12
views
0
recommends
+1 Recommend
0 collections
    0
    shares
      • Record: found
      • Abstract: found
      • Article: found
      Is Open Access

      Flow Correlation Degree Optimization Driven Random Forest for Detecting DDoS Attacks in Cloud Computing

      1 , 2 , 3 , 1 , 2 , 1 , 2 , 4 , 1 , 2 , 1 , 2
      Security and Communication Networks
      Hindawi Limited

      Read this article at

      Bookmark
          There is no author summary for this article yet. Authors can add summaries to their articles on ScienceOpen to make them more accessible to a non-specialist audience.

          Abstract

          Distributed denial-of-service (DDoS) has caused major damage to cloud computing, and the false- and missing-alarm rates of existing DDoS attack-detection methods are relatively high in cloud environment. In this paper, we propose a DDoS attack-detection method with enhanced random forest (RF) optimized by genetic algorithm based on flow correlation degree (FCD) feature. We define the FCD feature according to the asymmetric and semidirectivity interaction characteristics and use the two-tuples FCD feature consisting of packet-statistical degree (PSD) and semidirectivity interaction abnormality (SDIA) to describe the features of attack flow and normal flow. Then we use a genetic algorithm based on the FCD feature sequences to optimize two key parameters of the decision tree in the RF: the maximum number of decision trees and the maximum depth of every single decision tree. We apply the trained RF model with optimized parameters to generate the classifier to be used for DDoS attack-detection. The experiment shows that the proposed method can effectively detect DDoS attacks in cloud environment with a higher accuracy rate and lower false- and missing-alarm rates compared to existing DDoS attack-detection methods.

          Related collections

          Most cited references29

          • Record: found
          • Abstract: not found
          • Article: not found

          Cloud-aided lightweight certificateless authentication protocol with anonymity for wireless body area networks

            Bookmark
            • Record: found
            • Abstract: not found
            • Article: not found

            Multi-key privacy-preserving deep learning in cloud computing

              Bookmark
              • Record: found
              • Abstract: not found
              • Article: not found

              A Distributed Locality-Sensitive Hashing-Based Approach for Cloud Service Recommendation From Multi-Source Data

                Bookmark

                Author and article information

                Journal
                Security and Communication Networks
                Security and Communication Networks
                Hindawi Limited
                1939-0114
                1939-0122
                November 19 2018
                November 19 2018
                : 2018
                : 1-14
                Affiliations
                [1 ]Key Laboratory of Internet Information Retrieval of Hainan Province, Hainan University, Haikou 570228, China
                [2 ]College of Information Science and Technology, Hainan University, Haikou 570228, China
                [3 ]State Key Laboratory of Marine Resource Utilization in South China Sea, Haikou 570228, China
                [4 ]Department of Computer Science, University of Central Arkansas, Conway, AR 72035, USA
                Article
                10.1155/2018/6459326
                9952e5fc-bcd4-41b0-8aed-f5342bab9303
                © 2018

                http://creativecommons.org/licenses/by/4.0/

                History

                Comments

                Comment on this article