Real-Time Detection Schemes for Memory DoS (M-DoS) Attacks on Cloud Computing Applications

نویسندگان

چکیده

Memory Denial of Service (M-DoS) attacks refer to a class cyber-attacks that aim exhaust the memory resources system, rendering it unavailable legitimate users. This type attack is particularly dangerous in cloud computing environments, where multiple users share same resources. Detection and mitigation M-DoS real-time challenging task, as they often involve large number low-rate requests, making difficult distinguish them from traffic. Several detection schemes have been proposed identify mitigate environments. These can be broadly classified into two categories: signature-based anomaly-based detection. Signature-based methods rely on identification specific patterns or characteristics known techniques, while abnormal behaviour deviates normal pattern usage. study presents hybrid model for MDOS using SVM-KNN-LR. The dataset used this was collected various sources pre-processed extract relevant features A feature selection process also applied most important achieved an accuracy 96%, outperforming other individual models such SVM, KNN, LR, Naive Bayes, Decision Trees, Extra Bagging Random Forests. Confusion matrices were evaluate performance each model. In discussion section, we examined detecting found had high precision score 0.97. However, recall lower at 0.87, indicating not able detect all instances attacks.

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Cloud security defence to protect cloud computing against HTTP-DoS and XML-DoS attacks

Today it is an inescapably fact that the internet and cloud computing are the future revenue generators for businesses and corporations, hence why organisation like IBM are heavily investing in providing better service oriented products to facilitate the demands. One of the most serious threats to these future revenues and to cloud computing itself comes from HTTP Denial-of-Service or XML-Based...

متن کامل

DoS Attacks on Your Memory in the Cloud

In cloud computing, network Denial of Service (DoS) attacks are well studied and defenses have been implemented, but severe DoS attacks on a victim’s working memory by a single hostile VM are not well understood. Memory DoS attacks are Denial of Service (or Degradation of Service) attacks caused by contention for hardware memory resources on a cloud server. Despite the strong memory isolation t...

متن کامل

DoS Attacks in MANETs: Detection and Countermeasures

With the widespread use of lightweight devices like laptops, PDAs, wireless telephones and sensors, the importance of wireless computing and particularly mobile ad hoc networking have come to the fore. Continued reduction in cost has resulted in diverse fields where deployment of such networks is being conceived. In mobile networks, there are some applications, which cannot rely on the presence...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: IEEE Access

سال: 2023

ISSN: ['2169-3536']

DOI: https://doi.org/10.1109/access.2023.3290910