Visible to the public Detecting DDoS Attack in Cloud Computing Using Local Outlier Factors

TitleDetecting DDoS Attack in Cloud Computing Using Local Outlier Factors
Publication TypeConference Paper
Year of Publication2018
AuthorsMadhupriya, G., Shalinie, S. M., Rajeshwari, A. R.
Conference Name2018 2nd International Conference on Trends in Electronics and Informatics (ICOEI)
PublisherIEEE
ISBN Number978-1-5386-3570-4
Keywordsauthentication, Authorization, Availability, basic integrity, cloud computing, cloud computing environment, cloud service provider, composability, Computer crime, computer network security, Conferences, confidentiality, data storage, DDoS attack detection, Dimensional Reasoning, distributed denial of service attack, DR-LOF, higher detection rates, Human Behavior, Intrusion detection, local outlier factors, lower false alarm rate, Metrics, privacy, pubcrawl, Resiliency, Symbolic Aggregate Approximation, Training, virtual machine security, virtual machines, Virtual machining, virtualisation, virtualization privacy, virtualization technique, WEKA
Abstract

Now a days, Cloud computing has brought a unbelievable change in companies, organizations, firm and institutions etc. IT industries is advantage with low investment in infrastructure and maintenance with the growth of cloud computing. The Virtualization technique is examine as the big thing in cloud computing. Even though, cloud computing has more benefits; the disadvantage of the cloud computing environment is ensuring security. Security means, the Cloud Service Provider to ensure the basic integrity, availability, privacy, confidentiality, authentication and authorization in data storage, virtual machine security etc. In this paper, we presented a Local outlier factors mechanism, which may be helpful for the detection of Distributed Denial of Service attack in a cloud computing environment. As DDoS attack becomes strong with the passing of time, and then the attack may be reduced, if it is detected at first. So we fully focused on detecting DDoS attack to secure the cloud environment. In addition, our scheme is able to identify their possible sources, giving important clues for cloud computing administrators to spot the outliers. By using WEKA (Waikato Environment for Knowledge Analysis) we have analyzed our scheme with other clustering algorithm on the basis of higher detection rates and lower false alarm rate. DR-LOF would serve as a better DDoS detection tool, which helps to improve security framework in cloud computing.

URLhttps://ieeexplore.ieee.org/document/8553920
DOI10.1109/ICOEI.2018.8553920
Citation Keymadhupriya_detecting_2018