Research Article
Detection and mitigation of DDoS attack in cloud computing using machine learning algorithm
@ARTICLE{10.4108/eai.29-7-2019.159834, author={Aroosh Amjad and Tahir Alyas and Umer Farooq and Muhammad Arslan Tariq}, title={Detection and mitigation of DDoS attack in cloud computing using machine learning algorithm}, journal={EAI Endorsed Transactions on Scalable Information Systems}, volume={6}, number={23}, publisher={EAI}, journal_a={SIS}, year={2019}, month={8}, keywords={Cloud computing, DDoS, vulnerability, sql injection, mitigation, TCP/IP, UDP, ICMP packets, malicious, exploit}, doi={10.4108/eai.29-7-2019.159834} }
- Aroosh Amjad
Tahir Alyas
Umer Farooq
Muhammad Arslan Tariq
Year: 2019
Detection and mitigation of DDoS attack in cloud computing using machine learning algorithm
SIS
EAI
DOI: 10.4108/eai.29-7-2019.159834
Abstract
Cloud computing, with its staggering and on-demand services had revamped the technology so far. Cloud consumers are freely to use the applications and software on the premises of Pay-as-you go concept. This concept decreased the cost and make the services less expensive and more reliable. One of the most important characteristic of cloud structure is on demand self-service. Cloud computing applications can be accessed anywhere at any time with much less cost. As cloud provide its consumers with its tremendous on demand services, besides this it is surviving from the excruciating security issues that are discourteous towards the cloud. There are, as many different attacks that results in making the servers down. One of the most hazardous attack is DDoS. This paper hiloghted the DDoS attack and its prevention technique which results in making the server side less vulnerable. The scenario includes, a transmission of million and trillion of packets in the form of DDoS at cloud-based websites, thus making it differentiated though different hosts. Making use of operating systems such as ParrotSec to make the attack possible. Last step includes detection and prevention through the most effective algorithms namely, Naïve Bayes and Random forest. This paper also focused the categories of attacks on cloud computing.
Copyright © 2019 Aroosh Amjad et al., licensed to EAI. This is an open access article distributed under the terms of the Creative Commons Attribution license (http://creativecommons.org/licenses/by/3.0/), which permits unlimited use, distribution and reproduction in any medium so long as the original work is properly cited.