Document Type : Reseach Article

Authors

1 VIT-AP UNIVERSITY Inavolu, Beside AP Secretariat, Amaravati AP, India

2 VIT-AP University, Inavolu, Beside AP Secretariat, Amaravati AP, India

Abstract

The advent of cloud computing has made it simpler for users to gain access to data regardless of their physical location. It works for as long as they have access to the internet through an approach where the users pay based on how they use these resources in a model referred to as “pay-as-per-usage”. Despite all these advantages, cloud computing has its shortcomings. The biggest concern today is the security risks associated with the cloud. One of the biggest problems that might arise with cloud services availability is Distributed Denial of Service attacks (DDoS). DDoS attacks work by multiple machines attacking the user by sending packets with large data overhead. Therefore, the network is overwhelmed with unwanted traffic. This paper proposes an intrusion detection framework using Ensemble feature selection with RNN (ERNN) to tackle the problem at hand. It combines an Ensemble of multiple Machine Learning (ML) algorithms with a Recurrent Neural Network (RNN).  The framework aims to address the issue by selecting the most relevant features using the ensemble of six ML algorithms. These selected features are then used to classify the network traffic as either normal or attack, employing RNN. The effectiveness of the proposed model is evaluated using the CICDDoS2019 dataset, which contains new types of attacks. To assess the performance of the model, metrics like precision, accuracy, F-1 score, and recall are taken into consideration.

Keywords

  • [1] Alduailij, Q. W. Khan, M. Tahir, M. Sardaraz, M. Alduailij, and F. Malik, “Machine-Learning-Based DDoS Attack Detection Using Mutual Information and Random Forest Feature Importance Method,” Symmetry 2022, vol. 14, no. 6, pp. 1095, May 2022, doi: 10.3390/SYM14061095.
  • [2] Subramanian and A. Jeyaraj, “Recent security challenges in cloud computing,” Comput. Electr. Eng., vol. 71, pp. 28–42, Oct. 2018, doi: 10.1016/J.COMPELECENG.2018.06.006.
  • [3] Gurav and R. Shaikh, “Virtualization: A key feature of cloud computing,” ICWET 2010 - Int. Conf. Work. Emerg. Trends Technol. 2010, Conf. Proc., no. July 2020, pp. 227–229, 2010, doi: 10.1145/1741906.1741957.
  • [4] Mishra, S. K. Sharma, and M. A. Alowaidi, “Analysis of security issues of cloud-based web applications,” J. Ambient Intell. Humaniz. Comput., no. 0123456789, 2020, doi: 10.1007/s12652-020-02370-8.
  • [5] A. Khan, “A survey of security issues for cloud computing,” J. Netw. Comput. Appl., vol. 71, pp. 11–29, 2016, doi: 10.1016/j.jnca.2016.05.010.
  • [6] Karthikeyan and G. Usha, “Real-time DDoS flooding attack detection in intelligent transportation systems,” Comput. Electr. Eng., vol. 101, p. 107995, Jul. 2022, doi: 10.1016/J.COMPELECENG.2022.107995.
  • [7] Prabadevi and N. Jeyanthi, “Distributed denial of service attacks and its effects on cloud environment- A survey,” 2014 Int. Symp. Networks, Comput. Commun. ISNCC 2014, 2014, doi: 10.1109/SNCC.2014.6866508.
  • [8] Mittal, K. Kumar, and S. Behal, “deep learning approaches for detecting DDoS attacks: a systematic review,” Soft Comput., pp. 1–37, Jan. 2022, doi: 10.1007/S00500-021-06608
  • [9] Mallampati, S. B., & Seetha, H, “A Review on Recent Approaches of Machine Learning, Deep Learning, and Explainable Artificial Intelligence in Intrusion Detection Systems,” Majlesi Journal of Electrical Engineering, vol. 17, no. 1, pp. 29-54, 2023.
  • [10] Ahmad, A. S. Khan, C. W. Shiang, J. Abdullah, and F. Ahmad, “Network intrusion detection system: A systematic study of machine learning and deep learning approaches,” Trans Emerg. Tel Tech, vol. 32, 2021, doi: 10.1002/ett.4150.
  • [11] Alghazzawi, O. Bamasaq, H. Ullah, and M. Z. Asghar, “Efficient Detection of DDoS Attacks Using a Hybrid deep learning Model with Improved Feature Selection,” Appl. Sci. 2021, Vol. 11, Page 11634, vol. 11, no. 24, p. 11634, Dec. 2021, doi: 10.3390/APP112411634, 2021.
  • [12] Dehkordi, A. B., Soltanaghaei, M., & Boroujeni, F. Z, “A Hybrid Mechanism to Detect DDoS Attacks in Software Defined Networks,” Majlesi Journal of Electrical Engineering, vol. 15, no. 1, 2021.
  • [13] Jaw, E., & Wang, X, “Feature selection and ensemble-based intrusion detection system: an efficient and comprehensive approach,” Symmetry, vol. 13, no. 10, pp. 1764, 2021.
  • [14] Mahdi, M. M., Mohammed, M. A., Al-Chalibi, H., Bashar, B. S., Sadeq, H. A., & Abbas, T. M. J, “An Ensemble Learning Approach for Glaucoma Detection in Retinal Image,” Majlesi Journal of Electrical Engineering, vol. 16, no. 4, pp. 117-122, 2022.
  • [15] Bahmani, A., & Monajemi, A, “Introducing a Two-step Strategy Based on Deep Learning to Enhance the Accuracy of Intrusion Detection Systems in the Network,” Majlesi Journal of Telecommunication Devices, vol. 8, no. 1, pp. 21-25, 2019.
  • [16] Filonov, P., Kitashov, F., & Lavrentyev, A,”Rnn-based early cyber-attack detection for the tennessee eastman process,” arXiv preprint arXiv:1709.02232, 2017.
  • [17] Aamir, S.M.A. Zaidi, “DDoS attack detection with feature engineering and machine learning: the framework and performance evaluation,” Int. J. Inf. Secur, vol. 18, pp. 761–785, https://doi.org/10.1007/s10207-019-00434-1, 2019
  • [18] Doriguzzi-Corin, S. Millar, S. Scott-Hayward, J. Martínez-del-Rincón and D. Siracusa, "Lucid: A Practical, Lightweight Deep Learning Solution for DDoS Attack Detection," in IEEE Transactions on Network and Service Management, vol. 17, no. 2, pp. 876-889, June 2020, doi: 10.1109/TNSM.2020.2971776.
  • [19] Moubayed, A., Aqeeli, E., & Shami, A, “Ensemble-based feature selection and classification model for DNS typo-squatting detection,” In 2020 IEEE Canadian Conference on Electrical and Computer Engineering (CCECE) (pp. 1-6). IEEE.
  • [20] Agarwal, A., Khari, M., & Singh, R, “Detection of DDOS attack using deep learning model in cloud storage application,” Wireless Personal Communications, pp. 1-21, 2021.
  • [21] Alghazzawi, D., Bamasag, O., Ullah, H., & Asghar, M. Z, “Efficient detection of DDoS attacks using a hybrid deep learning model with improved feature selection,” Applied Sciences, vo. 11, no. 24, pp. 11634, 2021
  • [22] Abbas, A., Khan, M. A., Latif, S., Ajaz, M., Shah, A. A., & Ahmad, J, “A new ensemble-based intrusion detection system for internet of things,” Arabian Journal for Science and Engineering, pp. 1-15, 2021.
  • [23] Krishnaveni, S., Sivamohan, S., Sridhar, S. S., & Prabakaran, S, “Efficient feature selection and classification through ensemble method for network intrusion detection on cloud computing,” Cluster Computing, vol. 24, no. 3, pp. 1761-1779, 2021.
  • [24] Saha, S., Priyoti, A. T., Sharma, A., & Haque, A, “Towards an Optimized Ensemble Feature Selection for DDoS Detection Using Both Supervised and Unsupervised Method,” Sensors, 22(23), 9144, 2022.
  • [25] Priyadarshini, R., & Barik, R. K, “A deep learning based intelligent framework to mitigate DDoS attack in fog environment,” Journal of King Saud University-Computer and Information Sciences, 34(3), 825-831, 2022.
  • [26] Jiang, J., Liu, F., Ng, W. W., Tang, Q., Zhong, G., Tang, X., & Wang, B, “AERF: Adaptive ensemble random fuzzy algorithm for anomaly detection in cloud computing,” Computer Communications, 2023.
  • [27] Bouke, M. A., Abdullah, A., ALshatebi, S. H., Abdullah, M. T., & El Atigh, H, “An intelligent DDoS attack detection tree-based model using Gini index feature selection method,” Microprocessors and Microsystems, vol. 98, pp. 104823, 2023
  • [28] Abosuliman, S. S, “Deep learning techniques for securing cyber-physical systems in supply chain 4.0,” Computers and Electrical Engineering, vol. 107, pp. 108637, 2023.
  • [29] Balamurugan, V., & Saravanan, R, “Enhanced intrusion detection and prevention system on cloud environment using hybrid classification and OTS generation,” Cluster Computing, vol. 22, no. 6, pp.  13027-13039, 2019.
  • [30] Ortet Lopes, D. Zou, F. A. Ruambo, S. Akbar, and B. Yuan, “Towards Effective Detection of Recent DDoS Attacks: A deep learning Approach,” Secur. Commun. Networks, vol. 2021, 2021, doi: 10.1155/2021/5710028
  • [31] Haider, S., Akhunzada, A., Mustafa, I., Patel, T. B., Fernandez, A., Choo, K. K. R., & Iqbal, J. (2020), “ A deep CNN ensemble framework for efficient DDoS attack detection in software defined networks,” Ieee Access, vol. 8, pp. 53972-53983.
  • [32] Naveen Bindra and Manu Sood, “Detecting DDoS Attacks Using Machine Learning Techniques and Contemporary Intrusion Detection Dataset,” Control Comput. Sci., vol. 53, no. 5, pp. 419–428, Sep. 2019, doi: 10.3103/S0146411619050043/TABLES/3.
  • [33] Yousuf and R. N. Mir, “DDoS attack detection in Internet of Things using recurrent neural network,” Comput. Electr. Eng., vol. 101, no. May, p. 108034, 2022, doi: 10.1016/j.compeleceng.2022.108034.
  • [34] Chiba, N. Abghour, K. Moussaid, A. El, and M. Rida, “Intelligent approach to build a Deep Neural Network based IDS for cloud environment using combination of machine learning algorithms Network intrusion detection system Deep Neural Network Genetic algorithm Simulated Annealing Algorithm,” Comput. Secur., vol. 86, pp. 291–317, 2019, doi: 10.1016/j.cose.2019.06.013.
  • [35] V Alghazzawi, D., Bamasag, O., Ullah, H., & Asghar, M. Z, “Efficient detection of DDoS attacks using a hybrid deep learning model with improved feature selection,” Applied Sciences, vol. 11, no. 24, pp. 11634, 2021
  • [36] Sadaf and J. Sultana, "Intrusion Detection Based on Autoencoder and Isolation Forest in Fog Computing," in IEEE Access, vol. 8, pp. 167059-167068, 2020, doi: 10.1109/ACCESS.2020.3022855.
  • [37] Bhardwaj, A., Mangat, V., & Vig, R, “Hyperband tuned deep neural network with well posed stacked sparse autoencoder for detection of DDoS attacks in cloud,” IEEE Access, vol. 8, pp. 181916-181929, 2020.
  • [38] Al-Fawa'reh, M., Al-Fayoumi, M., Nashwan, S., & Fraihat, S, “Cyber threat intelligence using PCA-DNN model to detect abnormal network behavior,” Egyptian Informatics Journal, vol. 23, no. 2, pp.  173-185, 2022.
  • [39] Kadhim, Q. K., Al-Sudani, A. S., Almani, I. A., Alghazali, T., Dabis, H. K., Mohammed, A. T., ... & Mezaal, Y, “IOT-MDEDTL: IoT Malware Detection based on Ensemble Deep Transfer Learning,” Majlesi Journal of Electrical Engineering, vol. 16, no. 3, pp. 47-54, 2022.
  • [40] Wang, M., Lu, Y., & Qin, J, “A dynamic MLP-based DDoS attack detection method using feature selection and feedback,” Computers & Security, vol. 88, pp. 101645.
  • [41] Jain, R., & Bhatt, C, “PRP-Based Cascaded Feed-Forward Network for Detection and Prevention of DDoS Cyber Attacks,” International Journal of Innovative Research in Technology and Management, Vol. 6, no. 2, pp. 131-140, 2022.