Skip to main content
Log in

Detection of DDOS Attack using Deep Learning Model in Cloud Storage Application

  • Published:
Wireless Personal Communications Aims and scope Submit manuscript

Abstract

In recent years, distributed denial of service (DDoS) attacks pose a serious threat to network security. How to detect and defend against DDoS attacks is currently a hot topic in both industry and academia. There have been a lot of methodologies and tools devised to detect DDoS attacks and reduce the damage they cause. Still, most of the methods cannot simultaneously achieve efficient detection with a small number of false alarms. In this case, deep learning techniques are appropriate and effective algorithm to categorize both normal and attacked information. Hence, a novel a feature selection-whale optimization algorithm-deep neural network (FS-WOA–DNN) method is proposed in this research article to mitigate DDoS attack in effective manner. Initially, pre-processing step is carried out for the input dataset where min–max normalization technique is applied to replace all the input in a specified range. Later on, that normalized information is fed into the proposed FS-WOA to select the optimal set of features for ease the classification process. Those selected features are subjected to deep neural network classifier to categorize normal and attacked data. Further to enhance the security of proposed model, the normal data are secure with the help of homomorphic encryption and are securely stored in the cloud. The proposed algorithm will be simulated using the MATLAB tool and tested experimentally that shows 95.35% accuracy in detecting DDoS attack.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9

Similar content being viewed by others

References

  1. Jang-Jaccard, J., & Nepal, S. (2014). A survey of emerging threats in cyber security. Journal of Computer and System Sciences, 80(5), 973–993.

    Article  MathSciNet  MATH  Google Scholar 

  2. Annamalai, S., Udendhran, R., & Vimal, S. (2019). Cloud-based predictive maintenance and machine monitoring for intelligent manufacturing for automobile industry. In Novel Practices and Trends in Grid and Cloud Computing (pp. 74–89). IGI Global.

  3. Salem, A., & Mohammed, M. A. (2013). DoSTDM: A denial of service detection model using firewall data traffic pattern matching (Doctoral dissertation, Curtin University).

  4. Tan, Z., Jamdagni, A., He, X., Nanda, P., Liu, R. P., & Hu, J. (2014). Detection of denial-of-service attacks based on computer vision techniques. IEEE transactions on computers, 64(9), 2519–2533.

    Article  MathSciNet  MATH  Google Scholar 

  5. Dwivedi, S., Vardhan, M., & Tripathi, S. (2020). Defense against distributed DoS attack detection by using intelligent evolutionary algorithm. International Journal of Computers and Applications. https://doi.org/10.1080/1206212X.2020.1720951.

  6. Moustafa, N., Hu, J., & Slay, J. (2019). A holistic review of Network Anomaly Detection Systems: A comprehensive survey. Journal of Network and Computer Applications, 128, 33–55.

    Article  Google Scholar 

  7. Malialis, K. (2014). Distributed reinforcement learning for network intrusion response (Doctoral dissertation, University of York).

  8. Fernandes, G., Rodrigues, J. J., Carvalho, L. F., Al-Muhtadi, J. F., & Proença, M. L. (2019). A comprehensive survey on network anomaly detection. Telecommunication Systems, 70(3), 447–489.

    Article  Google Scholar 

  9. Lima Filho, F. S. D., Silveira, F. A., de Medeiros Brito Junior, A., Vargas-Solar, G., & Silveira, L. F. (2019). Smart detection: An online approach for DoS/DDoS attack detection using machine learning. Security and Communication Networks (2019).

  10. Cao, Y., Gao, Y., Tan, R., Han, Q., & Liu, Z. (2018). Understanding internet DDoS mitigation from academic and industrial perspectives. IEEE Access, 6, 66641–66648.

    Article  Google Scholar 

  11. Cheng, J., Li, M., Tang, X., Sheng, V. S., Liu, Y., & Guo, W. (2018). Flow correlation degree optimization driven random forest for detecting DDoS attacks in cloud computing. Security and Communication Networks, 2018.

  12. Lin, P., Ye, K., & Xu, C. Z. (2019, June). Dynamic network anomaly detection system by using deep learning techniques. In International conference on cloud computing (pp. 161–176). Cham: Springer.

  13. Aamir, M., & Zaidi, S. M. A. (2019). Clustering based semi-supervised machine learning for DDoS attack classification. Journal of King Saud University-Computer and Information Sciences. https://doi.org/10.1016/j.jksuci.2019.02.003 (in Press).

  14. Hoque, N., Bhuyan, M. H., Baishya, R. C., Bhattacharyya, D. K., & Kalita, J. K. (2014). Network attacks: Taxonomy, tools and systems. Journal of Network and Computer Applications, 40, 307–324.

    Article  Google Scholar 

  15. Vimal, S., Kalaivani, L., & Kaliappan, M. (2019). Collaborative approach on mitigating spectrum sensing data hijack attack and dynamic spectrum allocation based on CASG modeling in wireless cognitive radio networks. Cluster Computing, 22(5), 10491–10501.

    Article  Google Scholar 

  16. Annamalai, S., Udendhran, R., & Vimal, S. (2019). An intelligent grid network based on cloud computing infrastructures. In Novel practices and trends in grid and cloud computing (pp. 59–73). IGI Global.

  17. Zargar, S. T., Joshi, J., & Tipper, D. (2013). A survey of defense mechanisms against distributed denial of service (DDoS) flooding attacks. IEEE Communications Surveys & Tutorials, 15(4), 2046–2069.

    Article  Google Scholar 

  18. Kumar, G. (2016). Denial of service attacks–an updated perspective. Systems Science & Control Engineering, 4(1), 285–294.

    Article  Google Scholar 

  19. Masdari, M., & Jalali, M. (2016). A survey and taxonomy of DoS attacks in cloud computing. Security and Communication Networks, 9(16), 3724–3751.

    Article  Google Scholar 

  20. Palmieri, F., Ricciardi, S., Fiore, U., Ficco, M., & Castiglione, A. (2015). Energy-oriented denial of service attacks: an emerging menace for large cloud infrastructures. The Journal of Supercomputing, 71(5), 1620–1641.

    Article  Google Scholar 

  21. Kabir, E., Jiankun, Hu., Wang, H., & Zhuo, G. (2018). A novel statistical technique for intrusion detection systems. Future Generation Computer Systems, 79, 303–318.

    Article  Google Scholar 

  22. Vimal, S., & Subbulakshmi, P. (2016). Secure data packet transmission in MANET using enhanced identity-based cryptography. International Journal of New Technologies in Science, 3(12), 35–42.

    Google Scholar 

  23. Pasupathi, S., Vimal, S., Harold-Robinson, Y., Khari, M., Verdú, E., & Crespo, R. G. (2020). Energy efficiency maximization algorithm for underwater Mobile sensor networks. Earth Science Informatics, 14, 215–225.

  24. Tan, Z., Jamdagni, A., He, X., Nanda, P., & Liu, R. P. (2011, November). Denial-of-service attack detection based on multivariate correlation analysis. In International conference on neural information processing (pp. 756–765). Berlin, Heidelberg: Springer.

  25. Om, H., & Kundu, A. (2012, March). A hybrid system for reducing the false alarm rate of anomaly intrusion detection system. In 2012 1st international conference on recent advances in information technology (RAIT) (pp. 131–136). IEEE.

  26. Kumar, N., & Sharma, S. (2013, July). Study of intrusion detection system for DDoS attacks in cloud computing. In 2013 Tenth International Conference on Wireless and Optical Communications Networks (WOCN) (pp. 1–5). IEEE.

  27. Pandit, T., & Dudy, A. (2014). A feed forward artificial neural network based system to minimize Dos attack in wireless network. International Journal of Advances in Engineering & Technology, 7(3), 938.

    Google Scholar 

  28. Oo, T. T., & Phyu, T. (2014, March). Analysis of DDoS detection system based on anomaly detection system. In International conference on advances in engineering and technology (ICAET'2014). Singapore.

  29. Sharma, S., Gupta, A. and Agrawal, S., 2016. An intrusion detection system for detecting denial-of-service attack in cloud using artificial bee colony. In Proceedings of the International Congress on Information and Communication Technology (pp. 137–145). Springer, Singapore.

  30. Yin, C., Zhu, Y., Fei, J., & He, X. (2017). A deep learning approach for intrusion detection using recurrent neural networks. IEEE Access, 5, 21954–21961.

    Article  Google Scholar 

  31. Igbe, O., Ajayi, O., & Saadawi, T. (2017, October). Denial of service attack detection using dendritic cell algorithm. In 2017 IEEE 8th annual ubiquitous computing, electronics and mobile communication conference (UEMCON) (pp. 294–299). IEEE.

  32. Kim, J., Shin, N., Jo, S. Y., & Kim, S. H. (2017, February). Method of intrusion detection using deep neural network. In 2017 IEEE international conference on big data and smart computing (BigComp) (pp. 313–316). IEEE.

  33. Ali, U., Dewangan, K. K., & Dewangan, D. K. (2018). Distributed denial of service attack detection using ant bee colony and artificial neural network in cloud computing. In Nature Inspired Computing (pp. 165–175). Singapore: Springer.

  34. Imamverdiyev, Y., & Abdullayeva, F. (2018). Deep learning method for denial of service attack detection based on restricted boltzmann machine. Big Data, 6(2), 159–169.

    Article  Google Scholar 

  35. Velliangiri, S., & Premalatha, J. (2019). Intrusion detection of distributed denial of service attack in cloud. Cluster Computing, 22(5), 10615–10623.

    Article  Google Scholar 

  36. Zi, L., Yearwood, J., & Wu, X. W. (2010, September). Adaptive clustering with feature ranking for DDoS attacks detection. In 2010 fourth international conference on network and system security (pp. 281–286). IEEE.

  37. Li, J., Liu, Y., & Gu, L. (2010, November). DDoS attack detection based on neural network. In 2010 2nd international symposium on aware computing (pp. 196–199). IEEE.

  38. Ramamoorthi, A., Subbulakshmi, T., & Shalinie, S. M. (2011, June). Real time detection and classification of DDoS attacks using enhanced SVM with string kernels. In 2011 international conference on recent trends in information technology (ICRTIT) (pp. 91–96). IEEE.

  39. Su, M. Y. (2011). Real-time anomaly detection systems for Denial-of-Service attacks by weighted k-nearest-neighbor classifiers. Expert Systems with Applications, 38(4), 3492–3498.

    Article  Google Scholar 

  40. Pandey, V. C., Peddoju, S. K., & Deshpande, P. S. (2018). A statistical and distributed packet filter against DDoS attacks in Cloud environment. Sādhanā, 43(3), 32.

    Article  Google Scholar 

  41. Katkar, V. D., & Kulkarni, S. V. (2013, December). Experiments on detection of Denial of Service attacks using Naive Bayesian classifier. In 2013 International Conference on Green Computing, Communication and Conservation of Energy (ICGCE) (pp. 725–730). IEEE.

  42. El Ghazouani, M., Kiram, E., Ahmed, M., Er-Rajy, L., & El Khanboubi, Y. (2020). Efficient method based on blockchain ensuring data integrity auditing with deduplication in cloud. International Journal of Interactive Multimedia & Artificial Intelligence, 6(3), 32–38.

  43. Baldominos, A., López-Sánchez, J. L., & Acevedo-Aguilar, M. (2020). Blockverse: A cloud blockchain-based platform for tracking in affiliate systems. International Journal of Interactive Multimedia & Artificial Intelligence, 6(3), 24–31.

  44. Herrera-Cubides, J. F., Gaona-García, P. A., Montenegro-Marín, C., Cataño, D., & González-Crespo, R. (2019). Security aspects in web of data based on trust principles. A brief of literature review. International Journal of Communication Networks and Information Security, 11(3), 365–379.

    Google Scholar 

  45. Vimal, S., Khari, M., Dey, N., Crespo, R. G., & Robinson, Y. H. (2020). Enhanced resource allocation in mobile edge computing using reinforcement learning based MOACO algorithm for IIOT. Computer Communications, 151, 355–364.

    Article  Google Scholar 

  46. Chaudhary, A., & Shrimal, G. (2019). Intrusion detection system based on genetic algorithm for detection of distribution denial of service attacks in MANETs. Available at SSRN 3351807.

  47. Ng, B. A., & Selvakumar, S. (2019). Deep radial intelligence with cumulative incarnation approach for detecting denial of service attacks. Neurocomputing, 340, 294–308.

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Rajiv Singh.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Agarwal, A., Khari, M. & Singh, R. Detection of DDOS Attack using Deep Learning Model in Cloud Storage Application. Wireless Pers Commun 127, 419–439 (2022). https://doi.org/10.1007/s11277-021-08271-z

Download citation

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11277-021-08271-z

Keywords

Navigation