A Novel Framework for DDoS Detectionin Huge Scale Networks, Thanksto QoS Features

نویسندگان

  • Hamed Rezaei
  • Nima Ghazanfari Motlagha
  • Yaghoub Farjami
  • Mohammad Hossein Yektaei
چکیده

It is not been a long time since the advent of cloud-based technology. However, in this short period of time several advantages and disadvantages have been emerged. This is a problem solving technology with some threats as well. These threats and potential damages are not only limited to the cloud-based technologies, but they have always been against computer network infrastructures. One of these examples is Distributed Denial-of-Service (DDoS) intrusion which is of course one of the most complex and the most dangerous types of attacks. The impact of this type of attack, due to its powerful nature, is much higher on cloud systems since in case of occurrence, the service providers lose their services completely as well as their reputation and loyal customers. This, apparently, can even lead to the collapse of the stock and other destructive consequences. On the other hand, due to the properties of cloud service providers including large-scale infrastructures, DDoS intrusion detection algorithms need high sensitivity, innovation, and general improvements. Traditional structures of DDoS attack detection algorithms are designed for small-scale networks or at most for application camps. Lack of efficient algorithm is seemingly apparent for the large-scale networks. Therefore, in this context we utilize standard methods as well as a proposed hybrid protocol which is more appropriate in connection with cloud structures in order to detect DDoS attacks. Keywords-Cloud Computing, DDoS Attacks, Intrusion Detection Algorithms, Large-scale networks I. LITERATURE REVIEW Many studies have been performed on cloud computing service providers. One of the most important sections of these studies is to review different challenges in these structures. For instance, a research has been conducted by the IDC in 2009, and after a full investigation among users, they have come to the conclusion that the most important challenge from the perspective of users of cloud services is security [1]. On the other hand, regarding the research performed by Lockheed Martin [2], a major challenge after data security is Intrusion Detection in the cloud structures. So we can guess how critical and important communication security is even in this special case. On the other hand, several studies have performed on the centralized threats of cloud structures. Cloud services and other network technologies may have many threats as well [3]. For example, we can mention the forgery attacks, unauthorized access attacks, and DDoS. In this research we focus on DDoS attacks against cloud computing service providers. In these attacks, the attacker tries to fully utilize the resources required by users in order to prevent their access. These types of attacks can be occurred either in a distributed or a specific resource [5]. For example, in a cyber-attack occurred in 2011 against the Amazon EC2 service, Sony Online Entertainment segment was impaired and unavailable [5] which also caused in enormity losses. With the emergence of cloud technology, researchers’ attention in availability is increased much more rather than in information security [6] with regard to the fact that the basis of this technology is the high availability. Thus, several algorithms and methods are proposed to prevent attacks against availability [3, 4, 6, 7, 8, 9, 10, 11, and 12] each has proposed his own algorithm structure. For instance, [13] and [14] put ways of detecting an attack together and compared themgenerally. In addition, [15] evaluated the quality of the methods in intrusion detection alerts. Apparently, many techniques have been proposed for intrusion detection and they have all been studied by other researchers.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A New Fairness Index and Novel Approach for QoS-Aware Resource Allocation in LTE Networks Based on Utility Functions

Resource allocation techniques have recently appeared as a widely recognized feature in LTE networks. Most of existing approaches in resource allocation focus on maximizing network’s utility functions. The great potential of utility function in improving resource allocation and enhancing fairness and mean opinion score (MOS) indexes has attracted large efforts over the last few years. In this p...

متن کامل

A Novel Fuzzy Logic Base Scheduling Mechanism for Service Differentiation in IP Networks

Quality of Service (QoS) refers to a set of rules or techniques that help the network administrators use the available network resources optimally to manage the effects of congestion and to treat the applications according to their needs. The differentiated services architecture (DiffServ) allows providing quality of service to users. The major DiffServ premise is that individual flows with sim...

متن کامل

Impact of denial of service solutions on network quality of service

The Internet has become a universal communication network tool. It has evolved from a platform that supports best-effort traffic to one that now carries different traffic types including those involving continuous media with Quality of Service (QoS) requirements. As more services are delivered over the Internet, we face increasing risk to their availability given that malicious attacks on those...

متن کامل

Robust and efficient detection of DDoS attacks for large-scale internet

In recent years, distributed denial of service (DDoS) attacks have become a major security threat to Internet services. How to detect and defend against DDoS attacks is currently a hot topic in both industry and academia. In this paper, we propose a novel framework to robustly and efficiently detect DDoS attacks and identify attack packets. The key idea of our framework is to exploit spatial an...

متن کامل

DDoS Attack Detection Using Flow Entropy and Packet Sampling on Huge Networks

While the increasing number of services available through computer networks is a source of great convenience for users, it raises several concerns, including the threat of hacking and the invasion of user privacy. Hackers can easily block network services by flooding traffic to servers or by breaking through network security, hence causing significant economic loss. It is well know that a Distr...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • CoRR

دوره abs/1801.02300  شماره 

صفحات  -

تاریخ انتشار 2015