Visible to the public DDOS Attack Detection and Prevention using the Bat Optimized Load Distribution Algorithm in Cloud

TitleDDOS Attack Detection and Prevention using the Bat Optimized Load Distribution Algorithm in Cloud
Publication TypeConference Paper
Year of Publication2022
AuthorsManoj, K. Sai
Conference Name2022 International Interdisciplinary Humanitarian Conference for Sustainability (IIHC)
Keywordsattack detection Denial of service attack detection, Classification algorithms, cloud computing, composability, compositionality, Computer crime, DDoS Attack Prevention, denial-of-service attack, load balancing, Metrics, Optimization, pubcrawl, resilience, Resiliency, Resource management, Virtual machine monitors, Virtual machining
AbstractCloud computing provides a great platform for the users to utilize the various computational services in order accomplish their requests. However it is difficult to utilize the computational storage services for the file handling due to the increased protection issues. Here Distributed Denial of Service (DDoS) attacks are the most commonly found attack which will prevent from cloud service utilization. Thus it is confirmed that the DDoS attack detection and load balancing in cloud are most extreme issues which needs to be concerned more for the improved performance. This attained in this research work by measuring up the trust factors of virtual machines in order to predict the most trustable VMs which will be combined together to form the trustable source vector. After trust evaluation, in this work Bat algorithm is utilized for the optimal load distribution which will predict the optimal VM resource for the task allocation with the concern of budget. This method is most useful in the process of detecting the DDoS attacks happening on the VM resources. Finally prevention of DDOS attacks are performed by introducing the Fuzzy Extreme Learning Machine Classifier which will learn the cloud resource setup details based on which DDoS attack detection can be prevented. The overall performance of the suggested study design is performed in a Java simulation model to demonstrate the superiority of the proposed algorithm over the current research method.
DOI10.1109/IIHC55949.2022.10059711
Citation Keymanoj_ddos_2022