Analysis and Detection of DoS Attacks in Cloud Computing by Using QSE Algorithm

Even if the cloud computing provides a wide variety of resources to its clients, the security issues like Denial of Service (DoS) attacks, loss of important data and sensitive data compromising lead to crucial problems. From the recent survey on protection of sensitive data, there is paucity of security in DoS attacks. In this paper, we have studied the Quantum algorithm approach and focused on the Quantum Swarm Evolutionary (QSE) algorithm and the Quantum-inspired Evolutionary Algorithm (QEA). The main aim of our work is to apply QSE algorithm with comparison of QEA on cloud computing to detect DoS attacks. We conducted an experiment methodology that shows that QSE is step above than the traditional QEA in this context.

[1]  Jong-Hwan Kim,et al.  Introduction of Quantum-inspired Evolutionary Algorithm , 2002 .

[2]  Siti Mariyam Shamsuddin,et al.  Dynamic quantum-inspired particle swarm optimization as feature and parameter optimizer for evolving spiking neural networks , 2012 .

[3]  Rolf Oppliger,et al.  Internet security: firewalls and beyond , 1997, CACM.

[4]  Zoe L. Jiang,et al.  Privacy-Preserving Public Auditing for Secure Cloud Storage , 2013, IEEE Transactions on Computers.

[5]  John Langford,et al.  CAPTCHA: Using Hard AI Problems for Security , 2003, EUROCRYPT.

[6]  Xiangjian He,et al.  A System for Denial-of-Service Attack Detection Based on Multivariate Correlation Analysis , 2014, IEEE Transactions on Parallel and Distributed Systems.

[7]  Heejo Lee,et al.  On the effectiveness of route-based packet filtering for distributed DoS attack prevention in power-law internets , 2001, SIGCOMM '01.

[8]  Chi-Chun Lo,et al.  A Cooperative Intrusion Detection System Framework for Cloud Computing Networks , 2010, 2010 39th International Conference on Parallel Processing Workshops.

[9]  Angelos D. Keromytis,et al.  Using graphic turing tests to counter automated DDoS attacks against web servers , 2003, CCS '03.

[10]  Angelos D. Keromytis,et al.  A Pay-per-Use DoS Protection Mechanism for the Web , 2004, ACNS.

[11]  Jethro G. Beekman,et al.  Man-in-the-Middle Attack on T-Mobile Wi-Fi Calling , 2013 .

[12]  Andrew B. Whinston,et al.  Defeating distributed denial of service attacks , 2000 .

[13]  Alina Madalina Lonea,et al.  Detecting DDoS Attacks in Cloud Computing Environment , 2012, Int. J. Comput. Commun. Control.

[14]  Salvatore J. Stolfo,et al.  Cost-based modeling for fraud and intrusion detection: results from the JAM project , 2000, Proceedings DARPA Information Survivability Conference and Exposition. DISCEX'00.

[15]  P. Mell,et al.  The NIST Definition of Cloud Computing , 2011 .

[16]  Yanchun Liang,et al.  A novel quantum swarm evolutionary algorithm and its applications , 2007, Neurocomputing.

[17]  B. B. Gupta,et al.  Distributed Denial of Service Prevention Techniques , 2012, ArXiv.

[18]  Kyaw Thet Khaing,et al.  Detection Model for Daniel-of-Service Attacks using Random Forest and k-Nearest Neighbors , 2013 .

[19]  Thomer M. Gil,et al.  MULTOPS: A Data-Structure for Bandwidth Attack Detection , 2001, USENIX Security Symposium.

[20]  R. Lua,et al.  Mitigating DDoS attacks with transparent and intelligent fast-flux swarm network , 2011, IEEE Network.

[21]  E. Anitha,et al.  A packet marking approach to protect cloud environment against DDoS attacks , 2013, 2013 International Conference on Information Communication and Embedded Systems (ICICES).

[22]  Zhang Xiangxian Quantum-Inspired Immune Evolutionary Algorithm , 2008, 2008 International Seminar on Business and Information Management.

[23]  Stuart Harvey Rubin,et al.  Distributed denial of service attacks , 2000, Smc 2000 conference proceedings. 2000 ieee international conference on systems, man and cybernetics. 'cybernetics evolving to systems, humans, organizations, and their complex interactions' (cat. no.0.

[24]  K. Venugopal Rao,et al.  Guaranteed Quality of Service in Cloud Ready Application , 2013, 2013 International Symposium on Computational and Business Intelligence.

[25]  Paul Ferguson,et al.  Network Ingress Filtering: Defeating Denial of Service Attacks which employ IP Source Address Spoofing , 1998, RFC.

[26]  Junho Choi,et al.  Detecting Web based DDoS Attack using MapReduce operations in Cloud Computing Environment , 2013, J. Internet Serv. Inf. Secur..

[27]  Cong Wang,et al.  Toward publicly auditable secure cloud data storage services , 2010, IEEE Network.

[28]  Wentao Liu,et al.  Research on cloud computing security problem and strategy , 2012, 2012 2nd International Conference on Consumer Electronics, Communications and Networks (CECNet).

[29]  Angelos D. Keromytis,et al.  SOS: secure overlay services , 2002, SIGCOMM '02.

[30]  Aamir Shahzad,et al.  Detecting flooding based DoS attack in cloud computing environment using covariance matrix approach , 2013, ICUIMC '13.

[31]  B. Joshi,et al.  Securing cloud computing environment against DDoS attacks , 2012, 2012 International Conference on Computer Communication and Informatics.

[32]  M. Abliz Internet Denial of Service Attacks and Defense Mechanisms , 2011 .

[33]  O. K. Sahingoz,et al.  Attack Types and Intrusion Detection Systems in Cloud Computing , .

[34]  Dorothy E. Denning,et al.  An Intrusion-Detection Model , 1987, IEEE Transactions on Software Engineering.