You are here

Using Genetic Algorithm to Improve Bernoulli Naïve Bayes Algorithm in Order to Detect DDoS Attacks in Cloud Computing Platform

Journal Name:

Publication Year:

Abstract (2. Language): 
Devices such as routers, switches or firewalls are the most vital connections in communication network among physical machines in a cloud computing environment. In the absence of security on the network, intruders are allowed to access the equipment and configure it in the way they want to. Hence, a method suggested to deal with denial-of-service (DoS) attacks in the cloud computing platform is one of the essential and most important security issues in this area. This study tends to provide a smart method based on Bernoulli naïve bayes algorithm focusing on genetic algorithm for detecting DoS attacks. Through different network streams, network streams which trigger DoS and DDoS attacks are very important. The main idea of this study is to use Bernoulli naïve bayes algorithm to identify DoS attacks, which is the main reason for optimizing this algorithm using genetic algorithm. In this method, an optimal subset of the set of features is extracted using genetic algorithm, and this optimal subset is used for Bernoulli naïve bayes learning. Results of the experiments carried out and comparison of the suggested method with other methods indicate proper accuracy and operation of the suggested method.
106
112

REFERENCES

References: 

[1] Wang, B., et al., DDoS attack protection in the era of cloud computing
and software-defined networking. Computer Networks, 2015. 81: p.
308-319.
[2] Tama, B.A. and K.-H. Rhee, Data Mining Techniques in DoS/DDoS
Attack Detection: A Literature Review. International Information
Institute (Tokyo). Information, 2015. 18(8): p. 3739.
[3] Li, X., et al. DDoS Detection in SDN Switches using Support Vector
Machine Classifier. in 2015 Joint International Mechanical, Electronic
and Information Technology Conference (JIMET-15). 2015. Atlantis
Press.
[4] Malhi, A.K. and S. Batra, Genetic‐based framework for prevention of
masquerade and DDoS attacks in vehicular ad‐hocnetworks. Security
and Communication Networks, 2016. 9(15): p. 2612-2626.
[5] Ambusaidi, M.A., et al., Building an intrusion detection system using a
filter-based feature selection algorithm. IEEE transactions on computers,
2016. 65(10): p. 2986-2998.
[6] Osanaiye, O., et al., Ensemble-based multi-filter feature selection
method for DDoS detection in cloud computing. EURASIP Journal on
Wireless Communications and Networking, 2016. 2016(1): p. 130.
[7] Varma, P.R.K., V.V. Kumari, and S.S. Kumar, Feature Selection Using
Relative Fuzzy Entropy and Ant Colony Optimization Applied to Realtime
Intrusion Detection System. Procedia Computer Science, 2016. 85:
p. 503-510.
[8] Grefenstette, J.J., Optimization of control parameters for genetic
algorithm. IEEE Transactions on systems, man, and cybernetics, 1986.
16(1): p. 122-128.
[9] Murphy, K.P., Naive bayes classifiers. University of British Columbia,
2006.
[10] Mitchell, M., An introduction to genetic algorithm. 1998: MIT press.
[11] Ali, E. and E. Elamin, A proposed genetic algorithm selection method.
2006.
[12] Pereira, F. and G. Gordon. The support vector decomposition machine.
in Proceedings of the 23rd international conference on Machine
learning. 2006. ACM.
[13] Revathi, S. and A. Malathi, A detailed analysis on NSL-KDD dataset
using various machine learning techniques for intrusion detection. 2013.
[14] Cup, K., Dataset. available at the following website http://kdd. ics. uci.
edu/databases/kddcup99/kddcup99. html, 1999. 72.
[15] Hanley, J.A. and B.J. McNeil, The meaning and use of the area under a
receiver operating characteristic (ROC) curve. Radiology, 1982. 143(1):
p. 29-36.
[16] Cheadle, C., et al., Analysis of microarray data using Z score
transformation. The Journal of molecular diagnostics, 2003. 5(2): p. 73-
[17] Visa, S. Ramsay, B. Ralescu, A. and VanDerKnaap, E., Confusion
Matrix-Based Feature Selection. Proceedings of The 22nd Midwest
Artificial Intelligence and Cognitive Science Conference 2011.

Thank you for copying data from http://www.arastirmax.com