A Novel Framework for DDoS Detectionin Huge Scale Networks, Thanksto QoS Features
نویسندگان
چکیده
It is not been a long time since the advent of cloud-based technology. However, in this short period of time several advantages and disadvantages have been emerged. This is a problem solving technology with some threats as well. These threats and potential damages are not only limited to the cloud-based technologies, but they have always been against computer network infrastructures. One of these examples is Distributed Denial-of-Service (DDoS) intrusion which is of course one of the most complex and the most dangerous types of attacks. The impact of this type of attack, due to its powerful nature, is much higher on cloud systems since in case of occurrence, the service providers lose their services completely as well as their reputation and loyal customers. This, apparently, can even lead to the collapse of the stock and other destructive consequences. On the other hand, due to the properties of cloud service providers including large-scale infrastructures, DDoS intrusion detection algorithms need high sensitivity, innovation, and general improvements. Traditional structures of DDoS attack detection algorithms are designed for small-scale networks or at most for application camps. Lack of efficient algorithm is seemingly apparent for the large-scale networks. Therefore, in this context we utilize standard methods as well as a proposed hybrid protocol which is more appropriate in connection with cloud structures in order to detect DDoS attacks. Keywords-Cloud Computing, DDoS Attacks, Intrusion Detection Algorithms, Large-scale networks I. LITERATURE REVIEW Many studies have been performed on cloud computing service providers. One of the most important sections of these studies is to review different challenges in these structures. For instance, a research has been conducted by the IDC in 2009, and after a full investigation among users, they have come to the conclusion that the most important challenge from the perspective of users of cloud services is security [1]. On the other hand, regarding the research performed by Lockheed Martin [2], a major challenge after data security is Intrusion Detection in the cloud structures. So we can guess how critical and important communication security is even in this special case. On the other hand, several studies have performed on the centralized threats of cloud structures. Cloud services and other network technologies may have many threats as well [3]. For example, we can mention the forgery attacks, unauthorized access attacks, and DDoS. In this research we focus on DDoS attacks against cloud computing service providers. In these attacks, the attacker tries to fully utilize the resources required by users in order to prevent their access. These types of attacks can be occurred either in a distributed or a specific resource [5]. For example, in a cyber-attack occurred in 2011 against the Amazon EC2 service, Sony Online Entertainment segment was impaired and unavailable [5] which also caused in enormity losses. With the emergence of cloud technology, researchers’ attention in availability is increased much more rather than in information security [6] with regard to the fact that the basis of this technology is the high availability. Thus, several algorithms and methods are proposed to prevent attacks against availability [3, 4, 6, 7, 8, 9, 10, 11, and 12] each has proposed his own algorithm structure. For instance, [13] and [14] put ways of detecting an attack together and compared themgenerally. In addition, [15] evaluated the quality of the methods in intrusion detection alerts. Apparently, many techniques have been proposed for intrusion detection and they have all been studied by other researchers.
منابع مشابه
A New Fairness Index and Novel Approach for QoS-Aware Resource Allocation in LTE Networks Based on Utility Functions
Resource allocation techniques have recently appeared as a widely recognized feature in LTE networks. Most of existing approaches in resource allocation focus on maximizing network’s utility functions. The great potential of utility function in improving resource allocation and enhancing fairness and mean opinion score (MOS) indexes has attracted large efforts over the last few years. In this p...
متن کاملA Novel Fuzzy Logic Base Scheduling Mechanism for Service Differentiation in IP Networks
Quality of Service (QoS) refers to a set of rules or techniques that help the network administrators use the available network resources optimally to manage the effects of congestion and to treat the applications according to their needs. The differentiated services architecture (DiffServ) allows providing quality of service to users. The major DiffServ premise is that individual flows with sim...
متن کاملImpact of denial of service solutions on network quality of service
The Internet has become a universal communication network tool. It has evolved from a platform that supports best-effort traffic to one that now carries different traffic types including those involving continuous media with Quality of Service (QoS) requirements. As more services are delivered over the Internet, we face increasing risk to their availability given that malicious attacks on those...
متن کاملRobust and efficient detection of DDoS attacks for large-scale internet
In recent years, distributed denial of service (DDoS) attacks have become a major security threat to Internet services. How to detect and defend against DDoS attacks is currently a hot topic in both industry and academia. In this paper, we propose a novel framework to robustly and efficiently detect DDoS attacks and identify attack packets. The key idea of our framework is to exploit spatial an...
متن کاملDDoS Attack Detection Using Flow Entropy and Packet Sampling on Huge Networks
While the increasing number of services available through computer networks is a source of great convenience for users, it raises several concerns, including the threat of hacking and the invasion of user privacy. Hackers can easily block network services by flooding traffic to servers or by breaking through network security, hence causing significant economic loss. It is well know that a Distr...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- CoRR
دوره abs/1801.02300 شماره
صفحات -
تاریخ انتشار 2015