Abstract
Cloud Computing is basically the use of software and hardware to provide a service over an internet network. Users use applications or can access files from any device with the help of cloud computing. The main thing is that device must be connected through the Internet. Cloud computing has many advantages like scalability, less maintenance, virtualization and requested resources to the users with reduced infrastructure cost, and greater flexibility. It faces many drawbacks like security attack as Distributed Denial of Service (DDoS).
DDoS attack is well-defined as a way of attack that includes multiple conceded computer systems attack a goal, like a server, any resource and website, and due to this a denial of service for the end users of the intended resource. The fake connection requests, flooding of inward messages, or distorted packets forces the whole system to slow down and shut down, in that way denying service to genuine end users and systems. In this paper we have analyzed and proposed the machine learning algorithms for detecting DDoS attack in cloud computing environment. This paper is using isolation forest anomaly detection technique and then the correlation will be used to for detection of DDoS attack.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Bahrololum, M., Khaleghi, M.: Anomaly intrusion detection system using hierarchical gaussian mixture model. IJCSNS Int. J. Comput. Sci. Netw. Secur. 8(8), 264–271 (2008)
Shawish, A., Salama, M.: Cloud computing: paradigms and technologies. In: Xhafa, F., Bessis, N. (eds.) Inter-Cooperative Collective Intelligence: Techniques and Applications, vol. 495, pp. 39–67. Springer, Heidelberg (2014). https://doi.org/10.1007/978-3-642-35016-0_2
El Kafhali, S., Salah, K.: Stochastic modelling and analysis of cloudcomputing data center. In: 20th Conference on Innovations in Clouds, Internet and Networks (ICIN), pp. 122–126.IEEE (2017)
Hu, J., Yu, X.: A simple and efficient hidden markov model scheme for host-based anomaly intrusion detection. IEEE Netw. J. 23, 42–47 (2009)
Solanki, K., Dhankar, A., et al.: A review on machine learning techniques. Int. J. Adv. Res. Comput. Sci. 8(3), 778–782 (2017)
Nakkeeran, R., Albert, T.A., Ezumalai, R.: Agent based efficient anomaly intrusion detection system in ad-hoc networks. IACSIT Int. J. Eng. Technol. 2(1), 52 (2010)
Zekri, M., El Kafhali, S., Hanini, M., Aboutabit, N.: Mitigating economic denial of sustainability attacks to secure cloud computing environments. Trans. Mach. Learn. Artif. Intell. 5(4), 473–481 (2017)
Xiao, P., Qu, W., Qi, H., Li, Z.: Detecting DDoS attacks against data center with correlation analysis. Comput. Commun. 67, 66–74 (2015)
Ahmed, A.A.E., Traore, I.: Anomaly intrusion detection based on biometrics. In: IEEE Workshop on Information Assurance (2005)
Sheta, A.F., Alamleh, A.: A professional comparison of c4. 5, MLP, SVM for network intrusion detection based feature analysis. In: The International Congress for global Science and Technology, vol. 47, p. 15 (2015)
Bhuse, V., Gupta, A.: Anomaly intrusion detection in wireless sensor networks. ACM J. High Speed Netw. 15, 33–51 (2006)
Shirazi, H.M.: Anomaly intrusion detection system using information theory, K-NN and KMC Algorithms. Aust. J. Basic Appl. Sci. 3(3), 2581–2597 (2009)
Yang, D., Usynin, A., Hines, J.W.: Anomaly-based intrusion detection for SCAD systems. In: IAEA Technical Meeting on Cyber Security of NPP I&C and Information systems, Idaho Fall, ID (2006)
Manikopoulos, C., Papavassiliou, S.: Network intrusion and fault detection: a statistical anomaly approach. IEEE Commun. 40, 76–82 (2002)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Sharma, V., Verma, V., Sharma, A. (2019). Detection of DDoS Attacks Using Machine Learning in Cloud Computing. In: Luhach, A., Jat, D., Hawari, K., Gao, XZ., Lingras, P. (eds) Advanced Informatics for Computing Research. ICAICR 2019. Communications in Computer and Information Science, vol 1076. Springer, Singapore. https://doi.org/10.1007/978-981-15-0111-1_24
Download citation
DOI: https://doi.org/10.1007/978-981-15-0111-1_24
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-15-0110-4
Online ISBN: 978-981-15-0111-1
eBook Packages: Computer ScienceComputer Science (R0)