Home   >   CSC-OpenAccess Library   >    Manuscript Information
Reinforcement Learning for Detection and Prevention of DDoS Attacks in Cloud Environment
Khaled Omer Basulaim, Hanan Mohammed AL-Amoudi
Pages - 1 - 28     |    Revised - 31-01-2023     |    Published - 28-02-2023
Volume - 17   Issue - 1    |    Publication Date - February 2023  Table of Contents
MORE INFORMATION
KEYWORDS
Cloud Computing, Reinforcement Learning, DDoS Attack.
ABSTRACT
Cloud computing is regarded as the one of the key technologies today as it provides the resources based on the on-demand availability of the users. Even though it provides reliable services, security is one of the major concerns. One of the major security threats in the cloud computing environment is Distributed Denial of Service (DDoS) attacks which makes the resources unavailable to the end users by exploiting the entities through continuous requests in distributed locations. The proposed work aims to solve the prior problems by proposing Reinforcement Learning based DDoS in Cloud (RL-DDoS Cloud). The proposed work adopts RL algorithms for network adaptively which also satisfy the QoS of the users. In order to provide framework against DDoS attacks, this work performs three stages such as DDoS prevention, DDoS Detection, and Risk Aware VM Isolation. In first stage, the proposed work checks the legitimacy of the users by multi factor authentication method which adopts SHA-512 algorithm. In second stage, the user data packets are selected and analyzed using fuzzy VIKOR algorithm which ensures security against inside attackers. Finally, the third stage provides secure VM migration and isolation using Soft Actor Critic algorithm by considering VM status and optimal VM selection metrics. The proposed work is simulated using Cloudsim simulation tool and evaluated with several validation metrics. The validation results shows that the proposed work outperforms better than the existing works.
A. Abhishta, R. Joosten & L.J. Nieuwenhuis.(2017) 'Analyzing the Impact of a DDoS Attack Announcement on Victim Stock Prices'.25th Euromicro International Conference on Parallel Distributed and Network-based Processing (PDP), 354-362.
A. Abhishta, R. Joosten & L.J. Nieuwenhuis.(2017) Comparing Alternatives to Measure the Impact of DDoS Attack Announcements on Target Stock Prices', J. Wirel. Mob. Networks Ubiquitous Compute Dependable Appl., 8, 1- 18
A. Chaturvedi, P. Kumar, K. Sharma (2018). 'Analysis on DDoS Attacks and Solutions in Virtualized Cloud Environment'. International Journal of Computer Trends and Technology, Vol 58, 76-81.
A. Khalid, M. Shahbaz.' (2013) cloud computing technology, Department of Computer Science, Government College University Lahore, 1Department of CS & E, UET, Lahore, Pakistan Journal of Science (Vol. 65 No. 3 September
A. Sahi, D. Lai, Y. Li, M. Diykh (2017). 'An Efficient DDoS TCP Flood Attack Detection and Prevention System in a Cloud Environment, IEEE Access.
A.K. Lamba, S. Singh, S. Balvinder, N. Dutta & S. Rela. (2018)'Embedding Machine & Deep Learning for Mitigating Security & Privacy Issues in IoT Enabled Devices & Networks. MatSciRN', Other Materials Performance (Topic). International Journal for Technological Research in Engineering, ISSN (Online): 2347-4718.
Al-Dulaimy, W. Itani, R. Zantout, & A. Zekri (2018). 'Type-aware virtual machine management for energy efficient cloud data centers', Sustain. Compute Informatics Syst.,19, 185-203.
B. Alshehry, W. Allen, (2017). 'Proactive Approach for the Prevention of DDoS attacks in Cloud Computing Environments', Applied Computing and Information Technology, PP. 119-124
Bhardwaj, A., Mangat, V., Vig, R., Halder, S., & Conti, M. (2021). Distributed denial of service attacks in cloud: State-of-the-art of scientific and commercial solutions. Comput. Sci. Rev., 39, 100332.
Botvinick, M.M., Ritter, S., Wang, J.X., Kurth-Nelson, Z., Blundell, C., & Hassabis, D. (2019). Reinforcement Learning, Fast and Slow. Trends in Cognitive Sciences, 23, 408-422.
C. Culnane, M. Eldridge, A. Essex & V. Teague (2017). 'Trust Implications of DDoS Protection in Online Elections', E-VOTE-ID
D. Ameyed, F. Jaafar, J. Fatahi. (2015) 'A slow read attack using cloud.7th International Conference on Electronics Computers and Artificial Intelligence ECAI) ', SSS-33-SSS-38.
Dong, S., Abbas, K., & Jain, R. (2019). A Survey on Distributed Denial of Service (DDoS) Attacks in SDN and Cloud Computing Environments. IEEE Access, 7, 80813-80828.
F. Ma & L. Zhang (2015). 'Multi-objective optimization for dynamic virtual machine management in cloud data center', 2015 6th IEEE International Conference on Software Engineering and Service Science, (ICSESS), 170-174
Grady, J. S., Her, M., Moreno, G., Perez, C., & Yelinek, J. (2019). Emotions in storybooks: A comparison of storybooks that represent ethnic and racial groups in the United States. Psychology of Popular Media Culture, 8(3), 207–217. https://doi.org/10.1037/ppm0000185.
H.S. Mondal, M.T. Hasan, M.B. Hossain, M.E. Rahaman & R. Hasan. (2017). 'Enhancing secure cloud computing environment by Detecting DDoS attack using fuzzy logic', 2017,3rd International Conference on Electrical Information and Communication Technology (EICT), 1-4, Doi: 10.1049/iet-ifs.2017.0500.
I. Baltatescu (2014) 'Cloud Computing Services: Benefits, Risks and Intellectual Property Issues. Global Economic Observer', IT & Communication Department Romanian Academy 2.
J. Askhoj, M. Nagamori & S. Sugimoto. (2010)' Archiving as a service: a model for the provision of shared archiving services using cloud computing. '11. Pages 151–158.
K. Singh, K. Thongam & T. De. (2018)' Detection and differentiation of application layer DDoS attack from flash', events using fuzzy-GA computation IET Inf. Secure., Vol. 12 Iss 6, pp. 502-512.
K.A. Simpson, S. Rogers & D.P. (2020) 'Pezaros. Per-Host DDoS Mitigation by Direct-Control Reinforcement', Learning'. IEEE Transactions on Network and Service Management, 17, 103-117.
Levine, S., Kumar, A., Tucker, G., & Fu, J. (2020). Offline Reinforcement Learning: Tutorial, Review, and Perspectives on Open Problems. ArXiv, abs/2005.01643.
M. Alkasassbeh (2017). 'An empirical evaluation for the intrusion detection features based on machine learning and feature selection methods', ArXiv, abs/1712.09623 .
M. Darwish, A. Ouda, L.F. Capretz. (2013, jun) 'Cloud-based DDoS attacks and defenses 'International 'International Conference on Information Society. (i-Society 2013), 67-71.
M. Idhammad, K. Afdel, & M. Belouch, (2018). 'Detection System of HTTP DDoS Attacks in a Cloud Environment Based on Information Theoretic Entropy and Random Forest', Secure. Commun. Networks, 2018, 1263123:1-1263123: 13. /doi.org/10.1155/2018/1263123
M. Mekala & P. Viswanathan. (2019). Energy-efficient virtual machine selection based on resource ranking and resource ranking and utilization factor approach in cloud computing for IoT. Compute. Electr. Eng., 73, 227-244.
M. Walterbusch, B. Martens & F. Teuteberg. (2015) 'A Decision Model for the Evaluation and Selection of Cloud Computing Services': A First Step Towards a More Sustainable Perspective. Int.
M.Walterbusch, B.Martens, F. Teuteberg (2018). 'Evaluating cloud computing services from a total cost of ownership perspective. Management Research Review', 36, 613-638.
N. Joshi, S. Shah. (2019). 'A Comprehensive Survey of Services Provided by Prevalent Cloud Computing Environments', Smart Intelligent Computing and Applications, Vol104.
O. A. Wahab, J. Bentahar, H.Otrok, A. Mourad. (2017) 'Optimal Load Distribution for the Detection of VM-based DDoS Attacks in the Cloud', IEEETransactions on Services Computing, PP. 1-14.
O. Yevsieieva & S. M .Helalat (2017). 'Analysis of the impact of the slow HTTP DOS and DDOS attacks on the cloud environment., 2017, 4th International Scientific-Practical Conference Problems of Info communications.
O. Yigitbasioglu (2014). 'Modelling the Intention to Adopt Cloud Computing Services: A Transaction Cost Theory Perspective'. Australas. J. Inf. Syst.,18(3), pp. 193-210.
P. Sareen. (2013, March) 'Cloud Computing: Types, Architecture, Applications, Concerns, Virtualization and Role of IT Governance in Cloud', Journal of Advanced Research in Computer Science and Software Engineering, Volume 3, Issue 3, March 2013 pp. 533-538.
R. Bhoyar, N. Chopde (2013, March). 'Cloud Computing: Service models, Types, Database and issues'. Volume 3, Issue 3.
R. K. Deka, D.K. Bhattacharyya, J.Kalita, (2016) 'DDoS Attacks: Tools, Mitigation Approaches, and Probable Impact on Private Cloud Environment', ArXiv, abs/1710.08628.
S. Sambangi, & L. Gondi. (2020). 'A Machine Learning Approach for DDoS (Distributed Denial of Service) Attack Detection Using Multiple Linear Regression.'
S. Vetha, & K. Devi. (2021). 'A trust‐based hypervisor framework for preventing DDoS attacks in cloud. Concurrency and Computations',Practice and Experience, 33. DOI: 10.1002/cpe.5279
T. Hirakawa, K .Ogura, B. B. Bista & T. Takata (2018). 'An Analysis of a Defense Method against Slow HTTP DoS Attack. 2018 International Symposium on Information Theory and Its Applications (ISITA).
T. Hirakawa, K. Ogura, B. B. Bista & T. Takata (2016). 'A Defense Method against Distributed Slow HTTP DoS Attack', 2016,19th International Conference on Network-Based Information Systems (NBiS). DOI 10.1109/NBiS. .2016.58.
V. Behzadan & A. Munir. (2018) 'The Faults in Our π∗s: Security Issues and Open Challenges in Deep Reinforcement Learning', arXiv:1810.10369v1 .
V. Chang (2018). 'An overview, examples, and impacts offered by Emerging Services and Analytics in Cloud Computing virtual reality' Neural Computing and Applications, 29, 1243-1256.
X. Chai, Y. Wang, C. Yan, Y. Zhao, W. Chen & X. Wang. 'DQ-MOTAG: (2020) 'Deep Reinforcement Learning- based Moving Target Defense Against DDoS Attacks', IEEE Fifth International Conference on Data Science, in Cyberspace DSC),375-379 DOI:10.1109/DSC50466.2020.00065
Zhang, K., Yang, Z., & Başar, T. (2019). Multi-Agent Reinforcement Learning: A Selective Overview of Theories and Algorithms. ArXiv, abs/1911.10635.
Professor Khaled Omer Basulaim
Faculty of Engineering, University of Aden, Aden - Yemen
Miss Hanan Mohammed AL-Amoudi
Faculty of Engineering, University of Aden, Aden - Yemen
hananmohd231@gmail.com


CREATE AUTHOR ACCOUNT
 
LAUNCH YOUR SPECIAL ISSUE
View all special issues >>
 
PUBLICATION VIDEOS