Detection of DDOS Attack in Cloud Computing Environment using Artificial Neural Network
DOI:
https://doi.org/10.25120/jre.4.2.2024.4170Keywords:
DDOS, Cloud Computing, ANN, Detection, SecurityAbstract
One of the most severe threats against cloud systems is Distributed Denial of Service (DDoS) attacks. DDoS attacks create a type of resource crippling by flooding the system with abnormal traffic, hence overwhelming all the resources like memory, CPU, and network bandwidth, bringing the services out of reach to legitimate users. It becomes quite difficult to detect such attacks when the requests originate from hundreds of geographically dispersed sources. As such, we propose an ANN-based DDoS attack detection approach that leans on machine learning to enhance the accuracy and efficiency in detecting attacks. The ANN model is designed to pick out underlying patterns in the network traffic and distinguish between legitimate and malicious activities that might originate from either side, thus reducing false positives and false negatives. A particular advantage of cloud computing is its scalability, through which changing demands can be catered to, but it needs robust security against DDoS attacks in order to maintain the service. This ANN-based approach especially focuses on ethical AI principles and sustainability, while being non-discriminatory in access to services. For it reduces errors to ensure fairness in detection, fine-tuning for energy efficiency also turns out to lead to a smaller ecological footprint.
References
Preeti Daffu, Amanpreet Kaur, “Mitigation of DDoS Attacks in Cloud Computing “,IEEE, 2016 5th International Conference on Wireless Networks and Embedded Systems (WECON)
Anteneh Girma, Moses Garuba, Jiang Li, Chunmei Liu, “Analysis of DDoS Attacks and an Introduction of a Hybrid Statistical Model to Detect DDoS Attacks on Cloud Computing Environment”, 12th International Conference on Information Technology - New Generations, 2015.
Swati Jaiswal, Chandra M,“A survey: Privacy and security to Internet of Things with Cloud Computing”, International Journal of Control Theory and Application, Volume 09,Number 42 ©International Science Press 2016, page no. 487-500.
Ishtiaq Ahmed, Sheeraz Ahmed, Asif Nawaz, Sadeeq Jan, Zeeshan Najam, Muneeb Saadat , Rehan Ali Khan, Khalid Zaman, “Towards Securing Cloud Computing from DDOS Attacks”, (IJACSA) International Journal of Advanced Computer Science and Applications, Vol. 11, No. 8, 2020.
Bikram Khadka, Chandana Withana, Abeer Alsadoon, Amr Elchouemi2, “Distributed Denial of Service attack on Cloud: Detection and Prevention “, IEEE, 2015.
“What is DDos Attack?”, Cloudflare, Inc., 2021.
Junchi Xing, Haifeng Zhou, Jinfan Shen, Kai Zhu, Yansong Wang, Chunming Wu and Wei Ruan, “AsIDPS: Auto-Scaling Intrusion Detection and Prevention System for Cloud”, IEEE, 2018.
Monika Roopak, Gui Yun Tian, Jonathon Chambers, “Multi-objective-based feature selection for DDoS attack detection in IoT networks”, Institution of Engineering and Technology, 2020.
Hosam Farouk El-Sofany, Islam Taj-Eddin, Samir A. El-Seoud, “A Case Study of the Impact of Denial of Service Attacks in Cloud Applications”, ResearchGate, 2019.
Marwane Zekri, Said El Kafhali, Noureddine Aboutabit and Youssef Saadi, “DDoS Attack Detection using Machine Learning Techniques in Cloud Computing Environments”, IEEE, 2017.
Anthony Chadd, Steve MansfieldDevine, “DDoS attacks: past, present and future”, Network Security, 2018.
Rashmi V. Deshmukh, Kailas K. Devadkarb, "Understanding DDoS Attack & Its Effect In Cloud Environment", Elsevier, 2015.
Kriti Bhushana, B. B. Gupta, "Hypothesis Test for Low-rate DDoS Attack Detection in Cloud
Computing Environment", Elsevier, 2018.
Stamatis Karnouskos, “Self-Driving Car Acceptance and the Role of Ethics”, IEEE Transactions On Engineering Management, 2018.
Kiibra Kalkan, Gurkan Gur, and Fatih Alagoz, “Filtering-Based Defense Mechanisms Against DDoS Attacks: A Survey”, IEEE Systems Journal, 2016
Junho Choi, Chang Choi, Byeongkyu Ko, Dongjin Choi, and Pankoo Kim, “Detecting Web based DDoS Attack using MapReduce operations in Cloud Computing Environment”, ResearchGate, 2013
Shi Dong And Mudar Sarem, “DDoS Attack Detection Method Based on Improved KNN With the Degree of DDoS Attack in Software-Defined Networks”, IEEE, 2019
Gaurav Somani, Manoj Singh Gaur, Dheeraj Sanghi, Mauro Conti and Muttukrishnan Rajarajan,
“Scale Inside-out: Rapid Mitigation of Cloud DDoS Attacks”, IEEE, 2017
Dimitrios Kosmanos, Apostolos Pappas, Francisco J. Aparicio-Navarro, Leandros Maglaras, Helge Janicke, Eerke Boiten, and Antonios Argyriou, “Intrusion Detection System for Platooning Connected Autonomous Vehicles”, IEEE, 2019
Vaishali Kansal and Mayank Dave, “Proactive DDoS Attack Mitigation in Cloud-Fog Environment using Moving Target Defense”, Cornell University, 2020
Swati Jaiswal, Supriya Sarkar, Dr. Chandra Mohan B, “COT-Evaluation and analysis of various applications with security for cloud & IOT", book chapter published in IGI global, for a book titled ”Hand book on Examining Cloud Computing Technologies Through the Internet of Things", available in GOBI (comes under EBSCO) and OASISlibrary-2018.
Swati Jaiswal, Sherwin Kati, Abhishek Ove, Mayur Kodche, Bhavana Gotipamul, “Comprehensive Overview of DDOS Attack in Cloud Computing Environment using different Machine Learning Techniques", SSRN, April 28,2022.
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2024 Swati Jaiswal, Yash Saravane, Spandan Surdas, Kartik Chaudhari, Kiran Gawali

This work is licensed under a Creative Commons Attribution-NoDerivatives 4.0 International License.
You are free to:
- Share — copy and redistribute the material in any medium or format for any purpose, even commercially
Anyone using the work must attribute the work to the original creator. The licence allows copying and distribution of the original work but no adaptations or modified versions of the work may be distributed.
- Attribution — You must give appropriate credit, provide a link to the license, and indicate if changes were made. You may do so in any reasonable manner, but not in any way that suggests the licensor endorses you or your use.
- NoDerivatives — If you remix, transform, or build upon the material, you may not distribute the modified material.
- No additional restrictions — You may not apply legal terms or technological measures that legally restrict others from doing anything the license permits.