Collaborative 'many to many' DDoS detection in cloud

被引:2
|
作者
Ma, Siqi [1 ]
Lo, David [1 ]
Xi, Ning [2 ]
机构
[1] Singapore Management Univ, Sch Informat Syst, Singapore 178902, Singapore
[2] Xidian Univ, Sch Comp Sci & Technol, Xian 710071, Shaanxi, Peoples R China
关键词
cloud computing; DDoS detection; collaborative detection; matrix factorisation; INTRUSION DETECTION SYSTEMS; ATTACKS; EFFICIENT; PROTOCOL;
D O I
10.1504/IJAHUC.2016.10000397
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Cloud computing provides a scalable and cost-effective environment for users to store and process data through the internet. However, it also causes distributed denial-of-service (DDoS) attacks. DDoS attacks risk systems outage and intend to disable the service to legitimate users. In this paper, due to the nature of its large-scale and coordinated attacks, we propose a collaborative prediction approach for detecting DDoS. Our approach provides a clean and direct solution to attack defense. The DDoS attacks follow certain patterns when employing a large number of compromised machines to request for service from the servers in the victim system. So we construct an attacker server utility matrix by the number of packets and adopt matrix factorisation to detect potential attackers collaboratively. We derive the latent attacker vectors and latent server vectors to predict the unknown entries in the matrix. Experimental results on the NS-2 simulation networks demonstrate the superiority of our approach.
引用
收藏
页码:192 / 202
页数:11
相关论文
共 50 条
  • [1] Time-based DDoS attack detection through hybrid LSTM-CNN model architectures: An investigation of many-to-one and many-to-many approaches
    Habib, Beenish
    Khursheed, Farida
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2024, 36 (09):
  • [2] The many faces of collaborative planning and teaching
    Thousand, Jacqueline S.
    Villa, Richard A.
    Nevin, Ann I.
    THEORY INTO PRACTICE, 2006, 45 (03) : 239 - 248
  • [3] DETECTION OF MANY OUTLIERS
    ROSNER, B
    BIOMETRICS, 1974, 30 (02) : 384 - 385
  • [4] A Many-to-Many Demand and Response Hybrid Game Method for Cloud Environments
    Liu, Gang
    Xiao, Zheng
    Chronopoulos, Anthony Theodore
    Liu, Chubo
    Tang, Zhuo
    IEEE TRANSACTIONS ON CLOUD COMPUTING, 2022, 10 (01) : 158 - 171
  • [5] DETECTION OF MANY OUTLIERS
    ROSNER, B
    TECHNOMETRICS, 1975, 17 (02) : 221 - 227
  • [6] DDoS attack prevention using collaborative approach for cloud computing
    Saxena, Rajat
    Dey, Somnath
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2020, 23 (02): : 1329 - 1344
  • [7] DDoS attack prevention using collaborative approach for cloud computing
    Rajat Saxena
    Somnath Dey
    Cluster Computing, 2020, 23 : 1329 - 1344
  • [8] Many-Objective Cloud Task Scheduling
    Geng, Shaojin
    Wu, Di
    Wang, Penghong
    Cai, Xingjuan
    IEEE ACCESS, 2020, 8 : 79079 - 79088
  • [9] Many Still Cloudy on the Definition of Cloud Computing
    Mullan, Eileen
    ECONTENT, 2010, 33 (01) : 10 - 11
  • [10] Detection of DDOS Attacks in Cloud Computing Environment
    Hamdani, Farhaan Noor
    Siddiqui, Farheen
    PROCEEDINGS OF THE 2019 INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTING AND CONTROL SYSTEMS (ICCS), 2019, : 83 - 87