An Innovative Method to Mitigate DDoS Attacks for Cloud Environment Using Bagging and Stacking
This paper describes an approach for mitigating distributed denial-of-services attacks in Cloud. DDoS attacks are huge pitfall for Cloud, and still, this is not very well handled. We presented a survey of existing work to defend DDoS attacks and mechanism
- PDF / 457,199 Bytes
- 11 Pages / 439.37 x 666.142 pts Page_size
- 35 Downloads / 230 Views
Abstract This paper describes an approach for mitigating distributed denial-of-services attacks in Cloud. DDoS attacks are huge pitfall for Cloud, and still, this is not very well handled. We presented a survey of existing work to defend DDoS attacks and mechanisms. In Cloud, intruder detection systems can be deployed at various positions like front-end, back-end or at Virtual Machine. Most of the existing IDS have been deployed at Virtual Machine in cloud. We proposed a new frame work using ensemble classifiers, namely, Bagging and Stacking to detect intrusions of both insiders and outsiders, and our proposed frame work will deploy at back-end. We focused on defending DDoS attacks in cloud environment which are the bottle neck of a Cloud environment compared to other type of attacks.
⋅
Keywords Cloud computing Intrusion detection system techniques Weka WireShark
⋅
⋅
⋅
Data mining
1 Introduction to Cloud Computing [1] Cloud computing is all over the place. Distributed computing gets its name as a representation for the Internet. Cloud processing guarantees to cut operational and capital expenses. Distributed computing is a build that permits you to get to applications that really live at an area other than your PC or other Internet joined gadget. Security and protection is one of the biggest ranges of sympathy toward anybody assembling a cloud system.
B. Kiranmai (✉) Keshav Memorial Institute of Technology, Narayanguda, Hyderabad, India e-mail: [email protected] A. Damodaram Sri Venkateswara University, Tirupathi, Andhra Pradesh, India e-mail: [email protected] © Springer Science+Business Media Singapore 2017 S.C. Satapathy et al. (eds.), Proceedings of the First International Conference on Computational Intelligence and Informatics, Advances in Intelligent Systems and Computing 507, DOI 10.1007/978-981-10-2471-9_28
289
290
B. Kiranmai and A. Damodaram
The main issue concern is security [2]. Cloud service providers do not bother whether the customer is a legitimate user or not. Due to this problem arises like (i) Data Breach, (ii) Insiders, (iii) Cryptographic attacks, and iv) DDoS attacks. All of these kinds of attacks we call them as Intruders [3]. People from everywhere now have passage to different people from wherever else. Globalization of handling assets might be the best duty the cloud has made to date. Dispersed registering is still in its soonest organizes. Conveyed registering might be seen as a benefit available as an organization for virtual data focuses yet disseminated figuring and virtual server ranches are not the same. People from everywhere now have passage to different people from wherever else. Globalization of processing assets might be the best duty the cloud has made to date. Distributed computing is still in its most punctual stages. Circulated figuring might be seen as a benefit available as an organization for virtual data focuses; however, appropriated processing and virtual server ranches are not the same [4, 5]. Lattice figuring is frequently mistaken for distribut
Data Loading...