Skip to main content

DDoS Attacks Detection in Cloud Computing Using Data Mining Techniques

  • Conference paper
  • First Online:
Advances in Data Mining. Applications and Theoretical Aspects (ICDM 2016)

Part of the book series: Lecture Notes in Computer Science ((LNAI,volume 9728))

Included in the following conference series:

Abstract

Cloud computing platforms are developing fast nowadays. Due to their increasing complexity, hackers have more and more opportunities to attack them successfully. In this paper, we present an approach for detection internal and external DDoS attacks in cloud computing using data mining techniques. The main features of the cloud security component that implements suggested approach is an ability to detect both types of DDoS attacks and usage of data mining techniques. The component prototype is implemented in OpenStack cloud computing platform. The paper presents the results of the experiments with different types of DDoS attacks.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Amazon Web Services, Inc.: Amazon Web Services (AWS) - Cloud Computing Services. https://aws.amazon.com

  2. Bekeneva, Y., Borisenko, K., Shorov, A., Kotenko, I.: Investigation of DDoS attacks by hybrid simulation. In: Khalil, I., Neuhold, E., Tjoa, A.M., Xu, L.D., You, I. (eds.) ICT-EurAsia 2015 and CONFENIS 2015. LNCS, vol. 9357, pp. 179–189. Springer, Heidelberg (2015). doi:10.1007/978-3-319-24315-3_18

    Chapter  Google Scholar 

  3. Choudhary, S., Srinivasan, B.: Usage of netflow in security and monitoring of computer networks. Int. J. Comput. Appl. 68, 17–24 (2013)

    Google Scholar 

  4. Cloudsecurityalliance.org.: Top Threats: Cloud Security Alliance. https://cloudsecurityalliance.org/research/top-threats

  5. Delimitrou, C., Kozyrakis, C.: Security implications of data mining in cloud scheduling. IEEE Comput. Archit. Lett. 1-1 (2015)

    Google Scholar 

  6. Docs.openstack.org.: OpenStack Docs: Scenario: Legacy with Open vSwitch. http://docs.openstack.org/networking-guide/scenario_legacy_ovs.html

  7. Dou, W., Chen, Q., Chen, J.: A confidence-based filtering method for DDoS attack defense in cloud environment. Future Gener. Comput. Syst. 29, 1838–1850 (2013)

    Article  Google Scholar 

  8. Editor, L.: Cyberattacks and Distributed Denial of Service (DDoS) threats on financial firms produce big pay offs - Beyond Bandwidth. http://blog.level3.com/finance/cyberattacks-and-distributed-denial-of-service-ddos-threats-on-financial-firms-produce-big-pay-offs/

  9. Garreta, R., Moncecchi, G.: Learning scikit-learn

    Google Scholar 

  10. Haag, P.: Watch your flows with NfSen and NFDUMP. 50th RIPE Meeting (2005)

    Google Scholar 

  11. Hall, D.: Ansible configuration management

    Google Scholar 

  12. Justin, P.: Virtual switching in an era of advanced edges. In: 2nd Workshop on Data Center–Converged and Virtual Ethernet Switching (2010)

    Google Scholar 

  13. Kaspersky DDoS Protection: Kaspersky Lab. http://media.kaspersky.com/kaspersky-ddos-protection-data-sheet.pdf

  14. Milojičić, D., Llorente, I., Montero, R.: OpenNebula: a cloud management tool. IEEE Internet Comput. 15, 11–14 (2011)

    Google Scholar 

  15. Munz, G., Li, S., Carle, G.: Traffic anomaly detection using K-means clustering. In: GI/ITG Workshop MMBnet (2007)

    Google Scholar 

  16. Salesforce.com: What is Cloud Computing? - Salesforce UK. http://www.salesforce.com/uk/cloudcomputing/#where

  17. Secucloud Web-Site: Secucloud. https://secucloud.com/en/company/about-us

  18. Sefraoui, O., Aissaoui, M., Eleuldj, M.: OpenStack: toward an open-source solution for cloud computing. Int. J. Comput. Appl. 55, 38–42 (2012)

    Google Scholar 

  19. Vaughan-Nichols, S.: OpenFlow: the next generation of the network? Computer 44, 13–15 (2011)

    Article  Google Scholar 

  20. Vieira, K., Schulter, A., Westphall, C., Westphall, C.: Intrusion detection for grid and cloud computing. IT Prof. 12, 38–43 (2010)

    Article  Google Scholar 

  21. Zolotukhin, M., Hamalainen, T., Kokkonen, T., et al.: Data mining approach for detection of DDoS attacks utilizing SSL/TLS protocol. In: 15th International Conference, NEW2AN 2015, pp. 274–285. St. Petersburg, Russia (2015)

    Google Scholar 

Download references

Acknowledgments

The paper has been prepared within the scope of the state project “Organization of scientific research” of the main part of the state plan of the Board of Education of Russia, the project part of the state plan of the Board of Education of Russia (task 2.136.2014/K) as well as supported by grant of RFBR # 16-07-00625, supported by Russian President's fellowship, as well as with the financial support of the Foundation for Assistance to Small Innovative Enterprises in the scientific and technical spheres.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Andrey Shorov .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Springer International Publishing Switzerland

About this paper

Cite this paper

Borisenko, K., Smirnov, A., Novikova, E., Shorov, A. (2016). DDoS Attacks Detection in Cloud Computing Using Data Mining Techniques. In: Perner, P. (eds) Advances in Data Mining. Applications and Theoretical Aspects. ICDM 2016. Lecture Notes in Computer Science(), vol 9728. Springer, Cham. https://doi.org/10.1007/978-3-319-41561-1_15

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-41561-1_15

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-41560-4

  • Online ISBN: 978-3-319-41561-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics