Call for Paper - March 2023 Edition
IJCA solicits original research papers for the March 2023 Edition. Last date of manuscript submission is February 20, 2023. Read More

Classifier System in Cloud Environment to Detect Denial of Service Attack

Print
PDF
International Journal of Computer Applications
© 2014 by IJCA Journal
Volume 85 - Number 14
Year of Publication: 2014
Authors:
Wafa' Slaibi Alsharafat
10.5120/14908-3455

Wafa' Slaibi Alsharafat. Article: Classifier System in Cloud Environment to Detect Denial of Service Attack. International Journal of Computer Applications 85(14):13-17, January 2014. Full text available. BibTeX

@article{key:article,
	author = {Wafa' Slaibi Alsharafat},
	title = {Article: Classifier System in Cloud Environment to Detect Denial of Service Attack},
	journal = {International Journal of Computer Applications},
	year = {2014},
	volume = {85},
	number = {14},
	pages = {13-17},
	month = {January},
	note = {Full text available}
}

Abstract

Cloud Computing is a modern style of computer services. This system has some of similarities with distributed systems, through using network environment features. Therefore the security is one of most critical issues in this type of environment. Because of vast number of users become connected to the network with times, the opportunity for malicious users or an attack to perform damage actions becomes very great and profitable. One of the major security challenges in cloud environment is the detection of any attempts of intrusions and attacks. In order to detect these malicious activities especially Denial of Service (DoS) attack, this paper will propose Learning Classifier System for Intrusion Detection System (LCS-IDS) to detect DoS in cloud environment attacks by taking advantage of learning from attacks themselves and simulate possible DoS attacks through Genetic Algorithm, generator, to rise detection rate compared with other systems in this field.

References

  • Shaikh, R. , Sasikumar, M. 2012. Security Issues in Cloud Computing: A survey. International Journal of Computer Applications (0975 – 8887) Volume 44– No19. April 2012.
  • Heady,R. , George, L. , Maccabe, A. , and Servilla, M. 1990. The Architecture of a Network Level Intrusion Detection System, Technical report, University of New Mexico.
  • Bouzida Y. , Cuppens F. , Gombault S. 2006. Detecting and Reacting against Distributed Denial of Service Attacks. IEEE International Conference on Communication. Volume 5.
  • Meiko Jensen, Jorg Schwenk, Nils Gruschka, Luigi Lo Iacon. 2009. On technical Security Issues in Cloud Computing. Proc. of IEEE International Conference on Cloud Computing (CLOUD-II, 2009), pp. 109-116, India, 2009.
  • Olive, Ch. 2011. Cloud Computing Characteristics Are Key. © General Physics Corporation 2011.
  • Ram,S. , Velmurugan,Thirukumaran. 2012. Effective Analysis of Cloud Based Intrusion Detection System. International Journal of Computer Applications & Information Technology Vol. I, Issue II, September, 2012 (ISSN: 2278- 7720).
  • Dhage, S. N. , et al. 2011. Intrusion Detection System in Cloud Computing Environment. In International Conference and Workshop on Emerging Trends in Technology (ICWET 2011) ' TCET, Mumbai. India, pp. 235-239, 2011.
  • Chi-Chun Lo, Chun-Chieh Huang,Joy Ku. 2010. A Cooperative Intrusion Detection System Framework for Cloud Computing Networks. 39th International Conference on Parallel Processing Workshops,2010,pp280-284.
  • Singh, N. , S. Ghrera, and P. 2010 . Chaudhuri, Denial of Service Attack: Analysis of Network Traffic Anormaly using Queuing Theory. Arxiv preprint arXiv:1006. 2807, 2010.
  • Yeung, D. S. , S. Jin, and X. Wang. 2007. Covariance-matrix modeling and detecting various flooding attacks. Systems, Man and Cybernetics, Part A: Systems and Humans, IEEE Transactions on, 2007. 37(2): p. 157-169.
  • Lo, C. C. , C. C. Huang, and J. Ku. 2010. A cooperative intrusion detection system framework for cloud computing Networks. 2010: IEEE.
  • Holland, J. H. 1975. Adaptation in Natural and Artificial Systems: An Introductory Analysis with Applications to Biology, Control, and Artificial Intelligence. University of Michigan Press, Ann Arbor, MI.
  • Lanzi, P. -L. 2002. Learning Classifier Systems from a Reinforcement Learning Perspective. Journal of Soft Computing, 6(3-4):162–170.
  • Goldberg D. E. 1989. Genetic Algorithms: in search Optimization and Machine Learning, Adison Wesley, 1989.
  • Forrest, S. & Miller, J. 1991. Emergent Behavior in Classifier Systems. Physica D 42: 213-217.
  • KDD-CUP 1999 Data, http://kdd. ics. uci. edu/databases/kddcup99/kddcup99 . html.
  • Alsharafat. W. 2010. Applying Artificial Neural Network and eXtended Classifier System for Network Intrusion Detection (ANNXCS-NID). The International Arab journal of Information Technology. Volume 10 No. 3.
  • Alrashdan. W. Naoum. R. , ALsharafat. W. , Alkhazaaleh. M. 2010. An Integrated Model of Intrusion Detection Based on Hybrid Neural Network and Support Vector Machine. International Journal of Computer Science and Network Security. Vol. 10 No. 11 pp. 10-13