دانلود مقاله حمله DDOS در محیط رایانش ابری مجازی
ترجمه نشده

دانلود مقاله حمله DDOS در محیط رایانش ابری مجازی

عنوان فارسی مقاله: پیشگیری و تشخیص حمله DDOS در محیط رایانش ابری مجازی با استفاده از الگوریتم بیز ساده یادگیری ماشینی
عنوان انگلیسی مقاله: Prevention and detection of DDOS attack in virtual cloud computing environment using Naive Bayes algorithm of machine learning
مجله/کنفرانس: Measurement: Sensors - سنجش: حسگرها
رشته های تحصیلی مرتبط: کامپیوتر - فناوری اطلاعات
گرایش های تحصیلی مرتبط: رایانش ابری - امنیت اطلاعات - هوش مصنوعی - شبکه های کامپیوتری
کلمات کلیدی فارسی: یادگیری ماشین، حمله سایبری، محیط رایانش ابری مجازی، رایانش ابری، بیزی ساده
کلمات کلیدی انگلیسی: Machine learning, Cyber attack, Virtual cloud computing environment, Cloud computing, Navie bayes
نوع نگارش مقاله: مقاله پژوهشی (Research Article)
نمایه: Scopus - DOAJ
شناسه دیجیتال (DOI): https://doi.org/10.1016/j.measen.2023.100991
لینک سایت مرجع: https://www.sciencedirect.com/science/article/pii/S2665917423003276
نویسندگان: Yongqiang Shang
دانشگاه: Xinyang Agriculture and Forestry University, China
صفحات مقاله انگلیسی: 9
ناشر: الزویر - Elsevier
نوع ارائه مقاله: ژورنال
نوع مقاله: ISI
سال انتشار مقاله: 2024
ایمپکت فاکتور: 1.083 در سال 2022
شاخص H_index: 8 در سال 2024
شاخص SJR: 0.215 در سال 2022
شناسه ISSN: 2665-9174
شاخص Quartile (چارک): Q3 در سال 2022
فرمت مقاله انگلیسی: PDF
وضعیت ترجمه: ترجمه نشده است
قیمت مقاله انگلیسی: رایگان
آیا این مقاله بیس است: خیر
آیا این مقاله مدل مفهومی دارد: ندارد
آیا این مقاله پرسشنامه دارد: ندارد
آیا این مقاله متغیر دارد: ندارد
آیا این مقاله فرضیه دارد: ندارد
کد محصول: e17681
رفرنس: دارای رفرنس در داخل متن و انتهای مقاله
فهرست مطالب (ترجمه)

خلاصه
1. معرفی
2. آثار مرتبط
3. مواد و روش ها
4. روش پیشنهادی
5. آزمایش و نتایج
6. نتیجه گیری
اعلامیه منافع رقابتی
تصدیق
در دسترس بودن داده ها
منابع

فهرست مطالب (انگلیسی)

Abstract
1. Introduction
2. Related works
3. Materials and methods
4. Proposed method
5. Experimentation & results
6. Conclusion
Declaration of competing interest
Acknowledgement
Data availability
References

بخشی از مقاله (ترجمه ماشینی)

چکیده
محبوبیت رایانش ابری، با مقیاس پذیری و دسترسی باورنکردنی آن، پیش از این از عصر جدیدی از نوآوری استقبال کرده است. مصرف‌کنندگانی که مشترک یک سرویس مبتنی بر ابر هستند و از ویژگی‌های پرداختی مرتبط استفاده می‌کنند، دسترسی نامحدودی به برنامه‌ها و فناوری‌های ذکر شده در بالا دارند. این مفهوم علاوه بر کاهش قیمت ها، قابلیت اطمینان و دسترسی به عرضه ها را نیز افزایش داد. یکی از مهم‌ترین جنبه‌های فناوری ابری، مشاهده خدمات شخصی به‌صورت درخواستی است که یکی از مهم‌ترین مزایای آن نیز می‌باشد. برنامه‌هایی که مبتنی بر ابر هستند، در صورت تقاضا از هر کجای دنیا با هزینه کمتر در دسترس هستند. اگرچه محاسبات ابری با نگرانی‌های ایمنی باعث دردسر کاربران خود می‌شود، اما به دلیل خدمات آنی فوق‌العاده‌اش می‌تواند پیشرفت کند. تخلفات مختلفی وجود دارد، اما همه آنها چیزی مشابه را انجام می دهند و سیستم ها را آفلاین می کنند. حملات انکار سرویس توزیع شده یکی از مضرترین اشکال حمله آنلاین هستند. برای تشخیص سریع و دقیق حملات DDoS (Distributed Denial of Service, Distributed Denial of Service). این تحقیق با معرفی حمله DDOS و روشی برای دفاع در برابر آن، سیستم را در برابر چنین حملاتی مقاوم‌تر کرد. در این سناریو، میزبان‌های متعددی برای انجام یک حمله انکار سرویس توزیع شده علیه صفحات وب مبتنی بر ابر استفاده می‌شوند و احتمالاً میلیون‌ها یا حتی تریلیون‌ها بسته ارسال می‌کنند. از سیستم عاملی مانند ParrotSec استفاده می کند تا راه را برای حمله هموار کند و آن را ممکن کند. در مرحله آخر از موثرترین الگوریتم ها مانند Naive Bayes و Random Forest برای تشخیص و کاهش استفاده می شود. موضوع مهم دیگر مطالعه حملات سایبری زیادی بود که می‌توان علیه رایانش ابری انجام داد.

بخشی از مقاله (انگلیسی)

Abstract

The popularity of cloud computing, with its incredible scalability and accessibility, has already welcomed a new era of innovation. Consumers who subscribe to a cloud-based service and use the associated pay-as-you-go features have unlimited access to the applications mentioned above and technologies. In addition to lowering prices, this notion also increased the reliability and accessibility of the offerings. One of the most crucial aspects of cloud technology is the on-demand viewing of personal services, which is also one of its most significant advantages. Apps that are cloud-based are available on demand from anywhere in the world at a reduced cost. Although it causes its users pain with safety concerns, cloud computing can thrive because of its fantastic instantaneous services. There are various violations, but they all accomplish something similar, taking the systems offline. Distributed denial of service attacks are among the most harmful forms of online assault. For fast and accurate DDoS (Distributed Denial of Service, distributed denial of service) attack detection. This research introduced the DDOS attack and a method to defend against it, making the system more resistant to such attacks. In this scenario, numerous hosts are used to carrying out a distributed denial of service assault against cloud-based web pages, sending possibly millions or even trillions of packets. It uses an OS like ParrotSec to pave the way for the attack and make it possible. In the last phase, the most effective algorithms, such as Naive Bayes and Random Forest, are used for detection and mitigation. Another major topic was studying the many cyber attacks that can be launched against cloud computing.

 

Introduction

DDos attack is a distributed type of attack mode in which an attacker controls a large number of attack machines and sends out DoS attack instructions to the machine. In the latest Internet security report, DDoS attacks remain one of the major cybersecurity threats. The inexpensive pricing and "pay-as-you-go" focused accessibility to computational features and amenities on demand make cloud-based services a formidable competitor to the conventional IT solutions available in prior eras. The use of cloud computing is gaining popularity rapidly. Whether entirely or largely governments and companies have moved their IT infrastructures onto the cloud. Cloud-based Infrastructure offers various advantages compared to traditional, on-site conventional infrastructures. The removal of expenses associated with operation and impairment, as well as the accessibility of materials on request, are only a few of the advantages. However, there are many concerns that cloud consumers have, and the research addresses these issues. The majority of these inquiries centre on safeguarding operational concepts and information. Many security-related attacks can be prevented in conventional IT systems that do not use cloud computing. Focused cloud-based crimes are already using their innovations. Many security vulnerabilities in cloud computing are unique compared to their predecessors in non-cloud computing environments because data and business logic are stored on an external cloud server that lacks accessible oversight. The denial-of-service (DoS) assault is one technique that has been in the spotlight recently. Denial-of-service incidents are directed at the server rather than the people it supports. DoS attackers attempt to flood live servers by masquerading genuine users to overload the service's capacity to handle incoming inquiries [1]. Cloud computing is an Internet-based service that enables users to access configurable computing resource sharing pools (including server, storage, application software, services, networks, etc.) to achieve online access to computing resources on demand. As a mixture of emerging technologies and business models, cloud computing has developed rapidly in recent years due to its advantages of super-large scale, virtualization, high reliability, good scalability and on-demand services. To overcome this issue, multiple inquiries are sent to the server simultaneously. The term "distributed denial of service," or DDoS, refers to a variation on the classic "denial of service" that uses numerous computers to attack and impair one service at a time simultaneously. 

 

Conclusion

The key goals of this study are to learn how to recognize and prevent attacks involving distributed denial-of-service. The first and most crucial step is determining which ports can be exploited. Nevertheless, this approach is not risk-free because susceptible ports are more likely to be exploited. Given ParrotSec's track record for stability and performance, we decided it would be the ideal choice for our company's computer system. Since a DDoS attack involves sending one million separate packets toward the target, starting with an on-the-internet website would be best. The targeted website was taken offline after it became clear that an assault had happened. Machine learning is constructive in this detecting process as well. Using this data, the most popular and accessible tool, "weka," is being trained. Employing pre-processing techniques and the "discretize" filter to achieve the desired effect. Therefore, the following phase is not only quite intriguing but also rather useful for both forecasting and detecting. We employed both methods and compared the findings on the same platform, and we found that the naive Bayes method provides the most trustworthy conclusions. PCA selected 21 features from the possible 42 features, while LVQ selected only 20 features. The results suggest that LVQ based feature selection in the DT model may be more accurate than other methods in identifying attacks. As mentioned earlier, the model also outperformed the previous models in terms of accuracy, recall, specificity, and f-score. It was shown that the naive Bayes model had significantly better predictive power than the random forest model. There is a chance that a false positive rate warning will be triggered for packet transmissions within a network. Moreover, when compared to the random forest, naive Bayes produces considerably more accurate forecasts. It was demonstrated that the Naive Bayes algorithm outperformed the random forest technique to identify the false and actual rate of transmissions. The result detection is not carried out in real time. Although attacks can be detected, real-time alarm cannot be realized in the environment of high cluster security, so the feasibility of real-time monitoring under Hadoop platform should be studied continuously.

بدون دیدگاه