an approach to detect DDoS attacks in the cloud computing environment using entropy and particle swarm optimization
Subject Areas : Electronics Engineeringmehdi asayeshjoo 1 , Mehdi sadeghzadeh 2 , maziyar ganjoo 3
1 - computer of department,azad university,booshehr,iran
2 - Department of Computer Engineering, Faculty of Engineering, Mahshahr Branch, Islamic Azad University, Mahshahr, Iran
3 - computer of department ,azad university ,booshehr,iran
Keywords: Attack detection, cloud computing, particle swarm optimization, Entropy,
Abstract :
Cloud computing is an emerging technology that is widely used to provide computing, data storage services and other remote resources over the Internet. Availability of cloud services is one of the most important concerns of cloud service providers. While cloud services are mainly transmitted over the Internet, they are prone to various attacks that may lead to the leakage of sensitive information. Distributed DDoS attack is known as one of the most important security threats to the cloud computing environment. This attack is an explicit attempt by an attacker to block or deny access to shared services or resources in a cloud environment. This paper discusses a hybrid approach to dealing with DDoS attack in the cloud computing environment. This method highlights the importance of effective feature-based selection methods and classification models. Here, an entropy-based approach and particle swarm optimization to counter these attacks in a cloud computing environment is presented. Classification on high-dimensional data typically requires feature selection as a pre-processing step to reduce the dimensionality. However, effective features selecting is a challenging task, which in this paper uses particle swarm optimization. Here, the proposed classification model is developed based on the use of a balanced binary search tree and dictionary data structure. The simulation is based on the NSL-KDD and CICDDoS2019 datasets, which prove the superiority of the proposed method with an average detection accuracy of 99.84% over the AGA and E-SVM algorithms.
[1] S. Q. A. Shah , F. Z. Khan and M. Ahmad “The impact and mitigation of ICMP based economic denial of sustainability attack in cloud computing environment using software defined network.” Computer Networks, vol.187, pp.107825, 2021.
[2] M. Haddadi and R. Beghdad “A Confidence Interval Based Filtering Against DDoS Attack in Cloud Environment: A Confidence Interval Against DDoS Attack in the Cloud.” International Journal of Information Security and Privacy (IJISP), vol.14,no.4, pp.42-56, 2020.
[3] R. SaiSindhuTheja and G. K. Shyam “An efficient metaheuristic algorithm based feature selection and recurrent neural network for DoS attack detection in cloud computing environment.” Applied Soft Computing, vol.100, pp.106997, 2021.
[4] O. Osanaiye, K. K. R. Choo and M. Dlodlo “Distributed denial of service (DDoS) resilience in cloud: Review and conceptual cloud DDoS mitigation framework.” Journal of Network and Computer Applications, vol.67, pp.147-165, 2016.
[5] P. S. Bawa, S. U. Rehman and S. Manickam “Enhanced mechanism to detect and mitigate economic denial of sustainability (EDoS) attack in cloud computing environments.” Int. J. Adv. Comput. Sci. Appl, vol.8, no.9, pp.51-58, 2017.
[6] H. A. Kholidy, “Detecting impersonation attacks in cloud computing environments using a centric user profiling approach.” Future Generation Computer Systems, vol.117, pp.299-320, 2021.
[7] S. Subashini and V. Kavitha “A survey on security issues in service delivery models of cloud computing.” Journal of network and computer applications, vol.34, no.1, pp.1-11, 2011.
[8] N. Agrawal and S. Tapaswi “Defense mechanisms against DDoS attacks in a cloud computing environment: State-of-the-art and research challenges.” IEEE Communications Surveys & Tutorials, vol.21, no.4, pp.3769-3795, 2019.
[9] G. Somani., M. S. Gaur, D. Sanghi, M. Conti and R. Buyya “DDoS attacks in cloud computing: Issues, taxonomy, and future directions.” Computer Communications, vol.107, pp.30-48, 2017
[10] A. Praseed and P. S. Thilagam “DDoS attacks at the application layer: Challenges and research perspectives for safeguarding Web applications.” IEEE Communications Surveys & Tutorials, vol.21, no.1, pp. 661-685, 2018.
[11] G. Somani, M. S. Gaur, D. Sanghi, , M. Conti, M. Rajarajan and R. Buyya “Combating DDoS attacks in the cloud: requirements, trends, and future directions.” IEEE Cloud Computing, vol.4,no.1, pp.22-32, 2017.
[12] A. Shameli-Sendi, M. Pourzandi, M. Fekih-Ahmed and M. Cheriet “Taxonomy of distributed denial of service mitigation approaches for cloud computing.” Journal of Network and Computer Applications, vol.58, pp.165-179, 2015.
[13] S. T. Zargar, J. Joshi and D. Tipper “A survey of defense mechanisms against distributed denial of service (DDoS) flooding attacks.” IEEE communications surveys & tutorials, vol.15,no.4, pp.2046-2069, 2013.
[14] N. Agrawal and S. Tapaswi “A lightweight approach to detect the low/high rate IP spoofed cloud DDoS attacks.” in IEEE 7th International Symposium on Cloud and Service Computing (SC2),2017, pp. 118-123.
[15] G. I. Shidaganti, A. S. Inamdar, S. V. Rai and A. M. Rajeev “SCEF: A model for prevention of DDoS attacks from the cloud.” International Journal of Cloud Applications and Computing (IJCAC), vol.10, no.3,pp. 67-80, 2020.
[16] H. F. El-Sofany “A New Cybersecurity Approach for Protecting Cloud Services against DDoS Attacks.” International Journal of Intelligent Engineering and Systems, vol.13,no.2,pp. 205-215, 2020.
[17] A. Bhardwaj, V. Mangat, R. Vig, , S. Halder, and, M. Conti ”Distributed denial of service attacks in cloud: State-of-the-art of scientific and commercial solutions.” Computer Science Review, vol.39, pp.100332, 2021.
[18] A. Saied, R. E. Overill and T. Radzik “Detection of known and unknown DDoS attacks using Artificial Neural Networks.” Neurocomputing, vol.172, pp.385-393, 2016.
[19] S. Rastegari, P. Hingston and C. P. Lam “Evolving statistical rulesets for network intrusion detection.” Applied soft computing, vol.33, pp.348-359, 2015.
[20] N. K. Kanakarajan and, K. Muniasamy”Improving the accuracy of intrusion detection using gar-forest with feature selection.” In Proceedings of the 4th International Conference on Frontiers in Intelligent Computing: Theory and Applications (FICTA), 2015, pp. 539-547.
[21] B. Ingre and A. Yadav “Performance analysis of NSL-KDD dataset using ANN.” in international conference on signal processing and communication engineering systems,2015, pp. 92-96.
[22] S. M. H. Bamakan, H. Wang, T. Yingjie and Y. Shi “An effective intrusion detection framework based on MCLP/SVM optimized by time-varying chaos particle swarm optimization.” Neurocomputing, vol.199, pp.90-102, 2016.
[23] M. Ghalehgolabi and A. Rezaeipanah “Intrusion Detection System Using Genetic Algorithm and Data Mining Techniques Based on the Reduction.” International Journal of Computer Applications Technology and Research, vol.6,no.11, pp.461-466, 2017.
[24] C. Yang “Anomaly network traffic detection algorithm based on information entropy measurement under the cloud computing environment.” Cluster Computing, vol.22,no.4, pp.8309-8317, 2019.
[25], N. Agrawal, and, S. Tapaswi “An SDN-Assisted Defense Mechduanism for the Shrew DDoS Attack in a Cloud Computing Environment.” Journal of Network and Systems Management, vol.29,no.2, pp.1-28, 2021.
[26], A. Sharma, , C. Agrawal, , A. Singh, and, K. Kumar “Real-time DDoS detection bsed on entropy using Hadoop framework.” In Computing in Engineering and Technology,2020, pp. 297-305.
[27] K. B. Virupakshar, M. Asundi, K. Channal, P. Shettar, S. Patil, and D. G. Narayan, “Distributed denial of service (DDoS) attacks detection system for OpenStack-based private cloud”, Procedia Computer Science, vol.167, pp.2297-2307, 2020.
[28] A. B. Dehkordi, M. Soltanaghaei, and F. Z. Boroujeni, “The DDoS attacks detection through machine learning and statistical methods in SDN”. The Journal of Supercomputing, vol.77, no.3,pp. 2383-2415, 2021.
[29] D. Kshirsagar, and S. Kumar , “A feature reduction based reflected and exploited DDoS attacks detection system”, Journal of Ambient Intelligence and Humanized Computing,vol.13,no.3, pp.1-13, 2021.
[30] Nsl-kdd data set for network based intrusion detection systems.” Available on: http://nsl.cs.unb.ca/KDD/NSL-KDD.html, November 2020.
[31] I. Sharafaldin, A. H. Lashkari, S. Hakak, and A. A. Ghorbani “Developing realistic distributed denial of service (DDoS) attack dataset and taxonomy.” In International Carnahan Conference on Security Technology (ICCST), 2019, pp. 1-8.
_||_[1] S. Q. A. Shah , F. Z. Khan and M. Ahmad “The impact and mitigation of ICMP based economic denial of sustainability attack in cloud computing environment using software defined network.” Computer Networks, vol.187, pp.107825, 2021.
[2] M. Haddadi and R. Beghdad “A Confidence Interval Based Filtering Against DDoS Attack in Cloud Environment: A Confidence Interval Against DDoS Attack in the Cloud.” International Journal of Information Security and Privacy (IJISP), vol.14,no.4, pp.42-56, 2020.
[3] R. SaiSindhuTheja and G. K. Shyam “An efficient metaheuristic algorithm based feature selection and recurrent neural network for DoS attack detection in cloud computing environment.” Applied Soft Computing, vol.100, pp.106997, 2021.
[4] O. Osanaiye, K. K. R. Choo and M. Dlodlo “Distributed denial of service (DDoS) resilience in cloud: Review and conceptual cloud DDoS mitigation framework.” Journal of Network and Computer Applications, vol.67, pp.147-165, 2016.
[5] P. S. Bawa, S. U. Rehman and S. Manickam “Enhanced mechanism to detect and mitigate economic denial of sustainability (EDoS) attack in cloud computing environments.” Int. J. Adv. Comput. Sci. Appl, vol.8, no.9, pp.51-58, 2017.
[6] H. A. Kholidy, “Detecting impersonation attacks in cloud computing environments using a centric user profiling approach.” Future Generation Computer Systems, vol.117, pp.299-320, 2021.
[7] S. Subashini and V. Kavitha “A survey on security issues in service delivery models of cloud computing.” Journal of network and computer applications, vol.34, no.1, pp.1-11, 2011.
[8] N. Agrawal and S. Tapaswi “Defense mechanisms against DDoS attacks in a cloud computing environment: State-of-the-art and research challenges.” IEEE Communications Surveys & Tutorials, vol.21, no.4, pp.3769-3795, 2019.
[9] G. Somani., M. S. Gaur, D. Sanghi, M. Conti and R. Buyya “DDoS attacks in cloud computing: Issues, taxonomy, and future directions.” Computer Communications, vol.107, pp.30-48, 2017
[10] A. Praseed and P. S. Thilagam “DDoS attacks at the application layer: Challenges and research perspectives for safeguarding Web applications.” IEEE Communications Surveys & Tutorials, vol.21, no.1, pp. 661-685, 2018.
[11] G. Somani, M. S. Gaur, D. Sanghi, , M. Conti, M. Rajarajan and R. Buyya “Combating DDoS attacks in the cloud: requirements, trends, and future directions.” IEEE Cloud Computing, vol.4,no.1, pp.22-32, 2017.
[12] A. Shameli-Sendi, M. Pourzandi, M. Fekih-Ahmed and M. Cheriet “Taxonomy of distributed denial of service mitigation approaches for cloud computing.” Journal of Network and Computer Applications, vol.58, pp.165-179, 2015.
[13] S. T. Zargar, J. Joshi and D. Tipper “A survey of defense mechanisms against distributed denial of service (DDoS) flooding attacks.” IEEE communications surveys & tutorials, vol.15,no.4, pp.2046-2069, 2013.
[14] N. Agrawal and S. Tapaswi “A lightweight approach to detect the low/high rate IP spoofed cloud DDoS attacks.” in IEEE 7th International Symposium on Cloud and Service Computing (SC2),2017, pp. 118-123.
[15] G. I. Shidaganti, A. S. Inamdar, S. V. Rai and A. M. Rajeev “SCEF: A model for prevention of DDoS attacks from the cloud.” International Journal of Cloud Applications and Computing (IJCAC), vol.10, no.3,pp. 67-80, 2020.
[16] H. F. El-Sofany “A New Cybersecurity Approach for Protecting Cloud Services against DDoS Attacks.” International Journal of Intelligent Engineering and Systems, vol.13,no.2,pp. 205-215, 2020.
[17] A. Bhardwaj, V. Mangat, R. Vig, , S. Halder, and, M. Conti ”Distributed denial of service attacks in cloud: State-of-the-art of scientific and commercial solutions.” Computer Science Review, vol.39, pp.100332, 2021.
[18] A. Saied, R. E. Overill and T. Radzik “Detection of known and unknown DDoS attacks using Artificial Neural Networks.” Neurocomputing, vol.172, pp.385-393, 2016.
[19] S. Rastegari, P. Hingston and C. P. Lam “Evolving statistical rulesets for network intrusion detection.” Applied soft computing, vol.33, pp.348-359, 2015.
[20] N. K. Kanakarajan and, K. Muniasamy”Improving the accuracy of intrusion detection using gar-forest with feature selection.” In Proceedings of the 4th International Conference on Frontiers in Intelligent Computing: Theory and Applications (FICTA), 2015, pp. 539-547.
[21] B. Ingre and A. Yadav “Performance analysis of NSL-KDD dataset using ANN.” in international conference on signal processing and communication engineering systems,2015, pp. 92-96.
[22] S. M. H. Bamakan, H. Wang, T. Yingjie and Y. Shi “An effective intrusion detection framework based on MCLP/SVM optimized by time-varying chaos particle swarm optimization.” Neurocomputing, vol.199, pp.90-102, 2016.
[23] M. Ghalehgolabi and A. Rezaeipanah “Intrusion Detection System Using Genetic Algorithm and Data Mining Techniques Based on the Reduction.” International Journal of Computer Applications Technology and Research, vol.6,no.11, pp.461-466, 2017.
[24] C. Yang “Anomaly network traffic detection algorithm based on information entropy measurement under the cloud computing environment.” Cluster Computing, vol.22,no.4, pp.8309-8317, 2019.
[25], N. Agrawal, and, S. Tapaswi “An SDN-Assisted Defense Mechduanism for the Shrew DDoS Attack in a Cloud Computing Environment.” Journal of Network and Systems Management, vol.29,no.2, pp.1-28, 2021.
[26], A. Sharma, , C. Agrawal, , A. Singh, and, K. Kumar “Real-time DDoS detection bsed on entropy using Hadoop framework.” In Computing in Engineering and Technology,2020, pp. 297-305.
[27] K. B. Virupakshar, M. Asundi, K. Channal, P. Shettar, S. Patil, and D. G. Narayan, “Distributed denial of service (DDoS) attacks detection system for OpenStack-based private cloud”, Procedia Computer Science, vol.167, pp.2297-2307, 2020.
[28] A. B. Dehkordi, M. Soltanaghaei, and F. Z. Boroujeni, “The DDoS attacks detection through machine learning and statistical methods in SDN”. The Journal of Supercomputing, vol.77, no.3,pp. 2383-2415, 2021.
[29] D. Kshirsagar, and S. Kumar , “A feature reduction based reflected and exploited DDoS attacks detection system”, Journal of Ambient Intelligence and Humanized Computing,vol.13,no.3, pp.1-13, 2021.
[30] Nsl-kdd data set for network based intrusion detection systems.” Available on: http://nsl.cs.unb.ca/KDD/NSL-KDD.html, November 2020.
[31] I. Sharafaldin, A. H. Lashkari, S. Hakak, and A. A. Ghorbani “Developing realistic distributed denial of service (DDoS) attack dataset and taxonomy.” In International Carnahan Conference on Security Technology (ICCST), 2019, pp. 1-8.