Skip to main content
Erschienen in: 3D Research 3/2018

01.09.2018 | 3DR Express

An Effective DOS Attack Detection Model in Cloud Using Artificial Bee Colony Optimization

verfasst von: Jitendra Kumar Seth, Satish Chandra

Erschienen in: 3D Research | Ausgabe 3/2018

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Denial of service (DOS) attack is a serious threat in the cloud which causes unavailability of cloud services to genuine users. Firewalls alone are not able to detect DOS attack because of the dynamic nature of the attack and masked identity. This paper proposes a cloud-based DOS attack detection model (CDOSD) which is setup through key feature selection using a new binary version of Artificial bee colony optimization (BABCO) and decision tree (DT) classifier. The DT classifier is utilized because it has superior learning speed than other classification algorithms and BABCO is used for feature selection from the dataset. The real-time DOS attack tools are used to perform the attacks on cloud host. It has been observed that the CDOSD detects DOS attack on cloud host with high accuracy and a very low false positive rate. The features of the dataset are significantly reduced by BABCO which provides a low dimension of computation space for training and classification. The proposed scheme is also compared with the other existing models and found superior in performance. The proposed methodology may help the cloud service providers to design more secure cloud environment.

Graphical Abstract

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Literatur
6.
Zurück zum Zitat Darwish, M., & Ouda, A. (2017). An enhanced cloud-based secure authentication (ECSA) protocol suite for prevention of denial-of-service (DoS) attacks. International Journal on Future Revolution in Computer Science & Communication Engineering, 3(11), 485–496. Darwish, M., & Ouda, A. (2017). An enhanced cloud-based secure authentication (ECSA) protocol suite for prevention of denial-of-service (DoS) attacks. International Journal on Future Revolution in Computer Science & Communication Engineering, 3(11), 485–496.
10.
Zurück zum Zitat Bahaweres, R. B., Sharif, J., & Alaydrus, M. (2016). Building a private cloud computing and the analysis against DoS (denial of service) attacks: Case study at SMKN 6 Jakarta. In Proceedings of 2016 4th international conference on cyber and IT service management, CITSM 2016. https://doi.org/10.1109/citsm.2016.7577583. Bahaweres, R. B., Sharif, J., & Alaydrus, M. (2016). Building a private cloud computing and the analysis against DoS (denial of service) attacks: Case study at SMKN 6 Jakarta. In Proceedings of 2016 4th international conference on cyber and IT service management, CITSM 2016. https://​doi.​org/​10.​1109/​citsm.​2016.​7577583.
20.
Zurück zum Zitat Karaboga, D. (2005). An idea based on honey bee swarm for numerical optimization. Technical Report TR06, Erciyes University, Engineering Faculty, Computer Engineering Department. Karaboga, D. (2005). An idea based on honey bee swarm for numerical optimization. Technical Report TR06, Erciyes University, Engineering Faculty, Computer Engineering Department.
22.
Zurück zum Zitat Modi, C., Patel, D., Borisanya, B., Patel, A., & Rajarajan, M. (2012). A novel framework for intrusion detection in cloud. In Proceedings of the fifth international conference on security of information and networks (pp. 67–74). https://doi.org/10.1145/2388576.2388585. Modi, C., Patel, D., Borisanya, B., Patel, A., & Rajarajan, M. (2012). A novel framework for intrusion detection in cloud. In Proceedings of the fifth international conference on security of information and networks (pp. 67–74). https://​doi.​org/​10.​1145/​2388576.​2388585.
23.
Zurück zum Zitat Mining, W. I. D. (2006). Data mining: Concepts and techniques. Burlington: Morgan Kaufinann. Mining, W. I. D. (2006). Data mining: Concepts and techniques. Burlington: Morgan Kaufinann.
Metadaten
Titel
An Effective DOS Attack Detection Model in Cloud Using Artificial Bee Colony Optimization
verfasst von
Jitendra Kumar Seth
Satish Chandra
Publikationsdatum
01.09.2018
Verlag
3D Display Research Center
Erschienen in
3D Research / Ausgabe 3/2018
Elektronische ISSN: 2092-6731
DOI
https://doi.org/10.1007/s13319-018-0195-6

Weitere Artikel der Ausgabe 3/2018

3D Research 3/2018 Zur Ausgabe

Premium Partner