Skip to main content

DDoS Attacks Detection in Cloud Computing Using ANN and Imperialistic Competitive Algorithm

  • Conference paper
  • First Online:
Artificial Intelligence and Sustainable Computing

Part of the book series: Algorithms for Intelligent Systems ((AIS))

Abstract

Cloud computing provides various services, like computation power, storage, platforms for developing applications, and software over the Internet. These services must be accessible to all its users all the time throughout the globe. Distributed denial of service (DDoS) attacks can be used by the attackers to disrupt the accessibility of these services. In these types of attacks, several systems are used to consume network or server resources that eventually results in inaccessibility of cloud services. In this paper, we propose a technique for detecting DDoS attacks using an artificial neural network (ANN) model. The model is trained using the imperialistic competitive algorithm. NSL KDD dataset is used to evaluate the performance of the proposed technique. Our proposed technique gives detection accuracy of 83.5% and 65% with KDDTest+ and KDDTest-21 datasets, respectively. Performance comparison with some other machine learning-based techniques and state-of-the-art techniques is also presented.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 219.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Mell P, Grance, T (2011) The NIST definition of cloud computing

    Google Scholar 

  2. Lau F, Rubin SH, Smith MH, Trajkovic L (2000) Distributed denial of service attacks. IEEE international conference on systems, man and cybernetics. ‘cybernetics evolving to systems, humans, organizations, and their complex interactions’, vol 3, pp 2275–2280. (cat. no. 0) (2000, October)

    Google Scholar 

  3. Atashpaz-Gargari E, Lucas C (2007) Imperialist competitive algorithm: an algorithm for optimization inspired by imperialistic competition. In: 2007 IEEE congress on evolutionary computation, pp 4661–4667. (2007, September)

    Google Scholar 

  4. Fathy A, Rezk H (2017) Parameter estimation of photovoltaic system using imperialist competitive algorithm. Renew Energy 111:307–320

    Article  Google Scholar 

  5. Tien Bui D, Shahabi H, Shirzadi A, Chapi K, Hoang ND, Pham BT, Saro L (2018) A novel integrated approach of relevance vector machine optimized by imperialist competitive algorithm for spatial modeling of shallow landslides. Remote Sen 10(10), 1538

    Google Scholar 

  6. Aliniya Z, Mirroshandel SA (2019) A novel combinatorial merge-split approach for automatic clustering using imperialist competitive algorithm. Expert Syst Appl 117:243–266

    Article  Google Scholar 

  7. Fang Q, Nguyen H, Bui XN, Nguyen-Thoi T (2020) Prediction of blast-induced ground vibration in open-pit mines using a new technique based on imperialist competitive algorithm and M5Rules. Nat Resour Res 29(2):791–806

    Article  Google Scholar 

  8. Kushwah GS, Ranga V (2019) Distributed denial of service attacks and defense in cloud computing. In: Handbook of research on the IoT, cloud computing, and wireless network optimization. IGI Global, pp 41–59

    Google Scholar 

  9. Potluri S, Mangla M, Satpathy S, Mohanty SN (2020) Detection and prevention mechanisms for DDoS attack in cloud computing environment. In: 2020 11th international conference on computing, communication and networking technologies (ICCCNT), pp 1–6. (2020, July)

    Google Scholar 

  10. Singh R, Kumar H, Singla RK (2015) An intrusion detection system using network traffic profiling and online sequential extreme learning machine. Expert Syst Appl 42(22):8609–8624

    Article  Google Scholar 

  11. Pandeeswari N, Kumar G (2016) Anomaly detection system in cloud environment using fuzzy clustering based ANN. Mobile Netw Appl 21(3):494–505

    Article  Google Scholar 

  12. Kushwah GS, Ali ST (2017) Detecting DDoS attacks in cloud computing using ANN and black hole optimization. In: IEEE 2nd international conference on telecommunication and networks (TEL-NET), pp 1–5. (2017, August)

    Google Scholar 

  13. Yin C, Zhu Y, Fei J, He X (2017) A deep learning approach for intrusion detection using recurrent neural networks. Ieee Access 5:21954–21961

    Article  Google Scholar 

  14. Pajouh HH, Dastghaibyfard G, Hashemi S (2017) Two-tier network anomaly detection model: a machine learning approach. J Intell Inf Syst 48(1):61–74

    Article  Google Scholar 

  15. Imamverdiyev Y, Abdullayeva F (2018) Deep learning method for denial of service attack detection based on restricted boltzmann machine. Big Data 6(2):159–169

    Article  Google Scholar 

  16. Wu K, Chen Z, Li W (2018) A novel intrusion detection model for a massive network using convolutional neural networks. IEEE Access 6:50850–50859

    Article  Google Scholar 

  17. Kushwah GS, Ali ST (2019) Distributed denial of service attacks detection in cloud computing using extreme learning machine. Intern J Commun Netw Distrib Syst 23(3):328–351

    Google Scholar 

  18. Kushwah GS, Ranga V (2020) Voting extreme learning machine based distributed denial of service attack detection in cloud computing. J Inf Secur Appl 53

    Google Scholar 

  19. Hosseini S, Zade BMH (2020) New hybrid method for attack detection using combination of evolutionary algorithms, SVM, and ANN. Comput Netw 107168

    Google Scholar 

  20. Tavallaee M, Bagheri E, Lu W, Ghorbani AA (2009) A detailed analysis of the KDD CUP 99 data set. In 2009 IEEE symposium on computational intelligence for security and defense applications, pp 1–6. (2009, July)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2022 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Kushwah, G.S., Ranga, V. (2022). DDoS Attacks Detection in Cloud Computing Using ANN and Imperialistic Competitive Algorithm. In: Dubey, H.M., Pandit, M., Srivastava, L., Panigrahi, B.K. (eds) Artificial Intelligence and Sustainable Computing. Algorithms for Intelligent Systems. Springer, Singapore. https://doi.org/10.1007/978-981-16-1220-6_22

Download citation

Publish with us

Policies and ethics