Intrusion detection of distributed denial of service attack in cloud

Security issue in cloud environment is one of the major obstacle in cloud implementation. Network attacks make use of the vulnerability in the network and the protocol to damage the data and application. Cloud follows distributed technology; hence it is vulnerable for intrusions by malicious entities. Intrusion detection systems (IDS) has become a basic component in network protection infrastructure and a necessary method to defend systems from various attacks. Distributed denial of service (DDoS) attacks are a great problem for a user of computers linked to the Internet. Data mining techniques are widely used in IDS to identify attacks using the network traffic. This paper presents and evaluates a Radial basis function neural network (RBF-NN) detector to identify DDoS attacks. Many of the training algorithms for RBF-NNs start with a predetermined structure of the network that is selected either by means of a priori knowledge or depending on prior experience. The resultant network is frequently inadequate or needlessly intricate and a suitable network structure could be configured only by trial and error method. This paper proposes Bat algorithm (BA) to configure RBF-NN automatically. Simulation results demonstrate the effectiveness of the proposed method.

[1]  R. Shanmugalakshmi,et al.  Dynamic remote host classification in grid computing using Clonalg , 2010, ICWET.

[2]  Snehal G. Kene,et al.  A review on intrusion detection techniques for cloud computing and security challenges , 2015, 2015 2nd International Conference on Electronics and Communication Systems (ICECS).

[3]  Masoudeh Keshavarzi,et al.  Traditional Host based Intrusion Detection Systems' Challenges in Cloud Computing , 2014 .

[4]  Shruti B. Yagnik,et al.  A survey on RBF Neural Network for Intrusion Detection System , 2014 .

[5]  Valentin Sgarciu,et al.  An Improved Bat Algorithm Driven by Support Vector Machines for Intrusion Detection , 2015, CISIS-ICEUTE.

[6]  Yong Wang,et al.  Hypervisor-based cloud intrusion detection system , 2014, 2014 International Conference on Computing, Networking and Communications (ICNC).

[7]  Praveen Kumar Rajendran Hybrid Intrusion Detection Algorithm for Private Cloud , 2015 .

[8]  Valentin Sgarciu,et al.  Anomaly Intrusions Detection Based on Support Vector Machines with an Improved Bat Algorithm , 2015, 2015 20th International Conference on Control Systems and Computer Science.

[9]  Kresimir Fertalj,et al.  Denial of service attacks, defences and research challenges , 2017, Cluster Computing.

[10]  Shubhangi L. Vaikole,et al.  Intrusion Detection System in Cloud Computing Environment , 2012 .

[11]  Richard E. Overill,et al.  Detection of known and unknown DDoS attacks using Artificial Neural Networks , 2016, Neurocomputing.

[12]  Goutam Saha,et al.  Recurrent Neural Network Based Modeling of Gene Regulatory Network Using Bat Algorithm , 2015, ArXiv.

[13]  T. Aaron Gulliver,et al.  CCIPS: A Cooperative Intrusion Detection and Prevention Framework for Cloud Services , 2014 .

[14]  Saeed M. Alqahtani,et al.  An Intelligent Intrusion Prevention System for Cloud Computing (SIPSCC) , 2014, 2014 International Conference on Computational Science and Computational Intelligence.

[15]  F. Richard Yu,et al.  Distributed denial of service attacks in software-defined networking with cloud computing , 2015, IEEE Communications Magazine.

[16]  Uttam Kumar,et al.  A Survey on Intrusion Detection Systems for Cloud Computing Environment , 2015 .

[17]  Al-Sakib Khan Pathan,et al.  IDPS: An Integrated Intrusion Handling Model for Cloud , 2012, ArXiv.

[18]  Moses Garuba,et al.  Analysis of DDoS Attacks and an Introduction of a Hybrid Statistical Model to Detect DDoS Attacks on Cloud Computing Environment , 2015, 2015 12th International Conference on Information Technology - New Generations.

[19]  Valentin Sgarciu,et al.  A feature selection approach implemented with the Binary Bat Algorithm applied for intrusion detection , 2015, 2015 38th International Conference on Telecommunications and Signal Processing (TSP).

[20]  Voratas Kachitvichyanukul,et al.  Comparison of Three Evolutionary Algorithms: GA, PSO, and DE , 2012 .

[21]  S. DevikrishnaK An Artificial Neural Network based Intrusion Detection System and Classification of Attacks , 2013 .