LCDT-M: Log-Cluster DDoS Tree Mitigation Framework Using SDN in the Cloud Environment
نویسندگان
چکیده
In the cloud computing platform, DDoS (Distributed Denial-of-service) attacks are one of most commonly occurring attacks. Research studies on mitigation rarely considered data shift problem in real-time implementation. Concurrently, existing have attempted to perform attack detection. Nevertheless, they been deficient regarding detection rate. Hence, proposed study proposes a novel scheme using LCDT-M (Log-Cluster Tree Mitigation) framework for hybrid environment. detects and mitigates Software-Defined Network (SDN) based The comprises three algorithms: GFS (Greedy Feature Selection), TLMC (Two Log Mean Clustering), DM (Detection-Mitigation) DT (Decision Tree) optimize along with SDN. simulated defined environment during As result, architecture achieved an accuracy about 99.83%, confirming its superior performance.
منابع مشابه
Service resizing for quick DDoS mitigation in cloud computing environment
Current trends in distributed denial of service (DDoS) attacks show variations in terms of attack motivation, planning, infrastructure, and scale. “DDoS-for-Hire” and “DDoS mitigation as a Service” are the two services, which are available to attackers and victims, respectively. In this work, we provide a fundamental difference between a “regular” DDoS attack and an “extreme” DDoS attack. We co...
متن کاملDDoS Attacks, Detection Parameters and Mitigation in Cloud Environment
Cloud computing refers to providing on demand services and computing resources via Internet. The cloud environment has many security challenges among which DDoS attcks have maximum priority. Within Cloud Security issues being dominant for the private enterprises, the denial of service attacks are rated as the highest priority threat. This paper presents a review of DDoS attacks and parameters t...
متن کاملDDoS Attacks in Cloud and Mitigation Techniques
The cloud computing is one of the developing segmenting of IT industry as well as a promising concept to the end users.Cloud computing is an internet based pay as use service which provides three layered services (Software as a Service, Platform as a Service and Infrastructure as a Service) to its consumers on demand. These on demand service facilities provide to its consumers in multitenant en...
متن کاملDDoS Attack in “Cloud of Things” Environment, Software Defined Networking (SDN) and A Research on Defense Mechanisms against DDoS using SDN
The Internet of Things presents the user with a novel means of communicating with the Web world through ubiquitous object-enabled networks. While IoT is exciting on its own, the real innovation will come from combining it with cloud computing. In the new era of Internet of Things integrated with cloud computing, Distributed Denial Service of Attacks (DDoS) is growing substantially. With the adv...
متن کاملDetecting DDoS Attacks in Cloud Computing Environment
This paper is focused on detecting and analyzing the Distributed Denial of Service (DDoS) attacks in cloud computing environments. This type of attacks is often the source of cloud services disruptions. Our solution is to combine the evidences obtained from Intrusion Detection Systems (IDSs) deployed in the virtual machines (VMs) of the cloud systems with a data fusion methodology in the front-...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: International Journal of Computer Network and Information Security
سال: 2023
ISSN: ['2074-9090', '2074-9104']
DOI: https://doi.org/10.5815/ijcnis.2023.02.05