{"title":"一种利用深度学习策略防御DDoS攻击的云安全增强方案","authors":"R. S. Prabhu, A. Prema, E. Perumal","doi":"10.1109/ICECA55336.2022.10009177","DOIUrl":null,"url":null,"abstract":"Cloud computing is a recent technology that allows users to create services on-demand. Cloud computing has achieved benefits as a result of its self-service capability as well as on demand services. This offers significant adaptability to its users, as they simply pay for the services they require, rather than worrying about the expense of equipment or software support. The major benefit of utilizing the cloud -based environment in organization is to enhance the data maintenance scheme in an easy way as well as improve the integrity of service to avoid manual flaws over maintenance. However, the remote cloud based data maintenance and evaluation leads certain security related threats, especially with Distributed Denial of Service (DDoS) Attacks. These attacks are caused by attempts of intruders or hackers to hack the data present in the server end or traverse between client and server end. The attacker obtains the data and modifies it according to their convenience without the knowledge of the data owner. These kinds of attacks are most dangerous, and the confidentiality of the data is totally disturbed due to such threats. This paper is intended to design a novel deep learning strategy called Modified Learning based Cloud Attack Detection (MLCAD), in which it adapts the features from the conventional security handling scheme called Intelligent Attack Identification Strategy (IAIS). This proposed MLCAD approach identifies the DDoS attacks over cloud environment by means of analyzing the authorization and authentication logics of the respective user, examining the Internet Protocol (IP) Address mentioned in the relevant request as well as the metadata acquired from the user end. These provisions have made the proposed approach MLCAD to act better to identify the DDoS attack in an efficient manner with full significance. The paper provides the proper graphical proofs to prove the integrity and performance of the proposed approach in a clear manner.","PeriodicalId":356949,"journal":{"name":"2022 6th International Conference on Electronics, Communication and Aerospace Technology","volume":"15 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"A Novel Cloud Security Enhancement Scheme to Defend against DDoS Attacks by using Deep Learning Strategy\",\"authors\":\"R. S. Prabhu, A. Prema, E. Perumal\",\"doi\":\"10.1109/ICECA55336.2022.10009177\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Cloud computing is a recent technology that allows users to create services on-demand. Cloud computing has achieved benefits as a result of its self-service capability as well as on demand services. This offers significant adaptability to its users, as they simply pay for the services they require, rather than worrying about the expense of equipment or software support. The major benefit of utilizing the cloud -based environment in organization is to enhance the data maintenance scheme in an easy way as well as improve the integrity of service to avoid manual flaws over maintenance. However, the remote cloud based data maintenance and evaluation leads certain security related threats, especially with Distributed Denial of Service (DDoS) Attacks. These attacks are caused by attempts of intruders or hackers to hack the data present in the server end or traverse between client and server end. The attacker obtains the data and modifies it according to their convenience without the knowledge of the data owner. These kinds of attacks are most dangerous, and the confidentiality of the data is totally disturbed due to such threats. This paper is intended to design a novel deep learning strategy called Modified Learning based Cloud Attack Detection (MLCAD), in which it adapts the features from the conventional security handling scheme called Intelligent Attack Identification Strategy (IAIS). This proposed MLCAD approach identifies the DDoS attacks over cloud environment by means of analyzing the authorization and authentication logics of the respective user, examining the Internet Protocol (IP) Address mentioned in the relevant request as well as the metadata acquired from the user end. These provisions have made the proposed approach MLCAD to act better to identify the DDoS attack in an efficient manner with full significance. The paper provides the proper graphical proofs to prove the integrity and performance of the proposed approach in a clear manner.\",\"PeriodicalId\":356949,\"journal\":{\"name\":\"2022 6th International Conference on Electronics, Communication and Aerospace Technology\",\"volume\":\"15 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2022-12-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2022 6th International Conference on Electronics, Communication and Aerospace Technology\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICECA55336.2022.10009177\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 6th International Conference on Electronics, Communication and Aerospace Technology","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICECA55336.2022.10009177","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
摘要
云计算是一种允许用户按需创建服务的新技术。云计算由于其自助服务能力和按需服务而获得了好处。这为用户提供了显著的适应性,因为他们只需为所需的服务付费,而不必担心设备或软件支持的费用。在组织中利用基于云的环境的主要好处是以一种简单的方式增强数据维护方案,并提高服务的完整性,以避免人工维护的缺陷。然而,基于云的远程数据维护和评估也带来了一些安全威胁,尤其是DDoS (Distributed Denial of Service)攻击。这些攻击是由入侵者或黑客试图破解服务器端中存在的数据或在客户端和服务器端之间遍历数据引起的。攻击者在数据所有者不知情的情况下获取数据并根据自己的方便进行修改。这种类型的攻击是最危险的,并且由于这种威胁,数据的机密性完全受到干扰。本文旨在设计一种新的深度学习策略,称为基于改进学习的云攻击检测(MLCAD),该策略适应了传统安全处理方案智能攻击识别策略(IAIS)的特征。本文提出的MLCAD方法通过分析用户的授权和认证逻辑、检查相关请求中提到的IP地址以及从用户端获取的元数据来识别云环境下的DDoS攻击。这些规定使得MLCAD所提出的方法能够更好地有效识别DDoS攻击,具有充分的意义。本文提供了适当的图形证明,以清晰的方式证明了所提出方法的完整性和性能。
A Novel Cloud Security Enhancement Scheme to Defend against DDoS Attacks by using Deep Learning Strategy
Cloud computing is a recent technology that allows users to create services on-demand. Cloud computing has achieved benefits as a result of its self-service capability as well as on demand services. This offers significant adaptability to its users, as they simply pay for the services they require, rather than worrying about the expense of equipment or software support. The major benefit of utilizing the cloud -based environment in organization is to enhance the data maintenance scheme in an easy way as well as improve the integrity of service to avoid manual flaws over maintenance. However, the remote cloud based data maintenance and evaluation leads certain security related threats, especially with Distributed Denial of Service (DDoS) Attacks. These attacks are caused by attempts of intruders or hackers to hack the data present in the server end or traverse between client and server end. The attacker obtains the data and modifies it according to their convenience without the knowledge of the data owner. These kinds of attacks are most dangerous, and the confidentiality of the data is totally disturbed due to such threats. This paper is intended to design a novel deep learning strategy called Modified Learning based Cloud Attack Detection (MLCAD), in which it adapts the features from the conventional security handling scheme called Intelligent Attack Identification Strategy (IAIS). This proposed MLCAD approach identifies the DDoS attacks over cloud environment by means of analyzing the authorization and authentication logics of the respective user, examining the Internet Protocol (IP) Address mentioned in the relevant request as well as the metadata acquired from the user end. These provisions have made the proposed approach MLCAD to act better to identify the DDoS attack in an efficient manner with full significance. The paper provides the proper graphical proofs to prove the integrity and performance of the proposed approach in a clear manner.