Detecting DDoS Attack in Cloud Computing Using Local Outlier Factors
Title | Detecting DDoS Attack in Cloud Computing Using Local Outlier Factors |
Publication Type | Conference Paper |
Year of Publication | 2018 |
Authors | Madhupriya, G., Shalinie, S. M., Rajeshwari, A. R. |
Conference Name | 2018 2nd International Conference on Trends in Electronics and Informatics (ICOEI) |
Publisher | IEEE |
ISBN Number | 978-1-5386-3570-4 |
Keywords | authentication, Authorization, Availability, basic integrity, cloud computing, cloud computing environment, cloud service provider, composability, Computer crime, computer network security, Conferences, confidentiality, data storage, DDoS attack detection, Dimensional Reasoning, distributed denial of service attack, DR-LOF, higher detection rates, Human Behavior, Intrusion detection, local outlier factors, lower false alarm rate, Metrics, privacy, pubcrawl, Resiliency, Symbolic Aggregate Approximation, Training, virtual machine security, virtual machines, Virtual machining, virtualisation, virtualization privacy, virtualization technique, WEKA |
Abstract | Now a days, Cloud computing has brought a unbelievable change in companies, organizations, firm and institutions etc. IT industries is advantage with low investment in infrastructure and maintenance with the growth of cloud computing. The Virtualization technique is examine as the big thing in cloud computing. Even though, cloud computing has more benefits; the disadvantage of the cloud computing environment is ensuring security. Security means, the Cloud Service Provider to ensure the basic integrity, availability, privacy, confidentiality, authentication and authorization in data storage, virtual machine security etc. In this paper, we presented a Local outlier factors mechanism, which may be helpful for the detection of Distributed Denial of Service attack in a cloud computing environment. As DDoS attack becomes strong with the passing of time, and then the attack may be reduced, if it is detected at first. So we fully focused on detecting DDoS attack to secure the cloud environment. In addition, our scheme is able to identify their possible sources, giving important clues for cloud computing administrators to spot the outliers. By using WEKA (Waikato Environment for Knowledge Analysis) we have analyzed our scheme with other clustering algorithm on the basis of higher detection rates and lower false alarm rate. DR-LOF would serve as a better DDoS detection tool, which helps to improve security framework in cloud computing. |
URL | https://ieeexplore.ieee.org/document/8553920 |
DOI | 10.1109/ICOEI.2018.8553920 |
Citation Key | madhupriya_detecting_2018 |
- Symbolic Aggregate Approximation
- Human behavior
- Intrusion Detection
- local outlier factors
- lower false alarm rate
- Metrics
- privacy
- pubcrawl
- Resiliency
- higher detection rates
- Training
- virtual machine security
- virtual machines
- Virtual machining
- virtualisation
- virtualization privacy
- virtualization technique
- WEKA
- computer network security
- authorization
- Availability
- basic integrity
- Cloud Computing
- cloud computing environment
- cloud service provider
- composability
- Computer crime
- authentication
- Conferences
- confidentiality
- data storage
- DDoS attack detection
- Dimensional Reasoning
- distributed denial of service attack
- DR-LOF