A Confidence Interval Based Filtering Against DDoS Attack in Cloud Environment: A Confidence Interval Against DDoS Attack in the Cloud

被引:3
|
作者
Haddadi, Mohamed [1 ]
Beghdad, Rachid [1 ]
机构
[1] Univ Bejaia, Fac Sci Exactes, Dept Informat, Bejaia, Algeria
关键词
CI; CIF; Cloud Computing; DDoS Attack; Security; Studied Variable; Unrealistic Value; VMware; DEFENSE;
D O I
10.4018/IJISP.2020100103
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Distributed denial of service (DDoS) attacks have become a serious danger against the availability of services in cloud computing environment. Current defending mechanisms cannot detect DDoS attacks with high accuracy. This is mainly due to the fact that the unrealistic value of the studied variables was used. In view of this problem, the authors propose a novel approach called confidence intervalbased filtering (CIF) to detect DDoS attacks. The proposed approach is implemented using VMware and JAVA applications. The simulation results showed that CIF outperforms the existing approaches in terms of detection rate and false negative and positive rates with an acceptable computation time.
引用
收藏
页码:42 / 56
页数:15
相关论文
共 50 条
  • [1] A confidence-based filtering method for DDoS attack defense in cloud environment
    Dou, Wanchun
    Chen, Qi
    Chen, Jinjun
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2013, 29 (07): : 1838 - 1850
  • [2] A Filter Tree Approach to Protect Cloud Computing against XML DDoS and HTTP DDoS Attack
    Karnwal, Tarun
    Thandapanii, Sivakumar
    Gnanasekaran, Aghila
    INTELLIGENT INFORMATICS, 2013, 182 : 459 - 469
  • [3] SDN Control Plane Security in Cloud Computing Against DDoS Attack
    Khimabhai, Yadav Ashok
    Rohokale, Vandana
    INTERNATIONAL CONFERENCE ON ADVANCES IN INFORMATION COMMUNICATION TECHNOLOGY & COMPUTING, 2016, 2016,
  • [4] Understanding DDoS Attack & Its Effect In Cloud Environment
    Deshmukh, Rashmi V.
    Devadkar, Kailas K.
    PROCEEDINGS OF 4TH INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING, COMMUNICATION AND CONTROL(ICAC3'15), 2015, 49 : 202 - 210
  • [5] Host Based Intrusion Detection and Prevention Model Against DDoS Attack in Cloud Computing
    Jaber, Aws Naser
    Zolkipli, Mohamad Fadli
    Shakir, Hasan Awni
    Jassim, Mohammed R.
    ADVANCES ON P2P, PARALLEL, GRID, CLOUD AND INTERNET COMPUTING (3PGCIC-2017), 2018, 13 : 241 - 252
  • [6] Analysis of Simulation of DDOS Attack in Cloud
    Karthik, S.
    Shah, J. J.
    2014 INTERNATIONAL CONFERENCE ON INFORMATION COMMUNICATION AND EMBEDDED SYSTEMS (ICICES), 2014,
  • [7] An anomaly-based approach for DDoS attack detection in cloud environment
    Rawashdeh, Adnan
    Alkasassbeh, Mouhammd
    Al-Hawawreh, Muna
    INTERNATIONAL JOURNAL OF COMPUTER APPLICATIONS IN TECHNOLOGY, 2018, 57 (04) : 312 - 324
  • [8] DDoS Attack Detection and Mitigation Techniques in Cloud Computing Environment
    Devi, Kiruthika B. S.
    Subbulakshmi, T.
    PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON INTELLIGENT SUSTAINABLE SYSTEMS (ICISS 2017), 2017, : 512 - 517
  • [9] An Efficient system to stumble on and Mitigate DDoS attack in cloud Environment
    Mohan, Manju K.
    PROCEEDINGS OF THE 2018 SECOND INTERNATIONAL CONFERENCE ON INVENTIVE COMMUNICATION AND COMPUTATIONAL TECHNOLOGIES (ICICCT), 2018, : 1855 - 1857
  • [10] Game based DDoS Attack Strategies in Cloud of Things
    Wang, Yichuan
    Zhang, Yefei
    Zhang, Liumei
    Zhu, Lei
    Liu, Yanxiao
    PROCEEDINGS OF THE 6TH INTERNATIONAL CONFERENCE ON INFORMATION ENGINEERING FOR MECHANICS AND MATERIALS, 2016, 97 : 759 - 762