Cloud denial of service detection by dendritic cell mechanism

The term cloud computing is not new anymore in computing technology. This form of computing technology previously considered only as marketing term, but today cloud computing not only provides innovative improvements in resource utilization but it also creates a new opportunities in data protection mechanisms where the advancement of intrusion detection technologies are blooming rapidly. From the perspective of security, cloud computing also introduces concerns about data protection and intrusion detection mechanism especially cloud computing are exposed to Denial of Service (DoS) attacks. This paper aims to provide DoS detection mechanism for cloud computing environment. As a result, we provide an experiment to examine the capability of the proposed system. The result shows that the proposed system was able to detect DoS attacks that conducted during the experiment with 94.4% detection rate. We conclude the paper with a discussion on the results, then we include together with a graphical summary of the experiment's result.

[1]  Sameer Patil,et al.  ANALYSIS OF ANDROID VULNERABILITIES AND MODERN EXPLOITATION TECHNIQUES , 2014 .

[2]  Satish Chandra,et al.  An Optimistic Approach for Intrusion Security in Cloud , 2014 .

[3]  Graham Kendall,et al.  Frequency analysis for dendritic cell population tuning , 2008, Evol. Intell..

[4]  Carlos Becker Westphall,et al.  Autonomic Intrusion Detection System in Cloud Computing with Big Data , 2014 .

[5]  M. Phil,et al.  PRIVACY-PRESERVING PUBLIC AUDITING FOR DATA STORAGE SECURITY IN CLOUD COMPUTING , 2015 .

[6]  Kevin Curran,et al.  Cloud Computing Security , 2011, Int. J. Ambient Comput. Intell..

[7]  Arun Ross,et al.  Score normalization in multimodal biometric systems , 2005, Pattern Recognit..

[8]  Padam Kumar,et al.  VM Profile Based Optimized Network Attack Pattern Detection Scheme for DDOS Attacks in Cloud , 2013, SSCC.

[9]  Sherif Abdelwahed,et al.  A Finite State Hidden Markov Model for Predicting Multistage Attacks in Cloud Systems , 2014, 2014 IEEE 12th International Conference on Dependable, Autonomic and Secure Computing.

[10]  B. Joshi,et al.  Securing cloud computing environment against DDoS attacks , 2012, 2012 International Conference on Computer Communication and Informatics.

[11]  Chi-Chun Lo,et al.  A Cooperative Intrusion Detection System Framework for Cloud Computing Networks , 2010, 2010 39th International Conference on Parallel Processing Workshops.

[12]  Muhammad Zakarya,et al.  DDoS Verification and Attack Packet Dropping Algorithm in Cloud Computing , 2013 .

[13]  Reza Azmi,et al.  SHADuDT: Secure hypervisor-based anomaly detection using danger theory , 2013, Comput. Secur..

[14]  Adeel Anjum,et al.  A survey of cloud computing data integrity schemes: Design challenges, taxonomy and future trends , 2017, Comput. Secur..

[15]  Tahir Alyas,et al.  Intrusion Detection and Prevention in Cloud Computing using Genetic Algorithm , 2015 .

[16]  Jie Xu,et al.  A novel intrusion severity analysis approach for Clouds , 2013, Future Gener. Comput. Syst..

[17]  Gary B. Lamont,et al.  A distributed architecture for a self-adaptive computer virus immune system , 1999 .

[18]  Jinpeng Wei,et al.  Toward protecting control flow confidentiality in cloud-based computation , 2015, Comput. Secur..

[19]  Luis Miguel Vaquero Gonzalez,et al.  Building safe PaaS clouds: A survey on security in multitenant software platforms , 2012, Comput. Secur..