Skip to main content
Erschienen in: Cluster Computing 1/2019

23.02.2018

Detection of DoS attacks in cloud networks using intelligent rule based classification system

verfasst von: Rakesh Rajendran, S. V. N. Santhosh Kumar, Yogesh Palanichamy, Kannan Arputharaj

Erschienen in: Cluster Computing | Sonderheft 1/2019

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Cloud Network has emerged as one of the most adopted technologies both among the end-users and the developers. Despite cloud networks being popular, security in cloud remains a pivotal research challenge and a topic that is much discussed about. Denial of service (DoS) attack is carried out in cloud by one or more perpetrators using multiple compromised nodes to flood a specific target and thereby resulting in unavailability of services. Classification methods can be used effectively to identify attack signature or recurring patterns of such DoS attacks. Therefore, classification using machine learning techniques have been used in this work for feature selection and classification in order to identify the DoS attacks. For this purpose, a new rule based approach for detecting the DoS attacks which uses a domain expert’s knowledge has been proposed in this paper. Moreover, two new algorithms namely Feature Selection Algorithm using Scoring and Ranking and Rule based Classification Algorithm for detecting DoS Attacks are proposed in this paper in which the final classification is carried out by applying the rules from the rule base and is validated using a domain-expert. We have evaluated the proposed system on an experimental set-up on cloud and used real time DoS tools and observed that the proposed method achieved better DoS attack detection accuracy than the existing classification algorithms used for security.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Khorshed, M.T., Shawkat Ali, A.B.M., Wasimi, S.A.: Classifying different denial-of-service attacks in cloud computing using rule-based learning. Secur. Commun. Netw. 5(11), 1235–1247 (2012) Khorshed, M.T., Shawkat Ali, A.B.M., Wasimi, S.A.: Classifying different denial-of-service attacks in cloud computing using rule-based learning. Secur. Commun. Netw. 5(11), 1235–1247 (2012)
2.
Zurück zum Zitat Ficco, M., Rak, M.: Stealthy denial of service strategy in cloud computing. IEEE Trans. Cloud Comput. 3(1), 80–94 (2015)CrossRef Ficco, M., Rak, M.: Stealthy denial of service strategy in cloud computing. IEEE Trans. Cloud Comput. 3(1), 80–94 (2015)CrossRef
3.
Zurück zum Zitat Ganapathy, S., Kulothungan, K., Muthurajkumar, S., Vijayalakshmi, M., Yogesh, P., Kannan, A.: Intelligent feature selection and classification techniques for intrusion detection in networks: a survey. EURASIP J. Wirel. Commun. Netw. 271(1), 1–16 (2013) Ganapathy, S., Kulothungan, K., Muthurajkumar, S., Vijayalakshmi, M., Yogesh, P., Kannan, A.: Intelligent feature selection and classification techniques for intrusion detection in networks: a survey. EURASIP J. Wirel. Commun. Netw. 271(1), 1–16 (2013)
5.
Zurück zum Zitat Muthurajkumar, S., Ganapathy, S., Vijayalakshmi, M., Kannan, A.: Secured temporal log management techniques for cloud. Procedia Comput. Sci. 46, 589–595 (2015)CrossRef Muthurajkumar, S., Ganapathy, S., Vijayalakshmi, M., Kannan, A.: Secured temporal log management techniques for cloud. Procedia Comput. Sci. 46, 589–595 (2015)CrossRef
7.
Zurück zum Zitat Patel, A., Taghavi, M., Bakhtiyari, K., Júnior, J.C.: An intrusion detection and prevention system in cloud computing: a systematic review”. J. Netw. Comput. Appl. 36(1), 25–41 (2013)CrossRef Patel, A., Taghavi, M., Bakhtiyari, K., Júnior, J.C.: An intrusion detection and prevention system in cloud computing: a systematic review”. J. Netw. Comput. Appl. 36(1), 25–41 (2013)CrossRef
8.
Zurück zum Zitat Li, Z., Sun, W., Wang, L.: A neural network based distributed intrusion detection system on cloud platform. In: Proceedings of 2nd IEEE Conference on Cloud Computing and Intelligence Systems, pp. 75–79 (2012) Li, Z., Sun, W., Wang, L.: A neural network based distributed intrusion detection system on cloud platform. In: Proceedings of 2nd IEEE Conference on Cloud Computing and Intelligence Systems, pp. 75–79 (2012)
9.
Zurück zum Zitat Choi, J., Choi, C., Ko, B., Kim, P.: A method of DDoS attack detection using HTTP packet pattern and rule engine in cloud computing environment. Soft. Comput. 18(9), 1697–1703 (2014)CrossRef Choi, J., Choi, C., Ko, B., Kim, P.: A method of DDoS attack detection using HTTP packet pattern and rule engine in cloud computing environment. Soft. Comput. 18(9), 1697–1703 (2014)CrossRef
10.
Zurück zum Zitat Pradeepthi, K.V., Kannan, A.: Cloud attack detection with intelligent rules. KSII Trans. Internet Inf. Syst. 9(10), 4204–4221 (2015) Pradeepthi, K.V., Kannan, A.: Cloud attack detection with intelligent rules. KSII Trans. Internet Inf. Syst. 9(10), 4204–4221 (2015)
11.
Zurück zum Zitat Kim, H.-Y.: An energy-efficient load balancing scheme to extend lifetime in wireless sensor networks. J. Clust. Comput. 19, 279–283 (2016)CrossRef Kim, H.-Y.: An energy-efficient load balancing scheme to extend lifetime in wireless sensor networks. J. Clust. Comput. 19, 279–283 (2016)CrossRef
12.
Zurück zum Zitat Logambigai, R., Kannan, A.: Fuzzy logic based unequal clustering for wireless sensor networks. Wirel. Netw. 22, 945–957 (2016)CrossRef Logambigai, R., Kannan, A.: Fuzzy logic based unequal clustering for wireless sensor networks. Wirel. Netw. 22, 945–957 (2016)CrossRef
13.
Zurück zum Zitat Ruby D, Vijayalakshmi M, Kannan A: Intelligent relay selection and spectrum sharing techniques for cognitive radio networks. J. Clust. Comput., pp. 1–12 (2017) Ruby D, Vijayalakshmi M, Kannan A: Intelligent relay selection and spectrum sharing techniques for cognitive radio networks. J. Clust. Comput., pp. 1–12 (2017)
14.
Zurück zum Zitat Gupta, S., Kumar, P., Abraham, A.: A profile based network intrusion detection and prevention system for securing cloud environment. Int. J. Distrib. Sens. Netw., pp. 1–12 (2013) Gupta, S., Kumar, P., Abraham, A.: A profile based network intrusion detection and prevention system for securing cloud environment. Int. J. Distrib. Sens. Netw., pp. 1–12 (2013)
15.
Zurück zum Zitat Santhosh Kumar, S.V.N., Yogesh, P.: Energy efficient and secured distributed data dissemination using hop by hop authentication in WSN. Wirel. Netw. (2017) Santhosh Kumar, S.V.N., Yogesh, P.: Energy efficient and secured distributed data dissemination using hop by hop authentication in WSN. Wirel. Netw. (2017)
16.
Zurück zum Zitat Jansen, W.A.: Cloud hooks: security and privacy issues in cloud computing. In: Proceedings of 44th Hawaii International Conference on System Sciences, 1 Jan 2011 Jansen, W.A.: Cloud hooks: security and privacy issues in cloud computing. In: Proceedings of 44th Hawaii International Conference on System Sciences, 1 Jan 2011
17.
Zurück zum Zitat Yu, S., Tian, Y., Guo, S., Wu, D.O.: Can we beat DDoS attacks in clouds? IEEE Trans. Parallel Distrib. Syst. 25(9), 2245–2254 (2014)CrossRef Yu, S., Tian, Y., Guo, S., Wu, D.O.: Can we beat DDoS attacks in clouds? IEEE Trans. Parallel Distrib. Syst. 25(9), 2245–2254 (2014)CrossRef
18.
Zurück zum Zitat Girma, A., Garuba, M., Li, J., Liu, C.: Analysis of DDoS attacks and an introduction of a hybrid statistical model to detect DDoS attacks on cloud computing environment. In: Proceedings of 12th International Conference on Information Technology-New Generations, pp. 212–217, 13–15 Apr 2015 Girma, A., Garuba, M., Li, J., Liu, C.: Analysis of DDoS attacks and an introduction of a hybrid statistical model to detect DDoS attacks on cloud computing environment. In: Proceedings of 12th International Conference on Information Technology-New Generations, pp. 212–217, 13–15 Apr 2015
19.
Zurück zum Zitat Arshad, J., Townend, P., Xu, J.: A novel intrusion severity analysis approach for clouds. Future Gener. Comput. Syst. 29(1), 416–428 (2013)CrossRef Arshad, J., Townend, P., Xu, J.: A novel intrusion severity analysis approach for clouds. Future Gener. Comput. Syst. 29(1), 416–428 (2013)CrossRef
20.
Zurück zum Zitat Selvi, M., Logambigai, R., Ganapathy, S., Khanna Nehemiah, H., Kannan, A.: An intelligent agent and FSO based efficient routing algorithm for wireless sensor network. In: Second International Conference on Recent Trends and Challenges in Computational Models (ICRTCCM), IEEE, pp. 100–105 (2017) Selvi, M., Logambigai, R., Ganapathy, S., Khanna Nehemiah, H., Kannan, A.: An intelligent agent and FSO based efficient routing algorithm for wireless sensor network. In: Second International Conference on Recent Trends and Challenges in Computational Models (ICRTCCM), IEEE, pp. 100–105 (2017)
21.
Zurück zum Zitat Selvi, M., Logambigai, R., Ganapathy, S., Sai Ramesh, L., Khanna Nehemiah, H., Kannan, A.: Fuzzy temporal approach for energy efficient routing in WSN. In: Proceedings of the International Conference on Informatics and Analytics, ACM, pp. 1–5 (2016) Selvi, M., Logambigai, R., Ganapathy, S., Sai Ramesh, L., Khanna Nehemiah, H., Kannan, A.: Fuzzy temporal approach for energy efficient routing in WSN. In: Proceedings of the International Conference on Informatics and Analytics, ACM, pp. 1–5 (2016)
22.
Zurück zum Zitat Selvi, M., Nandhini, C., Thangaramya, K., Kulothungan, K., Kannan, A.: HBO based clustering and energy optimized routing algorithm for WSN. In: Eighth International Conference on Advanced Computing (ICoAC), IEEE, pp. 89–92 (2016) Selvi, M., Nandhini, C., Thangaramya, K., Kulothungan, K., Kannan, A.: HBO based clustering and energy optimized routing algorithm for WSN. In: Eighth International Conference on Advanced Computing (ICoAC), IEEE, pp. 89–92 (2016)
24.
Zurück zum Zitat Munuswamy, S., Saravanakumar, J.M., Sannasi, G., Harichandran, K.N., Arputharaj, K.: Virtual force-based intelligent clustering for energy-efficient routing in mobile wireless sensor networks. Turk. J. Electr. Eng. Comput. Sci. (2017). https://doi.org/10.3906/elk-1706-226 Munuswamy, S., Saravanakumar, J.M., Sannasi, G., Harichandran, K.N., Arputharaj, K.: Virtual force-based intelligent clustering for energy-efficient routing in mobile wireless sensor networks. Turk. J. Electr. Eng. Comput. Sci. (2017). https://​doi.​org/​10.​3906/​elk-1706-226
25.
Zurück zum Zitat Sindhu, S.S.S., Geetha, S., Kannan, A.: Decision tree based light weight intrusion detection using a wrapper approach. Exp. Syst. Appl. 39(1), 129–141 (2012)CrossRef Sindhu, S.S.S., Geetha, S., Kannan, A.: Decision tree based light weight intrusion detection using a wrapper approach. Exp. Syst. Appl. 39(1), 129–141 (2012)CrossRef
26.
Zurück zum Zitat Chonka, A., Xiang, Y., Zhou, W., Bonti, A.: Cloud security defence to protect cloud computing against HTTP-DoS and XML-DoS attacks. J. Netw. Comput. Appl. 34(4), 1097–1107 (2011)CrossRef Chonka, A., Xiang, Y., Zhou, W., Bonti, A.: Cloud security defence to protect cloud computing against HTTP-DoS and XML-DoS attacks. J. Netw. Comput. Appl. 34(4), 1097–1107 (2011)CrossRef
27.
Zurück zum Zitat Wu, Y., Tseng, H., Yang, W., Jan, R.: DDoS detection and traceback with decision tree and grey relational analysis. In: Third International Conference on Multimedia and Ubiquitous Engineering (MUE), Qingdao, China, pp. 306–314, 4–6 June 2009 (2009) Wu, Y., Tseng, H., Yang, W., Jan, R.: DDoS detection and traceback with decision tree and grey relational analysis. In: Third International Conference on Multimedia and Ubiquitous Engineering (MUE), Qingdao, China, pp. 306–314, 4–6 June 2009 (2009)
29.
Zurück zum Zitat Oktay, U., Sahingoz, O.K.: Attack types and intrusion detection systems in cloud computing. In: Proceedings of 6th International Conference on Information Security & Cryptology, pp. 71–76, 23-24 May 2013 Oktay, U., Sahingoz, O.K.: Attack types and intrusion detection systems in cloud computing. In: Proceedings of 6th International Conference on Information Security & Cryptology, pp. 71–76, 23-24 May 2013
Metadaten
Titel
Detection of DoS attacks in cloud networks using intelligent rule based classification system
verfasst von
Rakesh Rajendran
S. V. N. Santhosh Kumar
Yogesh Palanichamy
Kannan Arputharaj
Publikationsdatum
23.02.2018
Verlag
Springer US
Erschienen in
Cluster Computing / Ausgabe Sonderheft 1/2019
Print ISSN: 1386-7857
Elektronische ISSN: 1573-7543
DOI
https://doi.org/10.1007/s10586-018-2181-4

Weitere Artikel der Sonderheft 1/2019

Cluster Computing 1/2019 Zur Ausgabe