Correlation Based Mechanism for the Detection of DDOS Attack

Authors

  • Simmi Computer Engg, Swami SarvaNand College of Engg and Technology, PTU, Dina Nagar, India
  • Kaur H Computer Engg, Swami SarvaNand College of Engg and Technology, PTU, Dina Nagar, India

DOI:

https://doi.org/10.26438/ijcse/v9i3.1822

Keywords:

cloud computing, DDOS, Interpolation

Abstract

As technology is blooming cloud computing becomes indispensible part of many companies. The users are dependent upon cloud infrastructure as it is widely adopted and used technology. In cloud computing the prime concern is shared storage and it has many security issues. One of these security issues is DDOS attack that can effect business organization which utilizes cloud. This paper describes an approach to handle DDOS attack in cloud systems. In the proposed approach Interpolation between the values are located. In the proposed approach, security attributes gives highest Interpolation and reliability is the next highest Interpolation values. Both of these attributes serve as root nodes. The comparison between these attributes and training data is made to determine the DDOS attack. This means complication of calculations is reduced. Execution time is greatly reduced using this procedure. Results obtained are similar but execution time is reduced. The mechanism of ordering and normalization gives the hierarchical clustering.

References

[1] K. Kim, M. Erza, A. Harry, and C. Tanuwidjaja, Network Intrusion Detection using Deep Learning A Feature Learning Approach. 2018.

[2] W. Kong, Y. Lei, and J. Ma, “Data security and privacy information challenges in cloud computing,” Int. J. Comput. Sci. Eng., vol. 16, no. 3, pp. 215–218, 2018.

[3] S. A. Repalle, V. R. Kolluru, and 2, “Intrusion Detection System using AI and Machine Learning Algorithm,” Int. Res. J. Eng. Technol., vol. 4, no. 12, pp. 1709–1715, 2017.

[4] Z. Zhou, C. Du, L. Shu, G. Hancke, J. Niu, and H. Ning, “An Energy-Balanced Heuristic for Mobile Sink Scheduling in Hybrid WSNs,” IEEE Trans. Ind. Informatics, vol. 12, no. 1, pp. 28–40, 2016.

[5] Y. Chen, J. Yang, W. Trappe, and R. P. Martin, “Detecting and localizing identity-based attacks in wireless and sensor networks,” IEEE Trans. Veh. Technol., vol. 59, no. 5, pp. 2418–2434, 2010.

[6] S. G. Hersha, Rajendra Patil, “Protocol Specfic Multi Threaded Network Intrusion Detection System(PM-NIDS) for DOS/DDOS attack detection in cloud,” IEEE ACcess, 2018.

[7] S. Moradi, “A distributed method based on mobile agent to detect Sybil attacks in wireless sensor networks,” IEEE Access, pp. 276–280, 2016.

[8] D. Kim and S. An, “PKC-based dos attacks-resistant scheme in wireless sensor networks,” IEEE Sens. J., vol. 16, no. 8, pp. 2217–2218, 2016.

[9] M. Luo, C. Zou, and J. Xu, “An efficient identity-based broadcast signcryption scheme,” J. Softw., vol. 7, no. 2, pp. 366–373, 2012.

[10] S. Sadrhaghighi and I. T. Engineering, “Detect Pollution Attacks in Intra-Session Network Coding,” pp. 7–12, 2016.

[11] P. Sarigiannidis, “Analysing Indirect Sybil Attacks in Randomly Deployed Wireless Sensor Networks,” IEEE Access, pp. 0–5, 2016.

[12] S. Mahajan, “A Mechanism of preventing Sybil Attack in MANET using Bacterial Foraging Optimization,” IEEE Access, pp. 4–8, 2016.

Downloads

Published

2021-03-31
CITATION
DOI: 10.26438/ijcse/v9i3.1822
Published: 2021-03-31

How to Cite

[1]
Simmi and H. Kaur, “Correlation Based Mechanism for the Detection of DDOS Attack”, Int. J. Comp. Sci. Eng., vol. 9, no. 3, pp. 18–22, Mar. 2021.

Issue

Section

Research Article