Abstract
This paper describes an approach for mitigating distributed denial-of-services attacks in Cloud. DDoS attacks are huge pitfall for Cloud, and still, this is not very well handled. We presented a survey of existing work to defend DDoS attacks and mechanisms. In Cloud, intruder detection systems can be deployed at various positions like front-end, back-end or at Virtual Machine. Most of the existing IDS have been deployed at Virtual Machine in cloud. We proposed a new frame work using ensemble classifiers, namely, Bagging and Stacking to detect intrusions of both insiders and outsiders, and our proposed frame work will deploy at back-end. We focused on defending DDoS attacks in cloud environment which are the bottle neck of a Cloud environment compared to other type of attacks.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
http://www.south.cattelecom.com/rtso/…/CloudComputing/0071626948_chap01.pdf.
Buyya, R., Broberg, J., Goscinski, A.M.: Cloud computing: Principles and paradigms, vol. 87. John Wiley & Sons (2010).
DistributedComputing, https://en.wikipedia.org/wiki/Distributed_computing.
George Sadowsky James X. Dempsey Alan Greenberg Barbara J. Mack Alan Schwartz.: Information Technology Security HandBook Infodev (2003).
John W. Rittinghouse., James F. Ransome: Cloud computing Implementation, Management, and Security. CRC press.
Cloud Computing: http://csrc.nist.gov/groups/SNS/cloud-computing/cloud-def-v14.doc.
Farzad Sabahi 978-1-61284-486-2/111$26.00 IEEE (2011).
National Institute of Standards and Technology, http://www.nist.gov/itl/cloud.
CloudComputing, www.ibm.com/developerworks/community/blogs/cloudcomputing/entry/nist_s_definition_of_cloud_computing_what_is_cloud_computing.
Cloud Computing.: http://adsmediat.com/overview-of-cloud-computing/.
Cloud Computing: http://newalboyonads.xyz/2016/01/13/cloud-computing/.
Cloud Computing: https://en.wikipedia.org/wiki/Distributed_computing.
Anthony T. Velete., Toby J. Velte., Robert Elsenpeter: cloud computing A practical approach by. Tata McGraw-Hill Edition.
Bing Wang, Yao Zheng, Wenjing Lou, Y. Thomas Hou.: DDoS attack protection in the era of cloud computing and SoftwareDefinedNetworking: IEEE 22nd International Conference on Network Protocols (2014).
A. Patcha., J-M. Park: An Overview of Anomaly Detection Techniques: Existing Solutions and Latest Technological Trends, Computer Networks, doi:10.1016/j.comnet.2007.02.001(2007).
Hai Jin et al.: A VMM-based intrusion prevention system in cloud computing environment © Springer Science + Business Media, LLC J Supercomput DOI 10.1007/s11227-011-0608-2 (2011).
Kapil Kumar Gupta.: l “Layered Approach Using Conditional Random Fields for Intrusion Detection” IEEE Transactions on Dependable and Secure Computing Vol 7, No 1, Jan–March (2010).
Srinivas Mukkamala.: Intrusion Detection using Nueral Networks and Support Vector Machines 0-7803-7278-6/02/$10.00 IEEE(2002).
Asmaa shaker., Ashroor: International conference on Future Information Technology IPCSIT vol.13 (2011) IACSIT Press, Singapore (2011).
Baraka, Hifaa Bait., Huaglory Tianfield”: Intrusion Detection system for cloud environment” Proceedings of the 7th International Conference on Security of Information and Networks. SIN 14 (2014).
B. Kiranmai., A. Damodaram: Defending DDOS Attacks in Cloud Computing Environment A SurveyInternational Journal of Application or Innovation in Engineering & Management (IJAIEM) Volume 4, Issue 11, November 2015 ISSN 2319-4847 (2015).
Sanchika Gupta et al.:Copyright published by Elsevier. This is an open access article distributed under the Creative Commons Attribution License (2011).
Mr R. Kumar: International journal of Engineering and General Science Volume 3, Issue 1, January- February,2015.
Shaohua Teng et al.: International Journal of Security and its applications vol. 8 N0.3, pp 107–118 http://dx.doi.org/10.14257/ijsia.2014.8.3.12(2014).
http://www.researchgate.net/profileCarlos_Westphall/publication/275463281_SECURWARE_2014 The_Eighth_International_Conference_on_Emerging_Security_Information_Systems_and_Technologies/links/553d04b70cf245bdd7696e3d.pdf#page = 48.
Botnets.: https://en.wikipedia.org/wiki/Botnet.
www.cisco.com/us/products/ps1634/products_Configuration_guide/chapter0918690080849898.html.
WireShark: www.wireshark.org.
Wireshark: http://www.filehippo.com down load wireshark_32/11401/.
Wireshark: https://openrepos.net/content/nieldk/wireshark/.
Wireshark: http://www.darknet.org.uk/2008/04/wireshark-v100-released-cross-platform-graphical-packet-sniffer/.
Ensemble Learning: https://en.wikipedia.org/wiki/Ensemble_learning.
Ensemble Learning: http://stackoverflow.com/tags/ensemble-learning/info/.
GulshanKumar et al.: “The Use of Artificial-Intelligence-Based Ensembles for Intrusion Detection: A Review” Applied Computational Intelligence and Soft Computing Volume 2012 (2012), ArticleID 850160, 20 pages http://dx.doi.org/10.1155/2012/850160.
Ensemble Methods: www.ensemble.com/.
Ensemble Learning: https://www.cs.cmu.edu/afs/cs/project/jair/pub/volume11/opitz99a-html/ node3.html.
Lecture 6: Ensemble Methods Marina Santini, Uppsala University Department of Linguistics and Philology.
Hong Chang.: Ensemble learning Institute of Computing technology Chineese Academy of sciences Machine Learning Methods (Fall 2012).
Weka tutorial.: www.cs.waikato.ac.nz/ml/weka.
Security in Cloud Computing, http://www.meanboyfriend.com/overdue_ideas/2008/10/send-in-the-clouds/.
Jiawei Han., Micheline Kamber: Data Mining Concepts and Techniques Second Edition Morgan Kauffman Publishers (2006).
Evaluation Measures: http://iasri.res.in/ebook/win_school_aa/notes/Evaluation_Measures.pdf.
R. Jeena: International Journal of Innovative Research in Computer and Communication Engineering Vol.3,Issue 2, February 2015.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2017 Springer Science+Business Media Singapore
About this paper
Cite this paper
Kiranmai, B., Damodaram, A. (2017). An Innovative Method to Mitigate DDoS Attacks for Cloud Environment Using Bagging and Stacking. In: Satapathy, S., Prasad, V., Rani, B., Udgata, S., Raju, K. (eds) Proceedings of the First International Conference on Computational Intelligence and Informatics . Advances in Intelligent Systems and Computing, vol 507. Springer, Singapore. https://doi.org/10.1007/978-981-10-2471-9_28
Download citation
DOI: https://doi.org/10.1007/978-981-10-2471-9_28
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-10-2470-2
Online ISBN: 978-981-10-2471-9
eBook Packages: EngineeringEngineering (R0)