sis 19(23): e7

Research Article

Detection and mitigation of DDoS attack in cloud computing using machine learning algorithm

Download586 downloads
  • @ARTICLE{10.4108/eai.29-7-2019.159834,
        author={Aroosh  Amjad and Tahir  Alyas and Umer  Farooq and Muhammad  Arslan  Tariq},
        title={Detection and mitigation of DDoS attack in cloud computing using machine learning algorithm},
        journal={EAI Endorsed Transactions on Scalable Information Systems},
        volume={6},
        number={23},
        publisher={EAI},
        journal_a={SIS},
        year={2019},
        month={8},
        keywords={Cloud computing, DDoS, vulnerability, sql injection, mitigation, TCP/IP, UDP, ICMP packets, malicious, exploit},
        doi={10.4108/eai.29-7-2019.159834}
    }
    
  • Aroosh Amjad
    Tahir Alyas
    Umer Farooq
    Muhammad Arslan Tariq
    Year: 2019
    Detection and mitigation of DDoS attack in cloud computing using machine learning algorithm
    SIS
    EAI
    DOI: 10.4108/eai.29-7-2019.159834
Aroosh Amjad1, Tahir Alyas1,*, Umer Farooq1, Muhammad Arslan Tariq1
  • 1: Department of Computer Science, Lahore Garrison University, Pakistan
*Contact email: tahiralyas@lgu.edu.pk

Abstract

Cloud computing, with its staggering and on-demand services had revamped the technology so far. Cloud consumers are freely to use the applications and software on the premises of Pay-as-you go concept. This concept decreased the cost and make the services less expensive and more reliable. One of the most important characteristic of cloud structure is on demand self-service. Cloud computing applications can be accessed anywhere at any time with much less cost. As cloud provide its consumers with its tremendous on demand services, besides this it is surviving from the excruciating security issues that are discourteous towards the cloud. There are, as many different attacks that results in making the servers down. One of the most hazardous attack is DDoS. This paper hiloghted the DDoS attack and its prevention technique which results in making the server side less vulnerable. The scenario includes, a transmission of million and trillion of packets in the form of DDoS at cloud-based websites, thus making it differentiated though different hosts. Making use of operating systems such as ParrotSec to make the attack possible. Last step includes detection and prevention through the most effective algorithms namely, Naïve Bayes and Random forest. This paper also focused the categories of attacks on cloud computing.