Abstract

Cloud computing is now known as the most cost-effective platform for delivering big data and artificial intelligence services over the Internet to enterprises and cloud consumers. However, despite many recent security developments, many cloud consumers continue to express great concern about using these platforms because they still have significant vulnerabilities. Typically, Economic Denial of Sustainability (EDoS) attacks exploit the pay-as-you-go billing mechanisms used by cloud service providers, so that a cloud customer is forced to pay an extra fee for the additional resources triggered by the attack activities. In our previous work, we already proposed an system to mitigate such EDoS attacks. Overall, this previous work presented an effective system for detecting abnormal events; however, the false-alarm rates still remain relatively high and detection rates are low, because abnormal events could be caused by the cloud customer. Furthermore, our previous work still consumes a large number of computing resources. Therefore, in this paper, we propose an enhanced scheme to detect and mitigate EDoS attacks efficiently and reliably. Our proposed scheme is composed of online and offline phases, implementing a gated recurrent unit, which not only can capture complex temporal dependence relations in the data, but also can reduce the vanishing gradient problems in time series. First, to reflect the normal patterns, our proposed scheme learns accurate representations of multivariate time series. Next, these representations are used to reconstruct input data. Finally, the reconstruction probabilities not only can be used to find anomalies, but also can provide interpretations. The proposed scheme also introduces a self-adjusting threshold to reduce error rates, whereas existing solutions normally use a hard threshold to analyze the anomalies, which causes increasing error rates. Our comprehensive analysis of the results shows outstanding performance compared to other solutions and our previous work.

Highlights

  • In Cloud Computing, two technologies known as software defined networking (SDN) [1] and network functions virtualization (NFV) [2] are quickly becoming core technologies

  • R-Economic Denial of Sustainability (EDoS) MAIN MODULES AND SYSTEM WORKFLOW Our EDoS defense scheme is placed in the SDN controller, including five main modules, as presented in Figure 7, which are a raw data processing scheme consisting of five submodules, an offline training model, an online detection, a dynamic threshold module, and an attack handler

  • GENERAL DISCUSSION Based on our comprehensive result analyses given above, we summarize some outstanding points that demonstrate the effectiveness of R-EDoS in detecting real EDoS attacks conducted in our practical testbed:

Read more

Summary

INTRODUCTION

In Cloud Computing, two technologies known as software defined networking (SDN) [1] and network functions virtualization (NFV) [2] are quickly becoming core technologies. Park: R-EDoS: Robust Economic Denial of Sustainability Detection in an SDN-Based Cloud Through Stochastic RNN network systems. Exploiting a pay-as-you-go pricing engine on the cloud can force users to pay more for their resource usage This is commonly known as an EDoS attack, and is one of the most difficult cloud security challenges. Existing solutions addressing EDoS attacks are mainly hard-threshold-based solutions with high falsealarm rates [6] Their solutions work well only for a certain distribution of attack traffic, i.e. a Poisson distribution. We propose an efficient scheme called REDoS which applies the proposed approach to detect anomalous network data generated by EDoS attacks. RELATED WORK Recently, EDoS has constantly attracted the attention of researchers for preventing the EDoS attacks from manipulating the auto-scaling engine of the cloud providers. From the above analyses and recommendations on defense inspired by two in-depth studies on EDoS characteristics proposed recently ( [4] and [47]), we propose a novel effective solution to deal with EDoS attacks

BACKGROUND
R-EDoS
EXPERIMENTAL SETUP
RESULT
ANOMALY DETECTION PERFORMANCE
Findings
CONCLUSION AND FUTURE WORK
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call