We apologize for a recent technical issue with our email system, which temporarily affected account activations. Accounts have now been activated. Authors may proceed with paper submissions. PhDFocusTM
CFP last date
20 November 2024
Call for Paper
December Edition
IJCA solicits high quality original research papers for the upcoming December edition of the journal. The last date of research paper submission is 20 November 2024

Submit your paper
Know more
Reseach Article

Entropy based Anomaly Detection System to Prevent DDoS Attacks in Cloud

by A. S. Syed Navaz, V. Sangeetha, C. Prabhadevi
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 62 - Number 15
Year of Publication: 2013
Authors: A. S. Syed Navaz, V. Sangeetha, C. Prabhadevi
10.5120/10160-5084

A. S. Syed Navaz, V. Sangeetha, C. Prabhadevi . Entropy based Anomaly Detection System to Prevent DDoS Attacks in Cloud. International Journal of Computer Applications. 62, 15 ( January 2013), 42-47. DOI=10.5120/10160-5084

@article{ 10.5120/10160-5084,
author = { A. S. Syed Navaz, V. Sangeetha, C. Prabhadevi },
title = { Entropy based Anomaly Detection System to Prevent DDoS Attacks in Cloud },
journal = { International Journal of Computer Applications },
issue_date = { January 2013 },
volume = { 62 },
number = { 15 },
month = { January },
year = { 2013 },
issn = { 0975-8887 },
pages = { 42-47 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume62/number15/10160-5084/ },
doi = { 10.5120/10160-5084 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T21:11:55.758981+05:30
%A A. S. Syed Navaz
%A V. Sangeetha
%A C. Prabhadevi
%T Entropy based Anomaly Detection System to Prevent DDoS Attacks in Cloud
%J International Journal of Computer Applications
%@ 0975-8887
%V 62
%N 15
%P 42-47
%D 2013
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Cloud Computing is a recent computing model; provides consistent access to wide area distributed resources. It revolutionized the IT world with its services provision infrastructure, less maintenance cost, data and service availability assurance, rapid accessibility and scalability. Grid and Cloud Computing Intrusion Detection System (GCCIDS) detects encrypted node communication and find the hidden attack trial which inspects and detects those attacks that network based and host based can't identify. It incorporates Knowledge and behavior analysis to identify specific intrusions. Signature based IDS monitor the packets in the network and identifies those threats by matching with database but It fails to detect those attacks that are not included in database. Signature based IDS will perform poor capturing in large volume of anomalies. Another problem is that Cloud Service Provider (CSP) hides the attack that is caused by intruder, due to distributed nature; cloud environment has high possibility for vulnerable resources. By impersonating legitimate users, the intruders can use a service's abundant resources maliciously. In Proposed System we combine few concepts which are available with new intrusion detection techniques. Here to merge Entropy based System with Anomaly detection System for providing multilevel Distributed Denial of Service (DDoS). This is done in two steps: First, Users are allowed to pass through router in network site in that it incorporates Detection Algorithm and detects for legitimate user. Second, again it pass through router placed in cloud site in that it incorporates confirmation Algorithm and checks for threshold value, if it's beyond the threshold value it considered as legitimate user, else it's an intruder found in environment. This System is represented and maintained by as third party. When attack happens in environment, it sends notification message for client and advisory report to Cloud Service Provider (CSP).

References
  1. Kleber Vieira, Alexandre Schulter, Carlos Becker Westphall, and Carla Merkle Westphall," Intrusion Detection for Grid and Cloud Computing "IEEE Computer Society, Vol 12, July/August 2010. PP 38-43.
  2. Irfan Gul, M. Hussain " Distributed Cloud Intrusion Detection Model", International Journal of Advanced Science and Technology Vol. 34, September, 2011, PP 71-82
  3. Sebastian Roschke, Feng Cheng, Christoph Meinel, "Intrusion Detection in cloud" Eighth IEEE International Conference on Dependable, Automatic and Secure Computing, PP 729 - 734
  4. Muhammad Zakarya & Ayaz Ali Khan "Cloud QoS, High Availability & Service Security Issues with Solutions", IJCSNS International Journal of Computer Science and Network Security, Vol. 12 , July 2012, PP 71 - 72
  5. Wuzuo WANG, Weidong WU, "Online Detection of Network Traffic Anomalies Using Degree Distributions" International Journal Communications, Network and System Sciences, Vol 3, 2010, PP 177 - 182
  6. Sumit kar, Bibhudatta sahoo, "An Anomaly Detection System For DDoS Attack In Grid Computing"vol 1,2009,PP 553-557
  7. Sumit Kar,"An Anomaly Detection Scheme for DDoS Attack in Grid computing" National Institute Of Technology Rourkela, 2009,PP 1 to 49
  8. Claudio Mazzariello, Roberto Bifulco , Roberto Canonico" Integrating a Network IDS into an Open Source Cloud Computing Environment"
  9. Anukool Lakhina, Mark Crovella, Christophe Diot,"Mining Anomalies Using Traffic Feature Distributions"ACM,2005
  10. G. Meera Gandhi, S. K. Srivatsa "An Entropy Architecture for defending Distributed denial-of-service attacks" International Journal of computer Science and Information Security, Vol 6, 2009, PP 129 – 136
  11. George Nychis, Vyas Sekar, David G Andersen, Hyong Kim, Hui Zhang "An Emprical Evaluation of entropy based Traffic Anomaly Detection" 10th International IFIP TC 6 Networking conference, 2011, PP 1 – 14
Index Terms

Computer Science
Information Sciences

Keywords

Cloud computing Grid Computing Intrusion detection