Visible to the public DDoS attack detection using machine learning techniques in cloud computing environments

TitleDDoS attack detection using machine learning techniques in cloud computing environments
Publication TypeConference Paper
Year of Publication2017
AuthorsZekri, M., Kafhali, S. E., Aboutabit, N., Saadi, Y.
Conference Name2017 3rd International Conference of Cloud Computing Technologies and Applications (CloudTech)
Date Publishedoct
KeywordsAlgorithm design and analysis, attacker, cloud computing, cloud computing environments, cloud performance, compositionality, Computer crime, computer network security, Computers, DDoS Attack, DDoS attack detection, DDoS detection system, DDoS flooding attacks, DDoS threat, Decision Tree, Decision trees, distributed denial of service, end users, Human Behavior, innocent compromised computers, Internet, Intrusion detection, IT technology, learning (artificial intelligence), legacy protocols, machine learning, machine learning algorithms, machine learning techniques, management organizations, Metrics, Neural networks, on-demand resources, Protocols, pubcrawl, reduced infrastructure cost, Resiliency, security, signature detection techniques, signatures attacks, victim cloud infrastructures, Vulnerability, vulnerability detection
Abstract

Cloud computing is a revolution in IT technology that provides scalable, virtualized on-demand resources to the end users with greater flexibility, less maintenance and reduced infrastructure cost. These resources are supervised by different management organizations and provided over Internet using known networking protocols, standards and formats. The underlying technologies and legacy protocols contain bugs and vulnerabilities that can open doors for intrusion by the attackers. Attacks as DDoS (Distributed Denial of Service) are ones of the most frequent that inflict serious damage and affect the cloud performance. In a DDoS attack, the attacker usually uses innocent compromised computers (called zombies) by taking advantages of known or unknown bugs and vulnerabilities to send a large number of packets from these already-captured zombies to a server. This may occupy a major portion of network bandwidth of the victim cloud infrastructures or consume much of the servers time. Thus, in this work, we designed a DDoS detection system based on the C.4.5 algorithm to mitigate the DDoS threat. This algorithm, coupled with signature detection techniques, generates a decision tree to perform automatic, effective detection of signatures attacks for DDoS flooding attacks. To validate our system, we selected other machine learning techniques and compared the obtained results.

URLhttps://ieeexplore.ieee.org/document/8284731
DOI10.1109/CloudTech.2017.8284731
Citation Keyzekri_ddos_2017