Skip to main content
Top

2021 | OriginalPaper | Chapter

An HTTP DDoS Detection Model Using Machine Learning Techniques for the Cloud Environment

Authors : N. Muraleedharan, B. Janet

Published in: Advances in Computing and Network Communications

Publisher: Springer Singapore

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

The cloud computing platform has been evolved as an essential computing paradigm for today's world. As the cloud environment mainly focuses on the service model, to ensure the availability of these services to the intended user is an essential requirement. In this paper, an HTTP DDoS detection model for the cloud environment is presented. The proposed system uses machine learning-based classifiers on network flow data. Four tree-based classifiers, i.e., decision tree, random forest, XGBoost, and AdaBoost are applied to the identified parameters. The CIDDS-001 dataset were used for training and evaluation. Results obtained show that the proposed classifier can achieve 99.99% accuracy using the random forest classifier. Comparing the obtained results with the recent works available in the literature shows the proposed model outperforms it in the classification accuracy.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference P. Mell, T. Grance, in The NIST definition of cloud computing. Computer Security Division, Information Technology Laboratory, National Institute of Standards and Technology, Sept 2011 P. Mell, T. Grance, in The NIST definition of cloud computing. Computer Security Division, Information Technology Laboratory, National Institute of Standards and Technology, Sept 2011
3.
go back to reference Z. Xiao, Y. Xiao, Security and Privacy in Cloud Computing. IEEE Commun. Surv. Tutor. 15(2), 843–859 (2013)CrossRef Z. Xiao, Y. Xiao, Security and Privacy in Cloud Computing. IEEE Commun. Surv. Tutor. 15(2), 843–859 (2013)CrossRef
5.
go back to reference C. Rossow, in Amplification Hell: Revisiting Network Protocols for DDoS Abuse (2014). C. Rossow, in Amplification Hell: Revisiting Network Protocols for DDoS Abuse (2014).
6.
go back to reference F.J. Ryba, M. Orlinski, M. Wählisch, C. Rossow, T.C. Schmidt, in Amplification and DRDoS Attack Defense—A survey and New Perspectives. arXiv preprint arXiv:1505.07892 (2015) F.J. Ryba, M. Orlinski, M. Wählisch, C. Rossow, T.C. Schmidt, in Amplification and DRDoS Attack Defense—A survey and New Perspectives. arXiv preprint arXiv:​1505.​07892 (2015)
7.
go back to reference N. Muraleedharan, B. Janet, Behaviour analysis of HTTP based slow denial of service attack, in 2017 International Conference on Wireless Communications, Signal Processing and Networking (WiSPNET) (2017), pp. 1851–1856 N. Muraleedharan, B. Janet, Behaviour analysis of HTTP based slow denial of service attack, in 2017 International Conference on Wireless Communications, Signal Processing and Networking (WiSPNET) (2017), pp. 1851–1856
9.
go back to reference T. Zhang, Y. Zhang, R.B. Lee, Dos attacks on your memory in cloud, in Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security (2017), pp. 253–265 T. Zhang, Y. Zhang, R.B. Lee, Dos attacks on your memory in cloud, in Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security (2017), pp. 253–265
10.
go back to reference M. Masdari, M. Jalali, A survey and taxonomy of DoS attacks in cloud computing. Secur. Commun. Networks 9(16), 3724–3751 (2016)CrossRef M. Masdari, M. Jalali, A survey and taxonomy of DoS attacks in cloud computing. Secur. Commun. Networks 9(16), 3724–3751 (2016)CrossRef
11.
go back to reference G. Somani, M.S. Gaur, D. Sanghi, M. Conti, R. Buyya, DDoS attacks in cloud computing: Issues, taxonomy, and future directions. Comput. Commun. 107, 30–48 (2017)CrossRef G. Somani, M.S. Gaur, D. Sanghi, M. Conti, R. Buyya, DDoS attacks in cloud computing: Issues, taxonomy, and future directions. Comput. Commun. 107, 30–48 (2017)CrossRef
12.
go back to reference N. Agrawal, S. Tapaswi, Defense mechanisms against DDoS attacks in a cloud computing environment: State-of-the-art and research challenges. IEEE Commun. Surv. Tutorials 21(4), 3769–3795 (2019)CrossRef N. Agrawal, S. Tapaswi, Defense mechanisms against DDoS attacks in a cloud computing environment: State-of-the-art and research challenges. IEEE Commun. Surv. Tutorials 21(4), 3769–3795 (2019)CrossRef
13.
go back to reference G. Somani, M.S. Gaur, D. Sanghi, DDoS/EDoS attack in cloud: affecting everyone out there!, in Proceedings of the 8th International Conference on Security of Information and Networks (2015), pp. 169–176 G. Somani, M.S. Gaur, D. Sanghi, DDoS/EDoS attack in cloud: affecting everyone out there!, in Proceedings of the 8th International Conference on Security of Information and Networks (2015), pp. 169–176
15.
go back to reference M. Idhammad, K. Afdel, M. Belouch, Detection system of HTTP DDoS attacks in a cloud environment based on information theoretic entropy and random forest, in Security and Communication Networks, vol. 2018 (2018) M. Idhammad, K. Afdel, M. Belouch, Detection system of HTTP DDoS attacks in a cloud environment based on information theoretic entropy and random forest, in Security and Communication Networks, vol. 2018 (2018)
16.
go back to reference J. David, C. Thomas, DDoS attack detection using fast entropy approach on flow-based network traffic. Procedia Comput. Sci. 50(4), 30–36 (2015)CrossRef J. David, C. Thomas, DDoS attack detection using fast entropy approach on flow-based network traffic. Procedia Comput. Sci. 50(4), 30–36 (2015)CrossRef
17.
go back to reference M. Zekri, S. El Kafhali, N. Aboutabit, Y. Saadi, DDoS attack detection using machine learning techniques in cloud computing environments, in 2017 3rd International Conference of Cloud Computing Technologies and Applications (CloudTech) (2017), pp. 1–7 M. Zekri, S. El Kafhali, N. Aboutabit, Y. Saadi, DDoS attack detection using machine learning techniques in cloud computing environments, in 2017 3rd International Conference of Cloud Computing Technologies and Applications (CloudTech) (2017), pp. 1–7
19.
go back to reference D.J. Prathyusha, S. Naseera, D.J. Anusha, K. Alisha, A review of biologically inspired algorithms in a cloud environment to combat DDoS attacks, in Smart Intelligent Computing and Applications, vol. 160, ed. by S.C. Satapathy, V. Bhateja, J.R. Mohanty, S.K. Udgata (Springer, Singapore, 2020), pp. 59–68CrossRef D.J. Prathyusha, S. Naseera, D.J. Anusha, K. Alisha, A review of biologically inspired algorithms in a cloud environment to combat DDoS attacks, in Smart Intelligent Computing and Applications, vol. 160, ed. by S.C. Satapathy, V. Bhateja, J.R. Mohanty, S.K. Udgata (Springer, Singapore, 2020), pp. 59–68CrossRef
20.
go back to reference A. Sperotto, G. Schaffrath, R. Sadre, C. Morariu, A. Pras, B. Stiller, An overview of IP flow-based intrusion detection. IEEE Commun. Surv. Tutor. 12(3), 343–356 (2010)CrossRef A. Sperotto, G. Schaffrath, R. Sadre, C. Morariu, A. Pras, B. Stiller, An overview of IP flow-based intrusion detection. IEEE Commun. Surv. Tutor. 12(3), 343–356 (2010)CrossRef
21.
go back to reference M. Ring, S. Wunderlich, D. Grüdl, D. Landes, A. Hotho, Creation of flow-based data sets for intrusion detection. J. Inform. Warfare 16(4), 40–53 (2017) M. Ring, S. Wunderlich, D. Grüdl, D. Landes, A. Hotho, Creation of flow-based data sets for intrusion detection. J. Inform. Warfare 16(4), 40–53 (2017)
22.
go back to reference M. Ring, S. Wunderlich, D. Grüdl, D. Landes, A. Hotho, Flow-based benchmark data sets for intrusion detection, in Proceedings of the 16th European Conference on Cyber Warfare and Security (ECCWS) (ACPI, 2017), pp. 361–369 M. Ring, S. Wunderlich, D. Grüdl, D. Landes, A. Hotho, Flow-based benchmark data sets for intrusion detection, in Proceedings of the 16th European Conference on Cyber Warfare and Security (ECCWS) (ACPI, 2017), pp. 361–369
24.
go back to reference F. Pedregosa, et al., Scikit-learn: machine learning in Python. J. Mach. Learn. Res. 12, 2825–2830 (2011) F. Pedregosa, et al., Scikit-learn: machine learning in Python. J. Mach. Learn. Res. 12, 2825–2830 (2011)
Metadata
Title
An HTTP DDoS Detection Model Using Machine Learning Techniques for the Cloud Environment
Authors
N. Muraleedharan
B. Janet
Copyright Year
2021
Publisher
Springer Singapore
DOI
https://doi.org/10.1007/978-981-33-6977-1_50