Correlation Based Mechanism for the Detection of DDOS Attack
DOI:
https://doi.org/10.26438/ijcse/v9i3.1822Keywords:
cloud computing, DDOS, InterpolationAbstract
As technology is blooming cloud computing becomes indispensible part of many companies. The users are dependent upon cloud infrastructure as it is widely adopted and used technology. In cloud computing the prime concern is shared storage and it has many security issues. One of these security issues is DDOS attack that can effect business organization which utilizes cloud. This paper describes an approach to handle DDOS attack in cloud systems. In the proposed approach Interpolation between the values are located. In the proposed approach, security attributes gives highest Interpolation and reliability is the next highest Interpolation values. Both of these attributes serve as root nodes. The comparison between these attributes and training data is made to determine the DDOS attack. This means complication of calculations is reduced. Execution time is greatly reduced using this procedure. Results obtained are similar but execution time is reduced. The mechanism of ordering and normalization gives the hierarchical clustering.
References
[1] K. Kim, M. Erza, A. Harry, and C. Tanuwidjaja, Network Intrusion Detection using Deep Learning A Feature Learning Approach. 2018.
[2] W. Kong, Y. Lei, and J. Ma, “Data security and privacy information challenges in cloud computing,” Int. J. Comput. Sci. Eng., vol. 16, no. 3, pp. 215–218, 2018.
[3] S. A. Repalle, V. R. Kolluru, and 2, “Intrusion Detection System using AI and Machine Learning Algorithm,” Int. Res. J. Eng. Technol., vol. 4, no. 12, pp. 1709–1715, 2017.
[4] Z. Zhou, C. Du, L. Shu, G. Hancke, J. Niu, and H. Ning, “An Energy-Balanced Heuristic for Mobile Sink Scheduling in Hybrid WSNs,” IEEE Trans. Ind. Informatics, vol. 12, no. 1, pp. 28–40, 2016.
[5] Y. Chen, J. Yang, W. Trappe, and R. P. Martin, “Detecting and localizing identity-based attacks in wireless and sensor networks,” IEEE Trans. Veh. Technol., vol. 59, no. 5, pp. 2418–2434, 2010.
[6] S. G. Hersha, Rajendra Patil, “Protocol Specfic Multi Threaded Network Intrusion Detection System(PM-NIDS) for DOS/DDOS attack detection in cloud,” IEEE ACcess, 2018.
[7] S. Moradi, “A distributed method based on mobile agent to detect Sybil attacks in wireless sensor networks,” IEEE Access, pp. 276–280, 2016.
[8] D. Kim and S. An, “PKC-based dos attacks-resistant scheme in wireless sensor networks,” IEEE Sens. J., vol. 16, no. 8, pp. 2217–2218, 2016.
[9] M. Luo, C. Zou, and J. Xu, “An efficient identity-based broadcast signcryption scheme,” J. Softw., vol. 7, no. 2, pp. 366–373, 2012.
[10] S. Sadrhaghighi and I. T. Engineering, “Detect Pollution Attacks in Intra-Session Network Coding,” pp. 7–12, 2016.
[11] P. Sarigiannidis, “Analysing Indirect Sybil Attacks in Randomly Deployed Wireless Sensor Networks,” IEEE Access, pp. 0–5, 2016.
[12] S. Mahajan, “A Mechanism of preventing Sybil Attack in MANET using Bacterial Foraging Optimization,” IEEE Access, pp. 4–8, 2016.
Downloads
Published
How to Cite
Issue
Section
License

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors contributing to this journal agree to publish their articles under the Creative Commons Attribution 4.0 International License, allowing third parties to share their work (copy, distribute, transmit) and to adapt it, under the condition that the authors are given credit and that in the event of reuse or distribution, the terms of this license are made clear.
