DDoS Detection Systems for Cloud Data Storage

被引:0
|
作者
Cao, Ting [1 ]
Mao, Jianzhou [1 ]
Bhattacharya, Tathagata [1 ]
Peng, Xiaopu [1 ]
Ku, Wei-Shinn [1 ]
Qin, Xiao [1 ]
机构
[1] Auburn Univ, Dept Comp Sci & Software Engn, Auburn, AL 36849 USA
基金
美国国家科学基金会;
关键词
cloud; application layer DDoS attack; anomaly detection; data security; user behavior; similarity; sample selection; INTRUSION DETECTION; ATTACKS; MECHANISMS;
D O I
10.1109/TPSISA52974.2021.00021
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Distributed Denial-of-Service (DDoS) attack is one of the most common and effective attack types aiming to deny or limit services. To mitigate the problem of DDoS attacks to online cloud services, anomaly detection methods of user access behaviors are widely used to defend against attackers. We pay particular attention to anomaly detection methods after reviewing recent development efforts of application-layer DDoS detection techniques for cloud storage systems. Inspired by a dynamic analysis of access behavior changes in active users, we propose a DDoS anomaly detection model to discover DDoS attack sources by diagnosing users' similarities. The overarching goal of our solution is to pinpoint DDoS by monitoring the similarity of active users around existing users at a low cost. This goal is achieved by our proposed model embracing the following key steps. First, a sample user set is originated. Then, the active users' requests are tracked to gauge similarity measures between each active user and sample users. Finally, if the deviation of similarity exceeds the prescribed thresholds, detected users will be flagged as anomalous ones.
引用
收藏
页码:183 / 190
页数:8
相关论文
共 50 条
  • [31] Snapshot-based Data Index in Cloud Storage Systems
    He, Jing
    Wu, Yue
    Fu, Yang
    Zhou, Wei
    2016 IEEE INFORMATION TECHNOLOGY, NETWORKING, ELECTRONIC AND AUTOMATION CONTROL CONFERENCE (ITNEC), 2016, : 784 - 788
  • [32] A Survey of Secure Data Deduplication Schemes for Cloud Storage Systems
    Shin, Youngjoo
    Koo, Dongyoung
    Hur, Junbeom
    ACM COMPUTING SURVEYS, 2017, 49 (04)
  • [33] Cryptographic Public Verification of Data Integrity for Cloud Storage Systems
    Zhang, Yuan
    Xu, Chunxiang
    Li, Hongwei
    Liang, Xiaohui
    IEEE CLOUD COMPUTING, 2016, 3 (05): : 44 - 52
  • [34] Network Coding for Data-Retrieving in Cloud Storage Systems
    Lu, Yanbo
    Hao, Jie
    Liu, Xin-ji
    Xia, Shu-Tao
    2015 INTERNATIONAL SYMPOSIUM ON NETWORK CODING (NETCOD), 2015, : 51 - 55
  • [35] Coding Strategies to Avoid Data Loss in Cloud Storage Systems
    Singal, Swati Mittal
    Rakesh, Nitin
    Matam, Rakesh
    2016 FOURTH INTERNATIONAL CONFERENCE ON PARALLEL, DISTRIBUTED AND GRID COMPUTING (PDGC), 2016, : 6 - 11
  • [36] Optimizing data regeneration and storage with data dependency for cloud scientific workflow systems
    Fan, Lei
    Zhou, Lin
    Wang, Meijuan
    EXPERT SYSTEMS WITH APPLICATIONS, 2024, 238
  • [37] Efficient data storage: adaptively changing chunk size in cloud computing storage systems
    Baya, Chalabi
    Yahya, Slimani
    INTERNATIONAL JOURNAL OF GRID AND UTILITY COMPUTING, 2023, 14 (05) : 516 - 525
  • [38] DDoS Attack Detection and Mitigation Techniques in Cloud Computing Environment
    Devi, Kiruthika B. S.
    Subbulakshmi, T.
    PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON INTELLIGENT SUSTAINABLE SYSTEMS (ICISS 2017), 2017, : 512 - 517
  • [39] Detection Techniques for DDoS Attacks in Cloud Environment: Review Paper
    Alanazi, Sultan T.
    Anbar, Mohammed
    Karuppayah, Shankar
    Al-Ani, Ahmed K.
    Sanjalawe, Yousef K.
    INTELLIGENT AND INTERACTIVE COMPUTING, 2019, 67 : 337 - 354
  • [40] Detection of DDoS Attacks Using Machine Learning in Cloud Computing
    Sharma, Vishal
    Verma, Vinay
    Sharma, Anand
    ADVANCED INFORMATICS FOR COMPUTING RESEARCH, ICAICR 2019, PT II, 2019, 1076 : 260 - 273