Skip to main content

Detection of DDoS Attacks Using Machine Learning in Cloud Computing

  • Conference paper
  • First Online:
Advanced Informatics for Computing Research (ICAICR 2019)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 1076))

Abstract

Cloud Computing is basically the use of software and hardware to provide a service over an internet network. Users use applications or can access files from any device with the help of cloud computing. The main thing is that device must be connected through the Internet. Cloud computing has many advantages like scalability, less maintenance, virtualization and requested resources to the users with reduced infrastructure cost, and greater flexibility. It faces many drawbacks like security attack as Distributed Denial of Service (DDoS).

DDoS attack is well-defined as a way of attack that includes multiple conceded computer systems attack a goal, like a server, any resource and website, and due to this a denial of service for the end users of the intended resource. The fake connection requests, flooding of inward messages, or distorted packets forces the whole system to slow down and shut down, in that way denying service to genuine end users and systems. In this paper we have analyzed and proposed the machine learning algorithms for detecting DDoS attack in cloud computing environment. This paper is using isolation forest anomaly detection technique and then the correlation will be used to for detection of DDoS attack.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Bahrololum, M., Khaleghi, M.: Anomaly intrusion detection system using hierarchical gaussian mixture model. IJCSNS Int. J. Comput. Sci. Netw. Secur. 8(8), 264–271 (2008)

    Google Scholar 

  2. Shawish, A., Salama, M.: Cloud computing: paradigms and technologies. In: Xhafa, F., Bessis, N. (eds.) Inter-Cooperative Collective Intelligence: Techniques and Applications, vol. 495, pp. 39–67. Springer, Heidelberg (2014). https://doi.org/10.1007/978-3-642-35016-0_2

    Chapter  Google Scholar 

  3. El Kafhali, S., Salah, K.: Stochastic modelling and analysis of cloudcomputing data center. In: 20th Conference on Innovations in Clouds, Internet and Networks (ICIN), pp. 122–126.IEEE (2017)

    Google Scholar 

  4. Hu, J., Yu, X.: A simple and efficient hidden markov model scheme for host-based anomaly intrusion detection. IEEE Netw. J. 23, 42–47 (2009)

    Article  Google Scholar 

  5. Solanki, K., Dhankar, A., et al.: A review on machine learning techniques. Int. J. Adv. Res. Comput. Sci. 8(3), 778–782 (2017)

    Google Scholar 

  6. Nakkeeran, R., Albert, T.A., Ezumalai, R.: Agent based efficient anomaly intrusion detection system in ad-hoc networks. IACSIT Int. J. Eng. Technol. 2(1), 52 (2010)

    Article  Google Scholar 

  7. Zekri, M., El Kafhali, S., Hanini, M., Aboutabit, N.: Mitigating economic denial of sustainability attacks to secure cloud computing environments. Trans. Mach. Learn. Artif. Intell. 5(4), 473–481 (2017)

    Google Scholar 

  8. Xiao, P., Qu, W., Qi, H., Li, Z.: Detecting DDoS attacks against data center with correlation analysis. Comput. Commun. 67, 66–74 (2015)

    Article  Google Scholar 

  9. Ahmed, A.A.E., Traore, I.: Anomaly intrusion detection based on biometrics. In: IEEE Workshop on Information Assurance (2005)

    Google Scholar 

  10. Sheta, A.F., Alamleh, A.: A professional comparison of c4. 5, MLP, SVM for network intrusion detection based feature analysis. In: The International Congress for global Science and Technology, vol. 47, p. 15 (2015)

    Google Scholar 

  11. Bhuse, V., Gupta, A.: Anomaly intrusion detection in wireless sensor networks. ACM J. High Speed Netw. 15, 33–51 (2006)

    Google Scholar 

  12. Shirazi, H.M.: Anomaly intrusion detection system using information theory, K-NN and KMC Algorithms. Aust. J. Basic Appl. Sci. 3(3), 2581–2597 (2009)

    Google Scholar 

  13. Yang, D., Usynin, A., Hines, J.W.: Anomaly-based intrusion detection for SCAD systems. In: IAEA Technical Meeting on Cyber Security of NPP I&C and Information systems, Idaho Fall, ID (2006)

    Google Scholar 

  14. Manikopoulos, C., Papavassiliou, S.: Network intrusion and fault detection: a statistical anomaly approach. IEEE Commun. 40, 76–82 (2002)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Vishal Sharma .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Sharma, V., Verma, V., Sharma, A. (2019). Detection of DDoS Attacks Using Machine Learning in Cloud Computing. In: Luhach, A., Jat, D., Hawari, K., Gao, XZ., Lingras, P. (eds) Advanced Informatics for Computing Research. ICAICR 2019. Communications in Computer and Information Science, vol 1076. Springer, Singapore. https://doi.org/10.1007/978-981-15-0111-1_24

Download citation

  • DOI: https://doi.org/10.1007/978-981-15-0111-1_24

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-15-0110-4

  • Online ISBN: 978-981-15-0111-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics