Skip to main content
Erschienen in: Neural Computing and Applications 4/2021

05.06.2020 | Original Article

Traffic classification in server farm using supervised learning techniques

verfasst von: V. Punitha, C. Mala

Erschienen in: Neural Computing and Applications | Ausgabe 4/2021

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Server farms used in web hosting and commercial applications connect multiple servers. Edge computing being a realm of cloud technology is orchestrated with server farms to enhance network efficiency. Edge computing increases the availability of cloud resources and Internet services. The higher availability of services and their ease of access deeply affect the user’s requesting behavior. The anomalous requesting behavior is creating malicious traffic, and enormous amount of such traffics at server farm denies the services to the legitimate users. Categorizing the incoming traffic into malicious and non-malicious traffic at server farm is the foremost criteria to eliminate the attacks, which in turn improves the QoS of the server farm. In the light of preventing the biased usage of the server farm, this paper proposes a SVM classifier based on requesting statistics. The proposed classifier discovers the attacks that deny services to legitimate users in two levels, based on the user’s request behavior. The pattern of arrival, its statistical characteristics and security misbehaviors are investigated at both levels. An incremental learning algorithm is proposed to enhance the learning plasticity of the proposed classifier. The experimental results illustrate that the performance of the proposed two-level classifier with respect to classification accuracy is competently improved with incremental learning.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Literatur
2.
Zurück zum Zitat Taleb T, Samdanis K, Mada B, Flinck H, Dutta S, Sabella D (2017) On multi-access edge computing: a survey of the emerging 5G network edge architecture & orchestration. IEEE Commun Surv Tutor 19(3):1657–1681CrossRef Taleb T, Samdanis K, Mada B, Flinck H, Dutta S, Sabella D (2017) On multi-access edge computing: a survey of the emerging 5G network edge architecture & orchestration. IEEE Commun Surv Tutor 19(3):1657–1681CrossRef
3.
Zurück zum Zitat Jayasinghe M, Tari Z, Zeephongsekul P, Zomaya AY (2011) Task assignment in multiple server farms using preemptive migration and flow control. J Parallel Distrib Comput 71(12):1608–1621CrossRef Jayasinghe M, Tari Z, Zeephongsekul P, Zomaya AY (2011) Task assignment in multiple server farms using preemptive migration and flow control. J Parallel Distrib Comput 71(12):1608–1621CrossRef
4.
Zurück zum Zitat Kuzmanovic A, Knightly EW (2003) Low- rate TCP-targeted denial of service attacks: the shrew vs. the mice and elephants. In: Conference on applications, technologies, architectures, and protocols for computer communications, pp 75–86. https://doi.org/10.1145/863955.863966 Kuzmanovic A, Knightly EW (2003) Low- rate TCP-targeted denial of service attacks: the shrew vs. the mice and elephants. In: Conference on applications, technologies, architectures, and protocols for computer communications, pp 75–86. https://​doi.​org/​10.​1145/​863955.​863966
5.
Zurück zum Zitat Finsterbusch M, Richter C, Rocha E, Muller JA, Hanssgen K (2014) A survey of payload-based traffic classification approaches. IEEE Commun Surv Tutor 16(2):1135–1156CrossRef Finsterbusch M, Richter C, Rocha E, Muller JA, Hanssgen K (2014) A survey of payload-based traffic classification approaches. IEEE Commun Surv Tutor 16(2):1135–1156CrossRef
6.
Zurück zum Zitat Tongaonkar A, Torres R, Iliofotou M, Keralapura R, Nucci A (2015) Towards self adaptive network traffic classification. Comput Commun 56(1):35–46CrossRef Tongaonkar A, Torres R, Iliofotou M, Keralapura R, Nucci A (2015) Towards self adaptive network traffic classification. Comput Commun 56(1):35–46CrossRef
7.
Zurück zum Zitat Zhang J, Chen X, Xiang Y, Zhou W, Jie W (2015) Robust network traffic classification. IEEE/ACM Trans Netw 23(4):1257–1270CrossRef Zhang J, Chen X, Xiang Y, Zhou W, Jie W (2015) Robust network traffic classification. IEEE/ACM Trans Netw 23(4):1257–1270CrossRef
8.
Zurück zum Zitat Peng L, Yang B, Chen Y (2015) Effective packet number for early stage internet traffic identification. Neurocomputing 156:252–267CrossRef Peng L, Yang B, Chen Y (2015) Effective packet number for early stage internet traffic identification. Neurocomputing 156:252–267CrossRef
9.
Zurück zum Zitat Huang CL, Dun JF (2008) A distributed PSO–SVM hybrid system with feature selection and parameter optimization. Appl Soft Comput 8(4):1381–1391CrossRef Huang CL, Dun JF (2008) A distributed PSO–SVM hybrid system with feature selection and parameter optimization. Appl Soft Comput 8(4):1381–1391CrossRef
10.
Zurück zum Zitat Carlin A, Hammoudeh M, Aldabbas O (2015) Defence for distributed denial of service attacks in cloud computing. Procedia Comput Sci 73:490–497CrossRef Carlin A, Hammoudeh M, Aldabbas O (2015) Defence for distributed denial of service attacks in cloud computing. Procedia Comput Sci 73:490–497CrossRef
11.
Zurück zum Zitat Tiwari D, Mallick B (2016) SVM and Naïve Bayes network traffic classification using correlation information. Int J Comput Appl 147(3):1–5 Tiwari D, Mallick B (2016) SVM and Naïve Bayes network traffic classification using correlation information. Int J Comput Appl 147(3):1–5
12.
Zurück zum Zitat Wang W, Zeng X, Ye X, Sheng Y, Zhu M (2017) Malware traffic classification using convolutional neural networks for representation learning. In: International conference on information networking lCOIN Wang W, Zeng X, Ye X, Sheng Y, Zhu M (2017) Malware traffic classification using convolutional neural networks for representation learning. In: International conference on information networking lCOIN
13.
Zurück zum Zitat Lim H, Yamaguchi Y, Shimada H, Takakura H (2015) Malware classification method based on sequence of traffic flow. In: International conference on information systems security and privacy (ICISSP) Lim H, Yamaguchi Y, Shimada H, Takakura H (2015) Malware classification method based on sequence of traffic flow. In: International conference on information systems security and privacy (ICISSP)
15.
Zurück zum Zitat Elejla OE, Anbar M, Belaton B, Alijla BO (2018) Flow-based ids for icmpv6-based ddos attacks detection. Arab J Sci Eng 43(12):7757–7775CrossRef Elejla OE, Anbar M, Belaton B, Alijla BO (2018) Flow-based ids for icmpv6-based ddos attacks detection. Arab J Sci Eng 43(12):7757–7775CrossRef
16.
Zurück zum Zitat Prasad K, Munivara A Rama, Mohan Reddy K, Rao V (2018) Ensemble classifiers with drift detection (ECDD) in traffic flow streams to detect DDOS attacks. Wirel Pers Commun 99(4):1639–1659CrossRef Prasad K, Munivara A Rama, Mohan Reddy K, Rao V (2018) Ensemble classifiers with drift detection (ECDD) in traffic flow streams to detect DDOS attacks. Wirel Pers Commun 99(4):1639–1659CrossRef
17.
Zurück zum Zitat Singh K, Singh P, Kumar K (2018) User behaviour analytics-based classification of application layer http-get flood attacks. J Netw Comput Appl 112:97–114CrossRef Singh K, Singh P, Kumar K (2018) User behaviour analytics-based classification of application layer http-get flood attacks. J Netw Comput Appl 112:97–114CrossRef
18.
Zurück zum Zitat Singh UK, Joshi C, Kanellopoulos D (2019) A framework for zero-day vulnerabilities detection and prioritization. J Inf Secur Appl 46:164–172 Singh UK, Joshi C, Kanellopoulos D (2019) A framework for zero-day vulnerabilities detection and prioritization. J Inf Secur Appl 46:164–172
19.
Zurück zum Zitat Perakovic D, Perisa M, Cvitic I, Husnjak S (2017) Model for detection and classification of ddos traffic based on artificial neural network. Telfor J 9(1):26CrossRef Perakovic D, Perisa M, Cvitic I, Husnjak S (2017) Model for detection and classification of ddos traffic based on artificial neural network. Telfor J 9(1):26CrossRef
20.
Zurück zum Zitat Vidal JM, Orozco ALS, Villalba LJG (2017) Alert correlation framework for malware detection by anomaly-based packet payload analysis. J Netw Comput Appl 97:11–22CrossRef Vidal JM, Orozco ALS, Villalba LJG (2017) Alert correlation framework for malware detection by anomaly-based packet payload analysis. J Netw Comput Appl 97:11–22CrossRef
21.
Zurück zum Zitat Idhammad M, Afdel K, Belouch M (2018) Semi-supervised machine learning approach for ddos detection. Appl Intell 48(10):3193–3208CrossRef Idhammad M, Afdel K, Belouch M (2018) Semi-supervised machine learning approach for ddos detection. Appl Intell 48(10):3193–3208CrossRef
22.
Zurück zum Zitat Behal S, Kumar K, Sachdeva M (2018) D-face: an anomaly based distributed approach for early detection of DDOS attacks and flash events. J Netw Comput Appl 111:49–63CrossRef Behal S, Kumar K, Sachdeva M (2018) D-face: an anomaly based distributed approach for early detection of DDOS attacks and flash events. J Netw Comput Appl 111:49–63CrossRef
23.
Zurück zum Zitat Wang C, Yao H, Liu Z (2019) An efficient ddos detection based on su-genetic feature selection. Clust Comput 22(1):2505–2515CrossRef Wang C, Yao H, Liu Z (2019) An efficient ddos detection based on su-genetic feature selection. Clust Comput 22(1):2505–2515CrossRef
24.
Zurück zum Zitat Zareapoor M, Pourya Shamsolmoali M, Alam A (2018) Advance ddos detection and mitigation technique for securing cloud. Int J Comput Sci Eng 16(3):303–310 Zareapoor M, Pourya Shamsolmoali M, Alam A (2018) Advance ddos detection and mitigation technique for securing cloud. Int J Comput Sci Eng 16(3):303–310
25.
Zurück zum Zitat Wang C, Miu TT, Luo X, Wang J (2018) Skyshield: a sketch-based defense system against application layer ddos attacks. IEEE Trans Inf Forensics Secur 13(3):559–573CrossRef Wang C, Miu TT, Luo X, Wang J (2018) Skyshield: a sketch-based defense system against application layer ddos attacks. IEEE Trans Inf Forensics Secur 13(3):559–573CrossRef
26.
Zurück zum Zitat Jazi HH, Gonzalez H, Stakhanova N, Ghorbani AA (2017) Detecting http-based application layer dos attacks on web servers in the presence of sampling. Comput Netw 121:25–36CrossRef Jazi HH, Gonzalez H, Stakhanova N, Ghorbani AA (2017) Detecting http-based application layer dos attacks on web servers in the presence of sampling. Comput Netw 121:25–36CrossRef
27.
Zurück zum Zitat Calvert K (2019) Impact of class distribution on the detection of slow HTTP DoS attacks using Big Data. J Big Data 6(1):67CrossRef Calvert K (2019) Impact of class distribution on the detection of slow HTTP DoS attacks using Big Data. J Big Data 6(1):67CrossRef
29.
Zurück zum Zitat Skala K, Davidovic D, Afgan E, Sovic I, Sojat Z (2015) Scalable distributed computing hierarchy: cloud, fog and dew computing. Open J Cloud Comput (OJCC) 2(1):16–24 Skala K, Davidovic D, Afgan E, Sovic I, Sojat Z (2015) Scalable distributed computing hierarchy: cloud, fog and dew computing. Open J Cloud Comput (OJCC) 2(1):16–24
30.
Zurück zum Zitat Li P, Dong L, Xiao H, Xu M (2015) A cloud image detection method based on SVM vector machine. Neurocomputing 169:34–42CrossRef Li P, Dong L, Xiao H, Xu M (2015) A cloud image detection method based on SVM vector machine. Neurocomputing 169:34–42CrossRef
31.
Zurück zum Zitat Viswanadham N, Narahari Y (2009) Performance modeling of automated manufacturing systems. PHI, New DelhiMATH Viswanadham N, Narahari Y (2009) Performance modeling of automated manufacturing systems. PHI, New DelhiMATH
33.
Zurück zum Zitat Dai W, Yang Q, Xue GR, Yu Y (2007) Boosting for transfer learning. In: International conference on machine learning ICML’07, pp 193–200 Dai W, Yang Q, Xue GR, Yu Y (2007) Boosting for transfer learning. In: International conference on machine learning ICML’07, pp 193–200
38.
Zurück zum Zitat Nguyen TT, Armitage G (2008) A survey of techniques for internet traffic classification using machine learning. IEEE Commun Surv Tutor 10(4):56–76CrossRef Nguyen TT, Armitage G (2008) A survey of techniques for internet traffic classification using machine learning. IEEE Commun Surv Tutor 10(4):56–76CrossRef
Metadaten
Titel
Traffic classification in server farm using supervised learning techniques
verfasst von
V. Punitha
C. Mala
Publikationsdatum
05.06.2020
Verlag
Springer London
Erschienen in
Neural Computing and Applications / Ausgabe 4/2021
Print ISSN: 0941-0643
Elektronische ISSN: 1433-3058
DOI
https://doi.org/10.1007/s00521-020-05030-2

Weitere Artikel der Ausgabe 4/2021

Neural Computing and Applications 4/2021 Zur Ausgabe

Premium Partner