Abstract
In most scenarios, distributed denial of service (DDoS) attacks can be categorized into three distinct groups: (1) attacks targeting and consuming bandwidth, (2) attacks targeting selected applications and (3) attacks targeting connection-layer exhaustion. This study discusses in depth our proposal of a unique, inclusive model that has the ability to precisely detect and categorize DDoS attacks with the help of comparing normal traffic and resource usage against the traffic and resource utilization reported during potential attack situations. Since the features from all three attack categories are dependent upon each other, we based the metrics of our detection model on data collected from all three types during each attack. Additionally, we utilized the cumulative sum algorithm for the sake of change detection in traffic and resource usage patterns.
Similar content being viewed by others
Abbreviations
- TSP:
-
Time spent on a web page
- IOWi:
-
Network I/O in the web server virtual machine (incoming) (K bit/s)
- IOWo:
-
Network I/O in the web server virtual machine (outgoing) (K bit/s)
- IODi:
-
Network I/O in the database server virtual machine (incoming) (K bit/s)
- IODo:
-
Network I/O in the database server virtual machine (outgoing) (K bit/s)
- CPUW:
-
Percentage of CPU usage in the web server virtual machine
- CPUD:
-
Percentage of CPU usage in the database server virtual machine
- MemW:
-
Percentage of memory usage in the web server virtual machine
- NBWph:
-
Network bandwidth usage in the web server per hours (MB)
- NBWpd:
-
Network bandwidth usage in the web server per day (MB)
- NBWpw:
-
Network bandwidth usage in the web server per week (GB)
- NBWpm:
-
Network bandwidth usage in the web server per month (GB)
- R(SYN):
-
The ration of SYN packets in TCP packets
- R(ACK):
-
The ration of ACK packets in TCP packets
- R(SYN + ACK):
-
The ration of SYN and ACK packets in TCP packets
- NPi:
-
Number of packets (incoming) per second
- NPo:
-
Number of packets (outgoing) per second
- NHOP:
-
Number of half opened connections
References
Mell P, Grance T (2011) The NIST definition of cloud computing. National Institute of Science and Technology, Special Publication 800:145
Furht B, Escalante A (2010) Handbook of cloud computing, vol 3. Springer
Geelan J (2008) Twenty-one experts define cloud computing. Virtualization, Containers Expo Journal, Electronic Magazine. Available at http://virtualization.sys-con.com/node/612375
Rahul M, Haque MJ, Muntjir M (2012) Impact of cloud computing on IT industry: a review & analysis 1
VivinSandar S, Shenai S (2012) Economic denial of sustainability (EDoS) in cloud services using http and xml based DDoS attacks. Int J Comput Appl 41(20)
Deshmukh RV, Devadkar KK (2015) Understanding DDoS attack & its effect in cloud environment. Procedia Comput Sci 49:202–210
Jaafar GA, Abdullah SM, Ismail S (2019) Review of recent detection methods for HTTP DDoS attack. J Comput Netw Commun 2019:10
Medeira P, Grover J, Khorjiya M (2019) A survey on detecting application layer DDoS using big data technologies. J Emerg Technol Innov Res (JETIR), Available at SSRN https://ssrn.com/abstract=3385523
Bogdanoski M, Suminoski T, Risteski A (2013) Analysis of the SYN flood DoS attack. Int J Comput Netw Inf Secur (IJCNIS) 5(8):1–11
Abbasi H et al (2019) Machine learning-based EDoS attack detection technique using execution trace analysis. J Hardw Syst Secur 3(2):164–176
De Oca VM et al (2010) A cusum change-point detection algorithm for non-stationary sequences with application to data network surveillance. J Syst Softw 83(7):1288–1297
Taylor WA (2000) Change-point analysis: a powerful new tool for detecting changes
Abbasi H (2015) Detecting specific types of DDoS attacks in cloud environment by using anomaly detection. École Polytechnique de Montréal
Yang L et al (2012) Defense of DDoS attack for cloud computing. In: 2012 IEEE International Conference on Computer Science and Automation Engineering (CSAE)
Chonka A et al (2011) Cloud security defence to protect cloud computing against HTTP-DoS and XML-DoS attacks. J Netw Comput Appl 34(4):1097–1107
Wang J, Yang X, Long K (2010) A new relative entropy based app-DDoS detection method. In: The IEEE Symposium on Computers and Communications
Li A, Gu L, Xu K (2010) Fast anomaly detection for large data centers. In: 2010 IEEE Global Telecommunications Conference GLOBECOM 2010
Anand A et al (2012) Resource usage monitoring for KVM based virtual machines. In: 2012 18th International Conference on Advanced Computing and Communications (ADCOM)
Shea R, Liu J (2012) Understanding the impact of denial of service attacks on virtual machines. In: Proceedings of the 2012 IEEE 20th International Workshop on Quality of Service, IEEE Press: Coimbra, Portugal, p 1–9
Sqalli MH, Al-Haidari F, Salah K (2011) EDoS-Shield - a two-steps mitigation technique against EDoS attacks in cloud computing. In: 2011 Fourth IEEE International Conference on Utility and Cloud Computing
Kumar MN et al (2012) Mitigating economic denial of sustainability (EDoS) in cloud computing using in-cloud scrubber service. In: 2012 Fourth International Conference on Computational Intelligence and Communication Networks
Alosaimi W, Al-Begain K (2013) An Enhanced economical denial of sustainability mitigation system for the cloud. In: 2013 Seventh International Conference on Next Generation Mobile Apps, Services and Technologies
Masood M et al (2013) EDoS Armor: a cost effective economic denial of sustainability attack mitigation framework for e-commerce applications in cloud environments. In: INMIC
Baig ZA, Binbeshr F (2013) Controlled virtual resource access to mitigate economic denial of sustainability (EDoS) attacks against cloud infrastructures. In: 2013 International Conference on Cloud Computing and Big Data
Al-Haidari F, Sqalli MH, Salah K (2012) Enhanced EDoS-Shield for mitigating EDoS attacks originating from spoofed IP addresses. In: 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications
Koduru A, Neelakantam T, SMSB (2013) Detection of economic denial of sustainability using time spent on a web page in cloud. In: 2013 IEEE International Conference on Cloud Computing in Emerging Markets (CCEM)
Choi J et al (2014) A method of DDoS attack detection using HTTP packet pattern and rule engine in cloud computing environment. Soft Comput 18(9):1697–1703
Nguyen TT, Armitage GJ (2008) A survey of techniques for internet traffic classification using machine learning. IEEE Commun Surv Tutorials 10(1–4):56–76
Hawkins DM, Qifan Wu (2014) The CUSUM and the EWMA head-to-head. Qual Eng 26(2):215–222
Singh A, Juneja D (2010) Agent based preventive measure for UDP flood attack in DDoS attacks. Int J Eng Sci Technol 2
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Abbasi, H., Ezzati-Jivan, N., Bellaiche, M. et al. The Use of Anomaly Detection for the Detection of Different Types of DDoS Attacks in Cloud Environment. J Hardw Syst Secur 5, 208–222 (2021). https://doi.org/10.1007/s41635-021-00119-z
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s41635-021-00119-z