DDoS attack detection using machine learning techniques in cloud computing environments
Title | DDoS attack detection using machine learning techniques in cloud computing environments |
Publication Type | Conference Paper |
Year of Publication | 2017 |
Authors | Zekri, M., Kafhali, S. E., Aboutabit, N., Saadi, Y. |
Conference Name | 2017 3rd International Conference of Cloud Computing Technologies and Applications (CloudTech) |
Date Published | oct |
Keywords | Algorithm design and analysis, attacker, cloud computing, cloud computing environments, cloud performance, compositionality, Computer crime, computer network security, Computers, DDoS Attack, DDoS attack detection, DDoS detection system, DDoS flooding attacks, DDoS threat, Decision Tree, Decision trees, distributed denial of service, end users, Human Behavior, innocent compromised computers, Internet, Intrusion detection, IT technology, learning (artificial intelligence), legacy protocols, machine learning, machine learning algorithms, machine learning techniques, management organizations, Metrics, Neural networks, on-demand resources, Protocols, pubcrawl, reduced infrastructure cost, Resiliency, security, signature detection techniques, signatures attacks, victim cloud infrastructures, Vulnerability, vulnerability detection |
Abstract | Cloud computing is a revolution in IT technology that provides scalable, virtualized on-demand resources to the end users with greater flexibility, less maintenance and reduced infrastructure cost. These resources are supervised by different management organizations and provided over Internet using known networking protocols, standards and formats. The underlying technologies and legacy protocols contain bugs and vulnerabilities that can open doors for intrusion by the attackers. Attacks as DDoS (Distributed Denial of Service) are ones of the most frequent that inflict serious damage and affect the cloud performance. In a DDoS attack, the attacker usually uses innocent compromised computers (called zombies) by taking advantages of known or unknown bugs and vulnerabilities to send a large number of packets from these already-captured zombies to a server. This may occupy a major portion of network bandwidth of the victim cloud infrastructures or consume much of the servers time. Thus, in this work, we designed a DDoS detection system based on the C.4.5 algorithm to mitigate the DDoS threat. This algorithm, coupled with signature detection techniques, generates a decision tree to perform automatic, effective detection of signatures attacks for DDoS flooding attacks. To validate our system, we selected other machine learning techniques and compared the obtained results. |
URL | https://ieeexplore.ieee.org/document/8284731 |
DOI | 10.1109/CloudTech.2017.8284731 |
Citation Key | zekri_ddos_2017 |
- Protocols
- IT technology
- learning (artificial intelligence)
- legacy protocols
- machine learning
- machine learning algorithms
- machine learning techniques
- management organizations
- Metrics
- Neural networks
- on-demand resources
- Intrusion Detection
- pubcrawl
- reduced infrastructure cost
- Resiliency
- security
- signature detection techniques
- signatures attacks
- victim cloud infrastructures
- Vulnerability
- vulnerability detection
- DDoS detection system
- attacker
- Cloud Computing
- cloud computing environments
- cloud performance
- Compositionality
- Computer crime
- computer network security
- Computers
- DDoS Attack
- DDoS attack detection
- Algorithm design and analysis
- DDoS flooding attacks
- DDoS threat
- Decision Tree
- Decision trees
- distributed denial of service
- end users
- Human behavior
- innocent compromised computers
- internet