-NN) detector to identify DDoS attacks. Many of the training algorithms for RBF-NNs start with a predetermined structure of the network that is selected either by means of a priori knowledge or depending on prior experience. The resultant network is frequently inadequate or needlessly intricate and a suitable network structure could be configured only by trial and error method. This paper proposes Bat algorithm (BA) to configure RBF-NN automatically. Simulation results demonstrate the effectiveness of the proposed method.

Keywords

Intrusion detection systems (IDS) Distributed denial of service (DDoS) Radial basis function (RBF) Neural network (NN) Bat algorithm (BA) 

References

  1. 1.
    Alsafi, H.M., Abduallah, W.M., Pathan, A.S.K.: IDPS: an integrated intrusion handling model for cloud (2012). arXiv:1203.3323
  2. 2.
    Kumar, U., Gohil, B.N.: A survey on intrusion detection systems for cloud computing environment. Int. J. Comput. Appl. 109(1) (2015)Google Scholar
  3. 3.
    Narwane, S.V., Vaikol, S.L.: Intrusion detection system in cloud computing environment. In: InInternational Conference on Advances in Communication and Computing Technologies (ICACACT) (2012)Google Scholar
  4. 4.
    Zlomislić, V., Fertalj, K., Sruk, V.: Denial of service attacks, defences and research challenges. Clust. Comput. 20(1), 661–4671 (2017)CrossRefGoogle Scholar
  5. 5.
    Saied, A., Overill, R.E., Radzik, T.: Detection of known and unknown DDoS attacks using artificial neural networks. Neurocomputing 172, 385–393 (2016)CrossRefGoogle Scholar
  6. 6.
    Srinivasan, T. R., Shanmugalakshmi, R., Madhusudhanan, B.: Dynamic remote host classification in grid computing using Clonalg. In: Proceedings of the International Conference and Workshop on Emerging Trends in Technology, pp. 198–201. ACM (2010)Google Scholar
  7. 7.
    Devikrishna, K.S., Ramakrishna, B.B.: An artificial neural network based intrusion detection system and classification of attacks. Int. J. Eng. Res. Appl. 3(4), 1959–1964 (2013)Google Scholar
  8. 8.
    Dhage, S.N., Meshram, B.B.: Intrusion detection system in cloud computing environment. Int. J. Cloud Comput. 1(2–3), 261–282 (2012)CrossRefGoogle Scholar
  9. 9.
    Kene, S.G., Theng, D.P.: A review on intrusion detection techniques for cloud computing and security challenges. In: IEEE 2nd International Conference on Electronics and Communication Systems (ICECS), pp. 227–232 (2015)Google Scholar
  10. 10.
    Girma, A., Garuba, M., Li, J., Liu, C.: Analysis of DDoS attacks and an introduction of a hybrid statistical model to detect DDoS attacks on cloud computing environment. In: IEEE 12th International Conference on Information Technology-New Generations (ITNG), pp. 212–217 (2015)Google Scholar
  11. 11.
    Nikolai, J., Wang, Y.: Hypervisor-based cloud intrusion detection system. In: IEEE International Conference on Computing, Networking and Communications (ICNC), pp. 989–993 (2014)Google Scholar
  12. 12.
    Yan, Q., Yu, F.R.: Distributed denial of service attacks in software-defined networking with cloud computing. IEEE Commun. Mag. 53(4), 52–59 (2015)CrossRefGoogle Scholar
  13. 13.
    Alqahtani, S.M., Al Balushi, M., John, R.: An Intelligent Intrusion Prevention System for Cloud Computing (SIPSCC). In: IEEE International Conference on Computational Science and Computational Intelligence (CSCI), vol. 2, pp. 152–158 (2014)Google Scholar
  14. 14.
    Keshavarzi, M.: Traditional host based intrusion detection systems’ challenges in cloud computing. Adv. Comput. Sci. 3(2), 133–138 (2014)Google Scholar
  15. 15.
    Alruwaili, F.F., Gulliver, A.: CCIPS: A cooperative intrusion detection and prevention framework for cloud services. Int. J. Latest Trends Comput. 4(4) (2014)Google Scholar
  16. 16.
    Rajendran, P.K.: Hybrid intrusion detection algorithm for private cloud. Indian J. Sci. Technol. 8(35) (2015)Google Scholar
  17. 17.
    Enache, A.C., Sgârciu, V.: An improved Bat algorithm driven by support vector machines for intrusion detection. In: International Joint Conference, pp. 41–51. Springer, New York (2015)Google Scholar
  18. 18.
    Enache, A.C., Sgârciu, V.: Anomaly intrusions detection based on support vector machines with an improved Bat algorithm. In: IEEE 20th International Conference on Control Systems and Computer Science, pp. 317–321 (2015)Google Scholar
  19. 19.
    Enache, A.C., Sgârciu, V.: A feature selection approach implemented with the Binary Bat algorithm applied for intrusion detection. In: IEEE 38th International Conference on Telecommunications and Signal Processing (TSP), pp. 11–15 (2015)Google Scholar
  20. 20.
    Sheth, H.: A survey on RBF neural network for intrusion detection system. Int. J. Eng. Res. Appl. 1(4), 17–22 (2014)Google Scholar
  21. 21.
    Kachitvichyanukul, V.: Comparison of three evolutionary algorithms: GA, PSO, and DE. Indust. Eng. Manag. Syst. 11(3), 215–223 (2012)Google Scholar
  22. 22.
    Mandal, S., Saha, G., Pal, R.K.: Recurrent neural network based modeling of gene regulatory network using Bat algorithm. arXiv:1509.03221 (2015)

Copyright information

© Springer Science+Business Media, LLC 2017

Authors and Affiliations

  1. 1.Department of CSESri Venkatesa Perumal College of Engineering and TechnologyPutturIndia
  2. 2.Kongu Engineering CollegeErodeIndia

Personalised recommendations