DOI QR코드

DOI QR Code

Distributed Denial of Service Defense on Cloud Computing Based on Network Intrusion Detection System: Survey

  • Samkari, Esraa (Department of Computer Science, College of Computer and Information Systems, Umm Al-Qura University) ;
  • Alsuwat, Hatim (Department of Computer Science, College of Computer and Information Systems, Umm Al-Qura University)
  • Received : 2022.06.05
  • Published : 2022.06.30

Abstract

One type of network security breach is the availability breach, which deprives legitimate users of their right to access services. The Denial of Service (DoS) attack is one way to have this breach, whereas using the Intrusion Detection System (IDS) is the trending way to detect a DoS attack. However, building IDS has two challenges: reducing the false alert and picking up the right dataset to train the IDS model. The survey concluded, in the end, that using a real dataset such as MAWILab or some tools like ID2T that give the researcher the ability to create a custom dataset may enhance the IDS model to handle the network threats, including DoS attacks. In addition to minimizing the rate of the false alert.

Keywords

References

  1. Gaurav, M., Babita, D., Mehul, M., Kamal, H.: Performance Comparison of Network Intrusion Detection System Based on Different Pre-processing Methods and Deep Neural Network. In: DSMLAI '21', August 9-12, 2021, Windhoek, Namibia (2021)
  2. Jay, S., Manollas, M.: Efficient Deep CNN-BiLSTM Model for Network Intrusion Detection. In: AIPR 2020, June 26-28, 2020, Xiamen, China (2020)
  3. Shweta, P., Meenakshi, T., Subham, G.: Leveraging LSTM-RNN combined with SVM for Network Intrusion. In: DSMLAI'21, August 9-12, 2021, Windhoek, Namibia (2021)
  4. Kaho, W., Joel, C.: Game-Theoretic Modeling of DDoS Attacks in Cloud Computing. In: UCC'21, December 6-9, 2021, Leicester, United Kingdom (2021)
  5. Dylan, C., Meng, J.: A Survey on Data-driven Network Intrusion Detection. In: ACM Computing Surveys, Vol. 54, No. 9, Article 182. Publication date: October 2021 (2021)
  6. Kumar, S., Debi, M.: DDoS Detection and Defense: Client Termination Approach. In: CUBE 2012, September 3-5, 2012, Pune, Maharashtra, India (2012)
  7. Zhewei, C., Linyue, Z., Wenwen, Y.: ADASYN-Random Forest Based Intrusion Detection Model. In: SPML 2021, August 18-20, 2021, Beijing, China (2021)
  8. Aouatif, A., Omar, B., Hicham, B., Abdelmajid, M.: A Review of Intrusion Detection Systems: Datasets and machine learning methods. In: NISS2021, April 01, 02, 2021, KENITRA, AA, Morocco (2021)
  9. Long,C., Gao, X., Zhao, J., Wan, W., Shen, H., Gao, P.: Intrusion Detection Using End-to-End Memory Network. In: ICCIS 2017, November 7-9, 2017, Wuhan, China (2017)
  10. Andrea, C., Shanchieh, Y., Giovanni, A.: On the Evaluation of Sequential Machine Learning for Network Intrusion Detection. In: ARES 2021, August 17-20, 2021, Vienna, Austria (2021)
  11. Florian, W., Felix, O., Steffen, H., Matthias, V., Mathias, F.: Multi-Stage Attack Detection via Kill Chain State Machines. In: CYSARM '21, November 19, 2021, Virtual Event, Republic of Korea (2021)
  12. Carlos, G., Emmanouil, V., Aidmar, W., Max, M., Simin, N.: On Generating Network Traffic Datasets with SyntheticAttacks for Intrusion Detection. In: ACM Transactions on Privacy and Security, Vol. 24, No. 2, Article 8. Publication date: December 2020 (2020)
  13. Hao, L.: A Survey on Machine Learning based Intrusion Detection Systems Using Apache Spark. In: HPCCT'21, July 02-04, 2021, Qingdao, China (2021)
  14. Zichuan, J., Yanpeng, C., Zheng, Y.: Survey of Intrusion Detection Methods Based on Data Mining Algorithms. In: BDE 2019, June 11-13, 2019, Hong Kong, Hong Kong (2019)
  15. Mohamed, A., Youness, K., El mostapha, C.: A survey and taxonomy of techniques used for alerts of Intrusion Detection Systems. In: BDIoT'19, October 23-24, 2019, Rabat, Morocco (2019)
  16. Arun, N., Satish, K.: An Extensive Survey on Intrusion Detection- Past, Present, Future. In: ICEMIS '18, June 19-20, 2018, Istanbul, Turkey (2018)
  17. Xue-Chao, S., Hai-Yan, F., Yu-Qing, C.: Network Intrusion Detection Based on One-dimensional Convolution Layer Autoencoders. In: ICFEICT 2021, May 21-23, 2021, Changsha, China (2021)
  18. Guansong, P., Chunhua, S., Anton, H., Longbing, C.: Toward Deep Supervised Anomaly Detection: Reinforcement Learning from Partially Labeled Anomaly Data. In: KDD '21, August 14-18, 2021, Virtual Event, Singapore (2021)
  19. Eva, P., Sotiris, I.: A Survey on Encrypted Network Traffic Analysis Applications, Techniques, and Countermeasures. In: ACM Computing Surveys, Vol. 54, No. 6, Article 123. Publication date: July 2021 (2021)
  20. Radoslava, S., Christian, L.: A Semi-Supervised Approach for Network Intrusion Detection. In: ARES 2020, August 25-28, 2020, Virtual Event, Ireland (2020)
  21. Xiaojie, W., Laisen, N., Zhaolong, N., Lei, G., Guoyin, W., Xinbo., G., Neeraj, K.: Deep Learning-based Network Trafic Prediction for Secure Backbone Networks in Internet of Vehicles. In: ACM Trans. Internet Technol (2022)
  22. Yujie, Z., Dezhi, H., Xinming, Y.: A hierarchical network intrusion detection model based on unsupervised clustering. In: MEDES '21, November 1-3, 2021, Hammamet, Tunisia (2021)
  23. Hatitye, C., Dane, B.: Adaptive Machine Learning Based Network Intrusion Detection. In: icARTi '21, December 9-10, 2021, Virtual Event, Mauritius (2021)
  24. Naga, K., Rajesh, Y., Raghava, S.: A Painstaking Analysis of Attacks on Hypervisors in Cloud Environment. In: ICMLT 2021, April 23-25, 2021, Jeju Island, Republic of Korea (2021)
  25. Elisa, B., Imtiaz, K.: AI-powered Network Security: Approaches and Research Directions. In: 8th NSysS 2021, December 21-23, 2021, Cox's Bazar, Bangladesh (2021)
  26. Zhao, M., Xiuhua, L., Chuan, S., Qilin, F., Xiaofei, W., Victor, C.: Sleeping Cell Detection for Resiliency Enhancements in 5G/B5G Mobile Edge-Cloud Computing Networks. In: 2022 Association for Computing Machinery (2022)
  27. Nagai, R., Kurihara, W., Higuchi, S., Hirotsu, T.: Design and Implementation of an OpenFlow based TCP SYN Flood Mitigation. In: 2573-7562/18/$31.00 ©2018 IEEE DOI 10.1109/MobileCloud.2018.00014 (2018)
  28. Quang, D.: Evaluating machine learning algorithms for intrusion detection systems using the dataset CIDDS-002. In: CSSE 2021, October 22-24, 2021, Singapore, Singapore (2021)
  29. Hanan, H., Christos, T., Robert, A.: Developing a Siamese Network for Intrusion Detection Systems. In: EuroMLSys '21, April 26, 2021, Online, United Kingdom (2021)
  30. Suresh, A., Thushara, R., Sumohana, C., Bheemarjuna, T.: On Handling Class Imbalance in Continual Learning based Network Intrusion Detection Systems. In: AIMLSystems '21, October 21-23, 2021, Bangalore, India (2021)