Hossein Abbasi, Naser Ezzati-Jivan, Martine Bellaïche, Chamseddine Talhi and Michel Dagenais
Article (2019)
|
Open Access to the full text of this document Accepted Version Terms of Use: All rights reserved Download (294kB) |
Abstract
One of the most important benefits of using cloud computing is the benefit of on-demand services. Accordingly, the method of payment in the cloud environment is pay per use. This feature results in a new kind of DDOS attack called Economic Denial of Sustainability (EDoS), in which the customer pays extra to the cloud provider as a result of the attack. Similar to other DDoS attacks, EDoS attacks are divided into different types, such as (1) bandwidth-consuming attacks, (2) attacks that target specific applications, and 3) connection-layer exhaustion attacks. In this work, we propose a novel framework to detect different types of EDoS attacks by designing a profile that learns from and classifies the normal and abnormal behaviors. In this framework, the extra demanding resources are only allocated to VMs that are detected to be in a normal situation and therefore prevent the cloud environment from attack and resource misuse propagation.
Uncontrolled Keywords
DDoS attacks; EDoS attacks; cloud computing; machine-learning; detection
Subjects: |
2700 Information technology > 2706 Software engineering 2700 Information technology > 2715 Optimization 2800 Artificial intelligence > 2805 Learning and inference theories |
---|---|
Department: | Department of Computer Engineering and Software Engineering |
Funders: | CRSNG/NSERC |
Grant number: | CRDPJ507883-16 |
PolyPublie URL: | https://publications.polymtl.ca/4211/ |
Journal Title: | Journal of Hardware and Systems Security (vol. 3, no. 2) |
Publisher: | Springer |
DOI: | 10.1007/s41635-018-0061-2 |
Official URL: | https://doi.org/10.1007/s41635-018-0061-2 |
Date Deposited: | 02 Mar 2020 13:17 |
Last Modified: | 27 Sep 2024 11:38 |
Cite in APA 7: | Abbasi, H., Ezzati-Jivan, N., Bellaïche, M., Talhi, C., & Dagenais, M. (2019). Machine learning-based EDoS attack detection technique using execution trace analysis. Journal of Hardware and Systems Security, 3(2), 164-176. https://doi.org/10.1007/s41635-018-0061-2 |
---|---|
Statistics
Total downloads
Downloads per month in the last year
Origin of downloads
Dimensions