Font Size: a A A

Detecting Specific Types of DDoS Attacks in Cloud Environment by Using Anomaly Detection

Posted on:2016-04-15Degree:M.A.ScType:Thesis
University:Ecole Polytechnique, Montreal (Canada)Candidate:Abbasi, HosseinFull Text:PDF
GTID:2478390017482903Subject:Computer Engineering
Abstract/Summary:
One of the most important benefits of using cloud computing is to have on-demand services; accordingly the method of payment in cloud environment is pay per use. This feature results in a new kind of DDOS attack called Economic Denial of Sustainability (EDoS) in which the customer pays extra to the cloud provider because of the attack. DDoS attacks and a new version of these attacks which called EDoS attack are divided into three different categories: 1) Bandwidth--consuming attacks, 2) Attacks which target specific applications and 3) Connection--layer exhaustion attacks. In this work we proposed a novel and inclusive model to precisely detect different types of DDoS and EDoS attacks by comparing the traffic and resource usage in normal and attack situations. Features which are related to traffic and resource usage in each attack were collected as the metrics of our detection model. In designing our model, we used the metrics related to all 3 types of attacks since features of one kind of attack play an important role to detect another type. Moreover, to find a change point in resource usage and traffic behavior we used CUSUM algorithm. The accuracy of our algorithm was then investigated by comparing its performance with one of the popular previous works. Achieving a higher rate of correct detection in our model proved the high accuracy of the designed algorithm.
Keywords/Search Tags:Attacks, DDOS, Cloud, Types, Model
Related items