LCDT-M: Log-Cluster DDoS Tree Mitigation Framework Using SDN in the Cloud Environment

نویسندگان

چکیده

In the cloud computing platform, DDoS (Distributed Denial-of-service) attacks are one of most commonly occurring attacks. Research studies on mitigation rarely considered data shift problem in real-time implementation. Concurrently, existing have attempted to perform attack detection. Nevertheless, they been deficient regarding detection rate. Hence, proposed study proposes a novel scheme using LCDT-M (Log-Cluster Tree Mitigation) framework for hybrid environment. detects and mitigates Software-Defined Network (SDN) based The comprises three algorithms: GFS (Greedy Feature Selection), TLMC (Two Log Mean Clustering), DM (Detection-Mitigation) DT (Decision Tree) optimize along with SDN. simulated defined environment during As result, architecture achieved an accuracy about 99.83%, confirming its superior performance.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Service resizing for quick DDoS mitigation in cloud computing environment

Current trends in distributed denial of service (DDoS) attacks show variations in terms of attack motivation, planning, infrastructure, and scale. “DDoS-for-Hire” and “DDoS mitigation as a Service” are the two services, which are available to attackers and victims, respectively. In this work, we provide a fundamental difference between a “regular” DDoS attack and an “extreme” DDoS attack. We co...

متن کامل

DDoS Attacks, Detection Parameters and Mitigation in Cloud Environment

Cloud computing refers to providing on demand services and computing resources via Internet. The cloud environment has many security challenges among which DDoS attcks have maximum priority. Within Cloud Security issues being dominant for the private enterprises, the denial of service attacks are rated as the highest priority threat. This paper presents a review of DDoS attacks and parameters t...

متن کامل

DDoS Attacks in Cloud and Mitigation Techniques

The cloud computing is one of the developing segmenting of IT industry as well as a promising concept to the end users.Cloud computing is an internet based pay as use service which provides three layered services (Software as a Service, Platform as a Service and Infrastructure as a Service) to its consumers on demand. These on demand service facilities provide to its consumers in multitenant en...

متن کامل

DDoS Attack in “Cloud of Things” Environment, Software Defined Networking (SDN) and A Research on Defense Mechanisms against DDoS using SDN

The Internet of Things presents the user with a novel means of communicating with the Web world through ubiquitous object-enabled networks. While IoT is exciting on its own, the real innovation will come from combining it with cloud computing. In the new era of Internet of Things integrated with cloud computing, Distributed Denial Service of Attacks (DDoS) is growing substantially. With the adv...

متن کامل

Detecting DDoS Attacks in Cloud Computing Environment

This paper is focused on detecting and analyzing the Distributed Denial of Service (DDoS) attacks in cloud computing environments. This type of attacks is often the source of cloud services disruptions. Our solution is to combine the evidences obtained from Intrusion Detection Systems (IDSs) deployed in the virtual machines (VMs) of the cloud systems with a data fusion methodology in the front-...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: International Journal of Computer Network and Information Security

سال: 2023

ISSN: ['2074-9090', '2074-9104']

DOI: https://doi.org/10.5815/ijcnis.2023.02.05