DDoS Attack Detection System: Utilizing Classification Algorithms with Apache Spark

作者: Amjad Alsirhani , Srinivas Sampalli , Peter Bodorik

DOI: 10.1109/NTMS.2018.8328686

关键词:

摘要: Cloud computing is a model of configurable resources such as servers, networks, storages, applications, and services that are available from anywhere at any time. In addition, cloud managed by experts different computer science fields to provide high reliability, availability, mobility, security, scalability. Of course, security against all form attacks, including DDoS attack, must be provided. Numerous attacks have been launched organizations in the last decade numerous approaches proposed tried detect prevent utilizing classification algorithms. this research, we propose detection system benefits resources. Our consists three concepts: algorithms, parallelism computing, fuzzy logic system. Classification algorithms used our classify predict on traffic packets. The concept efficiently accelerate execution utilized choose which next. We evaluated algorithm parallel processing configuring test-bed one master slaves. validated using MATLAB statistical tool.

参考文章(21)
Ruoning Song, Fang Liu, Real-time anomaly traffic monitoring based on dynamic k-NN cumulative-distance abnormal detection algorithm international conference on cloud computing. pp. 187- 192 ,(2014) , 10.1109/CCIS.2014.7175727
Masataka Mizukoshi, Masaharu Munetomo, Distributed denial of services attack protection system with genetic algorithms on Hadoop cluster computing framework congress on evolutionary computation. pp. 1575- 1580 ,(2015) , 10.1109/CEC.2015.7257075
XZ Wang, ECC Tsang, DS Yeung, None, A problem of selecting optimal subset of fuzzy-valued features systems man and cybernetics. ,vol. 3, pp. 361- 366 ,(1999) , 10.1109/ICSMC.1999.823231
Justin C.W. Debuse, Victor J. Rayward-Smith, Feature Subset Selection within a Simulated Annealing DataMining Algorithm intelligent information systems. ,vol. 9, pp. 57- 81 ,(1997) , 10.1023/A:1008641220268
Wei Wang, Sylvain Gombault, Efficient detection of DDoS attacks with important attributes conference on risks and security of internet and systems. pp. 61- 67 ,(2008) , 10.1109/CRISIS.2008.4757464
Nidapan Chaikla, Yulu Qi, Feature Selection Using the Domain Relationship with Genetic Algorithms Knowledge and Information Systems. ,vol. 1, pp. 377- 390 ,(1999) , 10.1007/BF03325105
Hammi Badis, Guillaume Doyen, Rida Khatoun, Understanding botclouds from a system perspective: A principal component analysis 2014 IEEE Network Operations and Management Symposium (NOMS). pp. 1- 9 ,(2014) , 10.1109/NOMS.2014.6838310
Tom Fawcett, An introduction to ROC analysis Pattern Recognition Letters. ,vol. 27, pp. 861- 874 ,(2006) , 10.1016/J.PATREC.2005.10.010
Zhijiang Chen, Guobin Xu, Vivek Mahalingam, Linqiang Ge, James Nguyen, Wei Yu, Chao Lu, A Cloud Computing Based Network Monitoring and Threat Detection System for Critical Infrastructures Big Data Research. ,vol. 3, pp. 10- 23 ,(2016) , 10.1016/J.BDR.2015.11.002