Skip to main content

An Innovative Method to Mitigate DDoS Attacks for Cloud Environment Using Bagging and Stacking

  • Conference paper
  • First Online:

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 507))

Abstract

This paper describes an approach for mitigating distributed denial-of-services attacks in Cloud. DDoS attacks are huge pitfall for Cloud, and still, this is not very well handled. We presented a survey of existing work to defend DDoS attacks and mechanisms. In Cloud, intruder detection systems can be deployed at various positions like front-end, back-end or at Virtual Machine. Most of the existing IDS have been deployed at Virtual Machine in cloud. We proposed a new frame work using ensemble classifiers, namely, Bagging and Stacking to detect intrusions of both insiders and outsiders, and our proposed frame work will deploy at back-end. We focused on defending DDoS attacks in cloud environment which are the bottle neck of a Cloud environment compared to other type of attacks.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. http://dic.academic.ru/dic.nsf/ruwiki/1070341.

  2. http://www.south.cattelecom.com/rtso/…/CloudComputing/0071626948_chap01.pdf.

  3. Buyya, R., Broberg, J., Goscinski, A.M.: Cloud computing: Principles and paradigms, vol. 87. John Wiley & Sons (2010).

    Google Scholar 

  4. DistributedComputing, https://en.wikipedia.org/wiki/Distributed_computing.

  5. George Sadowsky James X. Dempsey Alan Greenberg Barbara J. Mack Alan Schwartz.: Information Technology Security HandBook Infodev (2003).

    Google Scholar 

  6. John W. Rittinghouse., James F. Ransome: Cloud computing Implementation, Management, and Security. CRC press.

    Google Scholar 

  7. Cloud Computing: http://csrc.nist.gov/groups/SNS/cloud-computing/cloud-def-v14.doc.

  8. Farzad Sabahi 978-1-61284-486-2/111$26.00 IEEE (2011).

    Google Scholar 

  9. National Institute of Standards and Technology, http://www.nist.gov/itl/cloud.

  10. CloudComputing, www.ibm.com/developerworks/community/blogs/cloudcomputing/entry/nist_s_definition_of_cloud_computing_what_is_cloud_computing.

  11. www.slideshare.net/avazhamiva/cloudcomputing.

  12. Cloud: https://en.wikipedia.org/wiki/private_cloud.

  13. Cloud Computing.: http://adsmediat.com/overview-of-cloud-computing/.

  14. Cloud Computing: http://newalboyonads.xyz/2016/01/13/cloud-computing/.

  15. Cloud Computing: https://en.wikipedia.org/wiki/Distributed_computing.

  16. Anthony T. Velete., Toby J. Velte., Robert Elsenpeter: cloud computing A practical approach by. Tata McGraw-Hill Edition.

    Google Scholar 

  17. Bing Wang, Yao Zheng, Wenjing Lou, Y. Thomas Hou.: DDoS attack protection in the era of cloud computing and SoftwareDefinedNetworking: IEEE 22nd International Conference on Network Protocols (2014).

    Google Scholar 

  18. A. Patcha., J-M. Park: An Overview of Anomaly Detection Techniques: Existing Solutions and Latest Technological Trends, Computer Networks, doi:10.1016/j.comnet.2007.02.001(2007).

  19. Hai Jin et al.: A VMM-based intrusion prevention system in cloud computing environment © Springer Science + Business Media, LLC J Supercomput DOI 10.1007/s11227-011-0608-2 (2011).

  20. Kapil Kumar Gupta.: l “Layered Approach Using Conditional Random Fields for Intrusion Detection” IEEE Transactions on Dependable and Secure Computing Vol 7, No 1, Jan–March (2010).

    Google Scholar 

  21. http://www.slideshare.net/ieeexploreprojects/4-layered-approach-using-conditional-random-fields-for-intrusion-detection.

  22. Srinivas Mukkamala.: Intrusion Detection using Nueral Networks and Support Vector Machines 0-7803-7278-6/02/$10.00 IEEE(2002).

    Google Scholar 

  23. Asmaa shaker., Ashroor: International conference on Future Information Technology IPCSIT vol.13 (2011) IACSIT Press, Singapore (2011).

    Google Scholar 

  24. Baraka, Hifaa Bait., Huaglory Tianfield”: Intrusion Detection system for cloud environment” Proceedings of the 7th International Conference on Security of Information and Networks. SIN 14 (2014).

    Google Scholar 

  25. B. Kiranmai., A. Damodaram: Defending DDOS Attacks in Cloud Computing Environment A SurveyInternational Journal of Application or Innovation in Engineering & Management (IJAIEM) Volume 4, Issue 11, November 2015 ISSN 2319-4847 (2015).

    Google Scholar 

  26. Sanchika Gupta et al.:Copyright published by Elsevier. This is an open access article distributed under the Creative Commons Attribution License (2011).

    Google Scholar 

  27. http://www.hindawi.com/journals/ijdsn/2013/364575/t.

  28. Mr R. Kumar: International journal of Engineering and General Science Volume 3, Issue 1, January- February,2015.

    Google Scholar 

  29. Shaohua Teng et al.: International Journal of Security and its applications vol. 8 N0.3, pp 107–118 http://dx.doi.org/10.14257/ijsia.2014.8.3.12(2014).

  30. http://www.researchgate.net/profileCarlos_Westphall/publication/275463281_SECURWARE_2014 The_Eighth_International_Conference_on_Emerging_Security_Information_Systems_and_Technologies/links/553d04b70cf245bdd7696e3d.pdf#page = 48.

  31. Botnets.: https://en.wikipedia.org/wiki/Botnet.

  32. www.cisco.com/us/products/ps1634/products_Configuration_guide/chapter0918690080849898.html.

  33. WireShark: www.wireshark.org.

  34. Wireshark: http://www.filehippo.com down load wireshark_32/11401/.

  35. Wireshark: https://openrepos.net/content/nieldk/wireshark/.

  36. Wireshark: http://www.darknet.org.uk/2008/04/wireshark-v100-released-cross-platform-graphical-packet-sniffer/.

  37. Ensemble Learning: https://en.wikipedia.org/wiki/Ensemble_learning.

  38. Ensemble Learning: http://stackoverflow.com/tags/ensemble-learning/info/.

  39. GulshanKumar et al.: “The Use of Artificial-Intelligence-Based Ensembles for Intrusion Detection: A Review” Applied Computational Intelligence and Soft Computing Volume 2012 (2012), ArticleID 850160, 20 pages http://dx.doi.org/10.1155/2012/850160.

  40. Ensemble Methods: www.ensemble.com/.

  41. Ensemble Learning: https://www.cs.cmu.edu/afs/cs/project/jair/pub/volume11/opitz99a-html/ node3.html.

  42. Lecture 6: Ensemble Methods Marina Santini, Uppsala University Department of Linguistics and Philology.

    Google Scholar 

  43. Hong Chang.: Ensemble learning Institute of Computing technology Chineese Academy of sciences Machine Learning Methods (Fall 2012).

    Google Scholar 

  44. Weka tutorial.: www.cs.waikato.ac.nz/ml/weka.

  45. Security in Cloud Computing, http://www.meanboyfriend.com/overdue_ideas/2008/10/send-in-the-clouds/.

  46. Bagging: https://www.google.co.in/imgres?imgurl=http://csewiki.unl.edu/wiki/images/7/72/Screen_shot_2010-1203_at_5.46.21_PM.png&imgrefurl=http://csewiki.unl.edu/wiki/index.php/Bagging_and_Boosting&h=389&w=719&tbnid=AR8WMF2_O4B1M:&docid=i0gVO8ofVs4DM&ei=HdRiVqPCH5KeugS88oiIBA&tbm=isch&ved=0ahUKEwjjxP2I2MTJAhUSj44KHTw5AkEQMwgiKAYwBg.

  47. Jiawei Han., Micheline Kamber: Data Mining Concepts and Techniques Second Edition Morgan Kauffman Publishers (2006).

    Google Scholar 

  48. Evaluation Measures: http://iasri.res.in/ebook/win_school_aa/notes/Evaluation_Measures.pdf.

  49. R. Jeena: International Journal of Innovative Research in Computer and Communication Engineering Vol.3,Issue 2, February 2015.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to B. Kiranmai .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer Science+Business Media Singapore

About this paper

Cite this paper

Kiranmai, B., Damodaram, A. (2017). An Innovative Method to Mitigate DDoS Attacks for Cloud Environment Using Bagging and Stacking. In: Satapathy, S., Prasad, V., Rani, B., Udgata, S., Raju, K. (eds) Proceedings of the First International Conference on Computational Intelligence and Informatics . Advances in Intelligent Systems and Computing, vol 507. Springer, Singapore. https://doi.org/10.1007/978-981-10-2471-9_28

Download citation

  • DOI: https://doi.org/10.1007/978-981-10-2471-9_28

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-10-2470-2

  • Online ISBN: 978-981-10-2471-9

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics