Preventing DDOS Attack in Cloud Using Machine Learning
Preventing DDOS Attack in Cloud Using Machine Learning
net/publication/341817285
CITATION READS
1 289
2 authors:
Some of the authors of this publication are also working on these related projects:
All content following this page was uploaded by Anku Jaiswal on 02 June 2020.
Abstract: Cloud computing being one of the most demanding technologies has gained a lot of fame due to various
services it provides in the form of utility model. But as we know each technology has both advantages and
disadvantages. One of the biggest disadvantages of cloud is security issue. There are many threats to the cloud
security and Distributed Denial of Service (DDOS) attack is one of the severe threats. DDOS is a simple but a very
powerful attack which makes the resources unavailable to the legitimate client. It is very hard to prevent this type of
attack because of different types in which hacker may attack. Distinguishing between malicious and legitimate traffic
is a tedious work and also manually filtering the traffic is not possible because of large number of hosts. Resource
exhaustion is one of the most common attacks seen today and one of the best techniques would be to build intelligence
to the machine so that it could proactively make decision and distinguish between good and bad traffic automatically.
This is possible with machine learning techniques. In this paper we have discussed how machine learning can help us
to prevent DDOS attack.
I. INTRODUCTION
With increase in usage of cloud computing to provide the computing resources on demand over the internet, so is the
need to secure the computing resources to provide the reliable and secure services to its user by maintaining the
confidentiality, integrity and authenticity constraints. Since cloud uses the internet to provide the services, it has become
much vulnerable for the various types of attack. One of the major attack issues faced by the cloud platform is DDOS
attack. It is a special type of DOS attack in which attacker uses the network of infected computers which are actually bots
to exhaust the resources of the target system. The DDOS attack can be mainly classified in to two categories: Bandwidth
depletion and resource depletion. The attacks such as UDP and ICMP come under bandwidth depletion and the attack
such as TCP sync and IP flood attack comes under resource depletion. It is one of the very notorious types of attack
which can make the service unavailable to the legitimate user for very long time hampering the credibility and reliability
of the cloud service providers. Most of the defense techniques developed so far has focused on monitoring the network
layers to prevent the attack, but the attacker has now shifted their concentration to the application layer since it performs
more number of computations per packet so the probability of resource exhaustion increases in this layers.
Attackers are always one step ahead the detector. A lot of tool has been developed to solve the problem of network
layer. Hence the hackers are shifting from network layer to application layer and their main aim is resource exhaustion as
it requires less traffic.
V. MACHINE LEARNING
Machine learning is a type of artificial intelligence (AI) that provides computers with the ability to learn without
being explicitly programmed. Machine learning focuses on the development of computer programs that can teach
themselves to grow and change when exposed to new data.
Machine learning techniques have ability to implement a system that can learn from data. For example, a machine
learning system could be trained on incoming packets to learn to distinguish between intrusive and normal packet. After
learning, it can then be used to classify new incoming packets into intrusive and normal packets.
VII. CONCLUSION
DDOS attack detection is a very complex and complicated problem for cloud computing technology. Despite of using
various techniques, DDOS attack is one of the most vulnerable attack .Machine learning based on artificial neural
network can be used to achieve excellent solution as it uses automated system. Rather than analyzing network traffic,
main aim of this technique is to monitor resources which make it an efficient technique.
REFERENCES
[1] Y. Ghebghoub, S. Oukid, and O. Boussaid; “A Survey on Security Issues and the Existing Solutions in Cloud
Computing”, International Journal of Computer and Electrical Engineering, Vol. 5, No. 6, December 2013
[2] Raj Kumar P. Arun,S. Selvakumar; “Distributed Denial of service threat in collaborative environment- A survey
on DDOS tools and Traceback mechanism”, IEEE International Advance Computing Conference,2009
[3] Mr S.Karthik, Prof J.J.Shah; “Analysis of Simulation of DDOS Attack in Cloud” , Information Communication
and Embedded Systems (ICICES), 2014 International Conference
[4] Stefan Seufert and Darragh O’Brien ,”Machine Learning for Automatic Defence against Distributed Denial of
Service Attacks”, ICC 2007 proceedings.
[5] Chris Sinclair, Lyn Pierce, Sara Matzner “An Application of Machine Learning to Network Intrusion
Detection”. Phoenix, AZ 06 Dec 1999-10 Dec 1999
[6] J. Burges, "A tutorial on support vector machines for pattern recognition", Data Mining and Knowledge
Discovery, vol. 2, pp. 12 1- 167, 1998.
[7] Kamarularifin Abd Jalil, Muhammad Hilmi Kamarudin, Mohamad Noorman Masrek; “Comparison of Machine
Learning Algorithms Performance in Detecting Network Intrusion”, 2010 International Conference on
Networking and Information Technology
[8] Jayveer Singh , Manisha J. Nene , “A Survey on Machine Learning Techniques for Intrusion Detection
Systems” , International Journal of Advanced Research in Computer and Communication Engineering Vol. 2,
Issue 11, November 2013
[9] Sujay Apale, Rupesh Kamble, Manoj Ghodekar, Hitesh Nemade, Rina Waghmode; “Defense Mechanism For
Ddos Attack Through Machine Learning”, IJRET: International Journal of Research in Engineering and
Technology eISSN: 2319-1163 | pISSN: 2321-7308
[10] Sergio Armando Guti´errez, John Willian Branch Grupo GIDIA, “Application of Machine Learning Techniques
to Distributed Denial of Service (DDoS) Attack Detection: A Systematic Literature Review”