Skip to main content
Top

2016 | OriginalPaper | Chapter

Detecting the Origin of DDoS Attacks in OpenStack Cloud Platform Using Data Mining Techniques

Authors : Konstantin Borisenko, Andrey Rukavitsyn, Andrei Gurtov, Andrey Shorov

Published in: Internet of Things, Smart Spaces, and Next Generation Networks and Systems

Publisher: Springer International Publishing

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

The paper presents the results of the design and implementation of detection system against DDoS attacks for OpenStack cloud computing platform. Proposed system uses data mining techniques to detect malicious traffic. Formal models of detecting components are described. To train data mining models real legitimate traffic was combined with modelled malicious one. Paper presents results of detecting the origin of DDoS attacks on cloud instances.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
4.
go back to reference Munz, G., Li, S., Carle, G.: Traffic anomaly detection using k-means clustering. In: GI/ITG Workshop MMBnet (2007) Munz, G., Li, S., Carle, G.: Traffic anomaly detection using k-means clustering. In: GI/ITG Workshop MMBnet (2007)
8.
go back to reference Delimitrou, C., Kozyrakis, C.: Security Implications of Data Mining in Cloud Scheduling. IEEE Comput. Arch. Lett. 1–1 (2015) Delimitrou, C., Kozyrakis, C.: Security Implications of Data Mining in Cloud Scheduling. IEEE Comput. Arch. Lett. 1–1 (2015)
9.
go back to reference Dou, W., Chen, Q., Chen, J.: A confidence-based filtering method for DDoS attack defense in cloud environment. Future Gen. Comput. Syst. 29, 1838–1850 (2013)CrossRef Dou, W., Chen, Q., Chen, J.: A confidence-based filtering method for DDoS attack defense in cloud environment. Future Gen. Comput. Syst. 29, 1838–1850 (2013)CrossRef
10.
go back to reference Vieira, K., Schulter, A., Westphall, C., Westphall, C.: Intrusion detection for grid and cloud computing. IT Prof. 12, 38–43 (2010)CrossRef Vieira, K., Schulter, A., Westphall, C., Westphall, C.: Intrusion detection for grid and cloud computing. IT Prof. 12, 38–43 (2010)CrossRef
11.
go back to reference Zolotukhin, M., Hamalainen, T., Kokkonen, T., et al.: Data mining approach for detection of DDoS attacks utilizing SSL/TLS protocol. In: 15th International Conference, NEW2AN 2015, St. Petersburg, Russia, pp. 274–285 (2015) Zolotukhin, M., Hamalainen, T., Kokkonen, T., et al.: Data mining approach for detection of DDoS attacks utilizing SSL/TLS protocol. In: 15th International Conference, NEW2AN 2015, St. Petersburg, Russia, pp. 274–285 (2015)
12.
go back to reference Bekeneva, Y., Borisenko, K., Shorov, A., Kotenko, I.: Investigation of DDoS attacks by hybrid simulation. In: Khalil, I., et al. (eds.) ICT-EurAsia 2015 and CONFENIS 2015. LNCS, vol. 9357, pp. 179–189. Springer, Heidelberg (2015). doi:10.1007/978-3-319-24315-3_18 CrossRef Bekeneva, Y., Borisenko, K., Shorov, A., Kotenko, I.: Investigation of DDoS attacks by hybrid simulation. In: Khalil, I., et al. (eds.) ICT-EurAsia 2015 and CONFENIS 2015. LNCS, vol. 9357, pp. 179–189. Springer, Heidelberg (2015). doi:10.​1007/​978-3-319-24315-3_​18 CrossRef
13.
go back to reference Borisenko, K., Smirnov, A., Novikova, E., Shorov, A.: DDoS attacks detection in cloud computing using data mining techniques. In: Perner, P. (ed.) ICDM 2016. LNCS (LNAI), vol. 9728, pp. 197–211. Springer, Heidelberg (2016). doi:10.1007/978-3-319-41561-1_15 CrossRef Borisenko, K., Smirnov, A., Novikova, E., Shorov, A.: DDoS attacks detection in cloud computing using data mining techniques. In: Perner, P. (ed.) ICDM 2016. LNCS (LNAI), vol. 9728, pp. 197–211. Springer, Heidelberg (2016). doi:10.​1007/​978-3-319-41561-1_​15 CrossRef
Metadata
Title
Detecting the Origin of DDoS Attacks in OpenStack Cloud Platform Using Data Mining Techniques
Authors
Konstantin Borisenko
Andrey Rukavitsyn
Andrei Gurtov
Andrey Shorov
Copyright Year
2016
DOI
https://doi.org/10.1007/978-3-319-46301-8_25

Premium Partner