Skip to main content

2018 | OriginalPaper | Buchkapitel

17. Advanced Machine Language Approach to Detect DDoS Attack Using DBSCAN Clustering Technology with Entropy

verfasst von : Anteneh Girma, Mosses Garuba, Rajini Goel

Erschienen in: Information Technology - New Generations

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Service availability is the major and primary security issue in cloud computing environments. Currently existing solutions that address service availability-related issues that can be applied in cloud computing environments are insufficient. In order to ensure the high availability of the offered services, the data centers resources must be protected from DDoS attack threats. DDoS is the major and the most serious security threat that challenges the availability of the data centers resources to the intended clients. The existing solutions that monitor incoming traffic and detect DDoS attacks become ineffective if the attacker’s traffic intensity is high. Therefore, it is necessary to devise schemes that will detect DDoS attacks even when the traffic intensity is high; such schemes must deactivate DDoS attackers and serve the legitimate users with available re-sources. This research paper addresses the need to prevent DDoS attacks by defining and demonstrating a hybrid detection model by introducing an advanced and efficient approach to recognize and efficiently discriminate the flood attacks from the flush crowd (legitimate access). Moreover, this paper introduce and discusses, most importantly, the application of multi-variate correlation among the selected and ranked features to significantly reduce the false alarm rate, which is one of the major issue associated with the current available solution.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Vjvek, R.,Vignesh, R., & Hema, V. (2013). ITSI Transactions on Electrical and Electronics Engineering (ITSI-TEEE), An Innovative Approach to provide Security I Cloud by Prevention of XML and HTTP DDOS Attacks, 1(1), 2320–8945. Vjvek, R.,Vignesh, R., & Hema, V. (2013). ITSI Transactions on Electrical and Electronics Engineering (ITSI-TEEE), An Innovative Approach to provide Security I Cloud by Prevention of XML and HTTP DDOS Attacks, 1(1), 2320–8945.
2.
Zurück zum Zitat Girma, A., Garuba, M., & Li, J. (2015). Analysis of security vulnerabilities of cloud computing environment service models and its main characteristic, ITNG. Girma, A., Garuba, M., & Li, J. (2015). Analysis of security vulnerabilities of cloud computing environment service models and its main characteristic, ITNG.
3.
Zurück zum Zitat Girma, A., Garuba, M., Li, J., & Liu, C. (2015). Analysis of dDoS attacks and an introduction of a hybrid statistical model to detect dDoS attacks on cloud computing environment, ITNG. Girma, A., Garuba, M., Li, J., & Liu, C. (2015). Analysis of dDoS attacks and an introduction of a hybrid statistical model to detect dDoS attacks on cloud computing environment, ITNG.
4.
Zurück zum Zitat Arlia, D., & Coppola, M. (2001). Experiments in parallel clustering with DBSCAN. Euro-Par 2001, LNCS, 2150, 326–331.MATH Arlia, D., & Coppola, M. (2001). Experiments in parallel clustering with DBSCAN. Euro-Par 2001, LNCS, 2150, 326–331.MATH
5.
Zurück zum Zitat Mumtaz, K., & Duraiswami, K. (2011). An analysis on density based clustering of multi-dimensional spatial data. Indian Journal of Computer Science Engineering, 1(1), 8–12. Mumtaz, K., & Duraiswami, K. (2011). An analysis on density based clustering of multi-dimensional spatial data. Indian Journal of Computer Science Engineering, 1(1), 8–12.
6.
Zurück zum Zitat Khan, K., Rehman, S. U., Aziz, K., Fong, S., Saraavady, S., & Vishwa, A. (2014). DBSCAN: Past, present, and future. IEEE, Applications of Digital Information and Web Technologies (ICADIWT). doi: 10.1109/ICADIWT.2014.6814687. Khan, K., Rehman, S. U., Aziz, K., Fong, S., Saraavady, S., & Vishwa, A. (2014). DBSCAN: Past, present, and future. IEEE, Applications of Digital Information and Web Technologies (ICADIWT). doi: 10.​1109/​ICADIWT.​2014.​6814687.
7.
Zurück zum Zitat Ester, M., PeterKriegel, H., Sander, J., & Xu, X. (1996). A density-based algorithm for discovering clusters in large spatial databases with noise, KDD-96 proceeding. Ester, M., PeterKriegel, H., Sander, J., & Xu, X. (1996). A density-based algorithm for discovering clusters in large spatial databases with noise, KDD-96 proceeding.
8.
Zurück zum Zitat Ma, L., Lei, G., Li, B., Qiao, S., & Wang, J. (2014). MRG-DBSCAN: An improved DBSCAN clustering method based on grid. Advanced Science and Technology Letters, 8(2), 119–128. Ma, L., Lei, G., Li, B., Qiao, S., & Wang, J. (2014). MRG-DBSCAN: An improved DBSCAN clustering method based on grid. Advanced Science and Technology Letters, 8(2), 119–128.
9.
Zurück zum Zitat Vijayalaksmi, S., & Punithavalli, M. (2012). A fast approach to clustering datasets using DBSCAN and pruning algorithms. International Journal of Computer Applications, 60(14), 1–7. Vijayalaksmi, S., & Punithavalli, M. (2012). A fast approach to clustering datasets using DBSCAN and pruning algorithms. International Journal of Computer Applications, 60(14), 1–7.
10.
Zurück zum Zitat Wnag, Y., Wang, Y., Wu, D., & Ren, J. (2013). An incremental rapid DBSCAN clustering algorithm for detecting software vulnerability. Journal of Convergence Information Technology, 5(1), 82–94. Wnag, Y., Wang, Y., Wu, D., & Ren, J. (2013). An incremental rapid DBSCAN clustering algorithm for detecting software vulnerability. Journal of Convergence Information Technology, 5(1), 82–94.
11.
Zurück zum Zitat Erman, J., Arlitt, M., & Mahanti, A. (2006). Traffic classification using clustering algorithms. ACM. SIGCOMM’06 Workshop September 11–15, 2006, Pisa, Italy. Erman, J., Arlitt, M., & Mahanti, A. (2006). Traffic classification using clustering algorithms. ACM. SIGCOMM’06 Workshop September 11–15, 2006, Pisa, Italy.
12.
Zurück zum Zitat SanJah Chakraborty, N. K. (2011). NAGWANI. International Journal of Enterprise and Business, ISSN (Online), 1, 2230–8849. SanJah Chakraborty, N. K. (2011). NAGWANI. International Journal of Enterprise and Business, ISSN (Online), 1, 2230–8849.
13.
Zurück zum Zitat Xiufen, F., Hu, S., & Wang, Y. (2014). Research of parallel DBSCAN clustering algorithm based on MapReduce. International Journal of Database Theory and Application, 7, 41.CrossRef Xiufen, F., Hu, S., & Wang, Y. (2014). Research of parallel DBSCAN clustering algorithm based on MapReduce. International Journal of Database Theory and Application, 7, 41.CrossRef
14.
Zurück zum Zitat Slava kisiele Misslovsl. (2011). P_DBSCAN, A density based clustering algorithms for exploration and analysis of attractive areas using collections of Geo-tagged photos. Slava kisiele Misslovsl. (2011). P_DBSCAN, A density based clustering algorithms for exploration and analysis of attractive areas using collections of Geo-tagged photos.
15.
Zurück zum Zitat Su, Z., Yang, Q., Zhang, H., Xu, X., & Hu, Y. (2014). Correlation-based document clustering using web page. IEEE Computer Society. OAI: Citesseerx.PSU:10.1.186.4376. Su, Z., Yang, Q., Zhang, H., Xu, X., & Hu, Y. (2014). Correlation-based document clustering using web page. IEEE Computer Society. OAI: Citesseerx.PSU:10.1.186.4376.
16.
Zurück zum Zitat Daniel, S. Y., & Wang, X. (2007). Covariance-matrix modeling and detecting various flooding attacks. IEEE Transactions on Systems, MAN, Cybernetics- Part A: Systems and Humans, 37(2), 141–142.CrossRef Daniel, S. Y., & Wang, X. (2007). Covariance-matrix modeling and detecting various flooding attacks. IEEE Transactions on Systems, MAN, Cybernetics- Part A: Systems and Humans, 37(2), 141–142.CrossRef
17.
Zurück zum Zitat Kulkarni, A. B., Bush, S. F., & Evans, S. C. (2002). Detecting distributed denial-of-service attacks using kolmogorov complexity metrics. GE Research & Development Center, GE Electric Compan. Report Number 2001CRD176, Technical Information Series, February 2002. Kulkarni, A. B., Bush, S. F., & Evans, S. C. (2002). Detecting distributed denial-of-service attacks using kolmogorov complexity metrics. GE Research & Development Center, GE Electric Compan. Report Number 2001CRD176, Technical Information Series, February 2002.
18.
Zurück zum Zitat Lonea, A. M., Popescu, D. E., & Tianfield, H. (2013). Detecting DDoS attacks in cloud computing environment. International Journal of Computer Communication, 8(1), 70–78.CrossRef Lonea, A. M., Popescu, D. E., & Tianfield, H. (2013). Detecting DDoS attacks in cloud computing environment. International Journal of Computer Communication, 8(1), 70–78.CrossRef
19.
Zurück zum Zitat Mahajan, R., Bellovin, S. M., Floyd, S., Ioannidis, J., Paxson, V., & Shenker, S.. (2002). Controlling high bandwidth aggregates in the network, presented at Computer Communication Review (pp. 62–73). Mahajan, R., Bellovin, S. M., Floyd, S., Ioannidis, J., Paxson, V., & Shenker, S.. (2002). Controlling high bandwidth aggregates in the network, presented at Computer Communication Review (pp. 62–73).
20.
Zurück zum Zitat Xie, Y., & Yu, S. Z. (2009). A large-scale hidden semi-markov model for anomaly detection on user browsing behaviors. IEEE/ACM Transactions on Networking (TON), 17(1), 54–65.CrossRef Xie, Y., & Yu, S. Z. (2009). A large-scale hidden semi-markov model for anomaly detection on user browsing behaviors. IEEE/ACM Transactions on Networking (TON), 17(1), 54–65.CrossRef
21.
Zurück zum Zitat Mirkovic, J., Prier, G., & Reiher, P. (2002). Attacking DDoS at the source. In Proceeding of the 10th IEEE International Conference on Network Protocols (ICNP ‘02). Washington, DC. Mirkovic, J., Prier, G., & Reiher, P. (2002). Attacking DDoS at the source. In Proceeding of the 10th IEEE International Conference on Network Protocols (ICNP ‘02). Washington, DC.
Metadaten
Titel
Advanced Machine Language Approach to Detect DDoS Attack Using DBSCAN Clustering Technology with Entropy
verfasst von
Anteneh Girma
Mosses Garuba
Rajini Goel
Copyright-Jahr
2018
DOI
https://doi.org/10.1007/978-3-319-54978-1_17