SlideShare a Scribd company logo
1 of 5
Download to read offline
Securing Cloud Computing Environment Against DDoS Attacks
Bansidhar Joshi
Department of computer Science
NIT, Tiruchirappalli
Tiruchirappalli, India
bansidhar11@gmail
A. Santhana Vijayan
Department of computer Science
NIT, Tiruchirappalli
Tiruchirappalli, India
vijayana@gmail
Bineet Kumar Joshi
ICFAI University
Dehradun, India
bineetjoshi@gmail.com
Abstract— Cloud computing is becoming one of the next IT
industry buzz word. However, as cloud computing is still in its
infancy, current adoption is associated with numerous challenges
like security, performance, availability, etc. In cloud computing
where infrastructure is shared by potentially millions of users,
Distributed Denial of Service (DDoS) attacks have the potential to
have much greater impact than against single tenanted
architectures. This paper tested the efficiency of a cloud trace back
model in dealing with DDoS attacks using back propagation
neural network and finds that the model is useful in tackling
Distributed Denial of Service attacks.
Keywords- Denial of Service, Cloud Computing, Cloud Trace
Back Model, Cloud Protector, Neural Network
I. INTRODUCTION
Cloud computing is defined as the storage, management,
processing, and accessing information and other data stored
in a specific server. The “cloud” pertains to all these
necessary information. Cloud Computing makes computer
infrastructure and services available "on-need" basis. A
computing cloud is a set of a network enabled services,
providing scalable, QoS guaranteed, inexpensive computing
infrastructures on demand, which could be accessed in a
simple and pervasive way [1].
Cloud computing is becoming one of the next IT
industry buzz words: user moves out their data and
applications to remote “cloud” and then access them in
simple and flexible way [1]. As cloud computing is still in
its infancy, current adoption is associated with numerous
challenges like security, performance, availability, integrity,
cost etc. Out of these, Security issue has played the most
important role in hindering cloud computing. Putting data,
running software at someone else’s hard disk using someone
else’s CPU appears daunting to many.
Out of confidentiality, integrity and availability as three
major issues in cloud security, availability is the area where
cloud based infrastructure appears to have had its largest
challenges to date; and it is Distributed Denial of Service
(DDoS) attack, a major threat to availability [2] [3]. In cloud
computing where infrastructure is shared by potentially
millions of users, DDoS attacks have the potential to have
much greater impact than against single tenanted
architectures.
Distributed Denial of Service is a type of attack that
aims to make services or resources unavailable for indefinite
amount of time by flooding it with useless traffic [4]. The
two main objectives of these attacks are, to exhaust
computer resources (CPU time, Network bandwidth) so that
it makes services unavailable to legitimate users. The
second objective is, to hide their identity by mimicking
legitimate web service traffic, in order to create a large
group of agents to launch an attack [3] [5]. In a general
DDoS attack, the attacker usually disguises or ‘spoofs’ the
IP address section of a packet header in order to hide their
identity from their victim. This makes it extremely difficult
to track the source of the attack. IP trace back is a scheme
that provides an effective way to trace the source of DDoS
attacks to its point of origin.
This work will test the efficiency of a Cloud Trace Back
model using a new data set. Cloud Trace Back model (CTB)
is based upon Deterministic Packet Marking (DPM)
algorithm [6] [7]. However this work will check the Cloud
Trace Back model using Flexible Deterministic Packet
Marking, which provides a defense system with the ability
to find out the real sources of attacking packets that traverse
through the network [8].
Our contributions are as follows: Section 2 introduces
Cloud Trace Back model and Cloud protector. Section 3
describes Flexible Deterministic Packet Marking. Results
are presented in section 4. Section 5 summarizes, draws
conclusions and indicates direction for further research.
II. CLOUD TRACE BACK MODEL AND CLOUD
PROTECTOR
The main focus of proposed model shown in Fig. 1 is to
offer a solution to Trace Back through our application
module Cloud Trace Back (CTB) to find the source of
DDoS attacks, and introduce the use of a back propagation
neutral network, called Cloud Protector, which was trained
to detect and filter such attack traffic.
A. Cloud Traceback (CTB)
Cloud Trace Back Architecture’s (CTB) main objective
is to apply a SOA approach to Trace Back methodology, in
order to identify the true source of a DDoS. CTB is based
upon Deterministic Packet Marking (DPM) algorithm. DPM
!  #  $%   ' %  % (% )*+
marks the ID field and reserved flag within the IP header.
As each incoming packet enters an edge ingress router it is
marked, outgoing packets are usually ignored. The marked
packets will remain unchanged for as long as the packet
traverses the network. We propose, in a CTB framework, to
employ the FDPM methodology by placing our Cloud Trace
Back Mark (CTM) within a web service message [7]. CTB
is deployed at the edge routers in order to be close to the
source end of the cloud network. Usually, if no security
services are in place for web services, the system becomes
quite vulnerable to attacks. Fig.1 demonstrates how CTB
can remedy this by being located before the Web Server, in
order to place a Cloud Trace Back Mark (CTM) tag within
the CTB header. As a result, all service requests are first
sent to the CTB for marking, thereby effectively removing
the service provider’s address and preventing a direct attack.
If an attack is discovered or was successful at bringing
down the web server, the victim will be able to recover and
reconstruct the CTM tag and as a result reveal the identity of
the source.
In an attack scenario, the attack client will request a web
service from CTB, which in turn will pass the request to the
web server. The attack client will then formulate a SOAP
request message based on the service description. Upon
receipt of SOAP request message, CTB will place a CTM
within the header. Once the CTM has been placed, the
SOAP message will be sent to the Web Server. Upon
discovery of an attack, the victim will ask for reconstruction
to extract the mark and inform them of the origin of the
message. The reconstruction will also begin to filter out the
attack traffic. If the message is normal, the SOAP message
is then forwarded to the request handler for processing.
Upon receipt of the SOAP request, the Web Service will
prepare a SOAP response. The web server then takes the
SOAP response and sends it back to the client as part of the
HTTP response. CTB will not interfere with the response
requests or any outgoing message.
Fig.1: The Proposed Model
B. Cloud Protector
CTB does not directly eliminate a DDoS attack message.
This is left for the filter section of a defense system called
Cloud Protector. The Cloud Protector is a trained back
propagation neural network (NN), to help detect and filter
out DDoS messages. A neural network is a set of connected
units made up of input, hidden and output layers [8] [9].
Each of the connections in a neural network has a weight
associated with it. In a neural net the focus is on the
threshold logic unit (TLU). The TLU inserts input objects
into an array of weighted quantities and sums them up to see
if they are above the threshold. The cloud protector system is
implemented in five different phases as shown in Fig. 2 and
described below.
Fig. 2: Implementation phases
1) Dataset For Training and Testing
The efficiency of the neural network depends on
the training data. If the training data is more accurate then
performance of trained system will be improved. Therefore
collecting of data for training is a critical problem. This can
be obtained by three ways as by using real traffic, by using
sanitized traffic and by using simulated traffic [9]. The third
and the most common way to obtain data are to create a
testbed network and generate background traffic on this
network. In the testbed environment, background traffic is
generated either by using complex traffic generators
modeling actual network statistics, or by using simpler
commercial traffic generators creating small number of
packets at a high rate. Advantage of this approach is that
data can be freely distributed as it does not contain any
sensitive information. Also, it is guaranteed that generated
traffic does not contain any unknown attacks as the
background traffic is created by simulators. However
difficulties exist when using this approach too. Firstly, it’s
very costly and difficult to create a simulation. Secondly, in
order to model various networks, different types of traffic is
needed. In order to avoid dealing with difficulties of all
three approaches, DARPA 1999 attack detection evaluation
dataset was used for training/testing data [10].
2) Preprocessing Dataset
The data set is preprocessed so that it may be able to
give it as an input to the developed system. This data set
consists of numeric and symbolic features and it is
converted in numeric form so that it can be given as inputs
to required neural network. Now this modified data set is
ready to be used as training and testing of the neural
network.
3) Determining the NN architecture
There is no certain mathematical approach for
obtaining the optimum number of hidden layers and their
neurons. For choosing optimum set of hidden layers and its
no. of neuron a comparison is made for many cases and
optimum is selected.
III. FDPM MARKING SCHEME
A. The Encoding Procedure
Before the FDPM mark can be generated, the length of
the mark must be determined based on the network
protocols deployed within the network to be protected.
According to different situations, the mark length could be
24 bits long at most, 19 bits at middle, and 16 bits at
least[8][9].
Fig. 3: FPDM encoding procedure
B. The Reconstruction Procedure
Mark recognition and Address recovery are the two
main steps of the reconstruction procedure. The mark
recognition step is the reverse process of the encoding
process. By reading the control fields in the mark, the length
of the mark and which fields in the IP header store the mark
can be recognized. If the RF is 0, the mark length is 24 (both
TOS and ID are deployed). If the RF is 1, according to
different protocols of TOS used, the mark length is 16 or 19.
The second step, address recovery, analyzes the mark and
stores it in a recovery table. It is a linked-list table; the
number of rows is a variable, and the number of columns in
the table is k, representing the number of segments used to
carry the source address in the packets. Here, the segment
number is used to correlate the data into the correct order.
The row of the table means the entry and each digest owns
one entry (source IP address).
Fig. 4: FDPM reconstruction scheme
Fig. 4 shows the reconstruction scheme. When all fields
in one entry are filled according to the segment number, this
source IP address is reconstructed and the entry in the
recovery table is then deleted.
IV. RESULT AND DISCUSSION
A. Training and Testing
The result of the Cloud Protector shown in Fig. 5(a,
b) demonstrates that on its training sets it detected around
91% of with a miss rating of 9%. Also, against the test
dataset, the results slightly varied down by 3% (88% of
attack traffic).
Fig. 5.a: Training set results
Fig. 5.b: testing set results
The main issue from the results was that the response
time varied significantly from being able to detect the attack
traffic within a matter of 20–30 ms to 1 s. One hypothesis is
that the dataset was scattered far apart, and so the error ratio
within the neural network kept fluctuating. Another
hypothesis is that it could be the back propagation. These
results are at 4 Neuron Layers, Learning Rate of 0.2,
Momentum of 0.6, and a variable threshold of 0.1.
B. Evaluation Using DARPA(KDD99) Data Set
Using the MIT week-II data set, experiments are set
out to test to if CTB could detect the DDoS attack packets
that we inserted into the data. Fig. 7 show’s that CTB
successfully detected 75-79% of the legitimate traffic in the
data set.
Fig. 6: Avg. legitimate traffic detected by CTB
CTB was able to detect 76-81% of the attack traffic. Fig.
8 results show that only a small number of attack traffic was
misidentified, thereby we can conclude CTB can classify
what is and is not attack traffic to around 75% accuracy.
Fig. 7: Avg. attack traffic detected by CTB
V. CONCLUSION
The cloud computing model has the ability to scale
computer resources on demand, and give users a number of
advantages to progress their conventional cluster system. In
fact the total cost of going towards cloud is almost zero
when resources are not in use. Therefore it is no wonder that
academic research and industry are moving towards cloud
computing. However, Security should in fact be
implemented it along side functionality and performance.
One of the most serious threats to cloud computing security
itself comes from Distributed Denial of Service attacks.
These types of attacks are simple and easy to implement by
the attacker, but to security experts they are twice as
difficult to stop. So, a solution model is offered to Trace
Back through proposed Cloud Trace Back (CTB) to find the
source of real attacks, and introduce the use of a back
propagation neutral network, called Cloud Protector, which
was trained to detect and filter such attack traffic. The result
we achieved was around 88% and 91%, for testing and
training datasets, respectively. The proposed model’s
results show that it is able to detect most of the attack
messages within a very short period of time. We also show
that CTB can successfully traceback 75-81% In the future,
we will be setting up to begin real-time data gathering and
testing of Cloud Protector. This will allow us to fine tune
CTB to better detect and filter DDoS attacks.
REFERENCES
[1] Lizhe W. and Gregor V. L.,(2008), “Cloud Computing : a Perspective
Study,” New Generation Computing Volume 28, Number 2, 137-146,
DOI: 10.1007/s00354-008-0081-5
[2] [2] Bouzida Y, Cuppens F, Gombault S, (2006), “Detecting and
Reacting against Distributed Denial of Service Attacks,” IEEE
International Conference on Communication, Volume 5.
[3] [3] Trostle J, (2006), “protecting Against Distributed Denial of
service attacks Using Distributed Filtering,” Securecomm and
Workshops, Aug 28 2006- sept1 2006, pp 1-11
[4] [4] Iftikhar A., Azween B. A., Abdullah S.A.,(2009), “Application of
Artificial neural Network in Detection of DoS attacks,” SIN’09, Oct
6-10.
[5] [5] Bhaskaran M., Natrarajan. A.M. and Sivanandam. S.N.,(2007),”
Trace Backing the Spoofed IP Packets in Multi ISP Domains with
Secured Communication,” IEEE-ICSCN 2007,pp 579-584.

More Related Content

What's hot

Icimt 2010 procediing rp118 vol.2 d10122
Icimt 2010 procediing rp118 vol.2 d10122Icimt 2010 procediing rp118 vol.2 d10122
Icimt 2010 procediing rp118 vol.2 d10122Gulshan Shrivastava
 
Secured Authorized Data Using Hybrid Encryption in Cloud Computing
Secured Authorized Data Using Hybrid Encryption in Cloud ComputingSecured Authorized Data Using Hybrid Encryption in Cloud Computing
Secured Authorized Data Using Hybrid Encryption in Cloud ComputingIJERA Editor
 
Drops division and replication of data in cloud for optimal performance and s...
Drops division and replication of data in cloud for optimal performance and s...Drops division and replication of data in cloud for optimal performance and s...
Drops division and replication of data in cloud for optimal performance and s...Pvrtechnologies Nellore
 
Survey on Division and Replication of Data in Cloud for Optimal Performance a...
Survey on Division and Replication of Data in Cloud for Optimal Performance a...Survey on Division and Replication of Data in Cloud for Optimal Performance a...
Survey on Division and Replication of Data in Cloud for Optimal Performance a...IJSRD
 
Securing the cloud computing systems with matrix vector and multi-key using l...
Securing the cloud computing systems with matrix vector and multi-key using l...Securing the cloud computing systems with matrix vector and multi-key using l...
Securing the cloud computing systems with matrix vector and multi-key using l...eSAT Publishing House
 
AN ACCESS CONTROL MODEL OF VIRTUAL MACHINE SECURITY
AN ACCESS CONTROL MODEL OF VIRTUAL MACHINE SECURITYAN ACCESS CONTROL MODEL OF VIRTUAL MACHINE SECURITY
AN ACCESS CONTROL MODEL OF VIRTUAL MACHINE SECURITYcsandit
 
IRJET- Improving Data Spillage in Multi-Cloud Capacity Administration
IRJET- Improving Data Spillage in Multi-Cloud Capacity AdministrationIRJET- Improving Data Spillage in Multi-Cloud Capacity Administration
IRJET- Improving Data Spillage in Multi-Cloud Capacity AdministrationIRJET Journal
 
BEST FINAL YEAR PROJECT IEEE 2015 BY SPECTRUM SOLUTIONS PONDICHERRY
BEST FINAL YEAR PROJECT IEEE 2015 BY SPECTRUM SOLUTIONS PONDICHERRYBEST FINAL YEAR PROJECT IEEE 2015 BY SPECTRUM SOLUTIONS PONDICHERRY
BEST FINAL YEAR PROJECT IEEE 2015 BY SPECTRUM SOLUTIONS PONDICHERRYRaushan Kumar Singh
 
Data Replication In Cloud Computing
Data Replication In Cloud ComputingData Replication In Cloud Computing
Data Replication In Cloud ComputingRahul Garg
 
Improving Efficiency of Security in Multi-Cloud
Improving Efficiency of Security in Multi-CloudImproving Efficiency of Security in Multi-Cloud
Improving Efficiency of Security in Multi-CloudIJTET Journal
 
An Optimal Cooperative Provable Data Possession Scheme for Distributed Cloud ...
An Optimal Cooperative Provable Data Possession Scheme for Distributed Cloud ...An Optimal Cooperative Provable Data Possession Scheme for Distributed Cloud ...
An Optimal Cooperative Provable Data Possession Scheme for Distributed Cloud ...IJMER
 
AN EFFICIENT INTRUSION DETECTION SYSTEM WITH CUSTOM FEATURES USING FPA-GRADIE...
AN EFFICIENT INTRUSION DETECTION SYSTEM WITH CUSTOM FEATURES USING FPA-GRADIE...AN EFFICIENT INTRUSION DETECTION SYSTEM WITH CUSTOM FEATURES USING FPA-GRADIE...
AN EFFICIENT INTRUSION DETECTION SYSTEM WITH CUSTOM FEATURES USING FPA-GRADIE...IJCNCJournal
 
Dynamic Chunks Distribution Scheme for Multiservice Load Balancing Using Fibo...
Dynamic Chunks Distribution Scheme for Multiservice Load Balancing Using Fibo...Dynamic Chunks Distribution Scheme for Multiservice Load Balancing Using Fibo...
Dynamic Chunks Distribution Scheme for Multiservice Load Balancing Using Fibo...Editor IJCATR
 
Dotnet 2015 2016 2017 ieee project list-with abstract
Dotnet 2015 2016 2017 ieee project list-with abstractDotnet 2015 2016 2017 ieee project list-with abstract
Dotnet 2015 2016 2017 ieee project list-with abstractAdz91 Digital Ads Pvt Ltd
 
Analysis of rsa algorithm using gpu
Analysis of rsa algorithm using gpuAnalysis of rsa algorithm using gpu
Analysis of rsa algorithm using gpuIJNSA Journal
 
DESIGNING SECURE CLUSTERING PROTOCOL WITH THE APPROACH OF REDUCING ENERGY CON...
DESIGNING SECURE CLUSTERING PROTOCOL WITH THE APPROACH OF REDUCING ENERGY CON...DESIGNING SECURE CLUSTERING PROTOCOL WITH THE APPROACH OF REDUCING ENERGY CON...
DESIGNING SECURE CLUSTERING PROTOCOL WITH THE APPROACH OF REDUCING ENERGY CON...IJCNCJournal
 

What's hot (18)

Icimt 2010 procediing rp118 vol.2 d10122
Icimt 2010 procediing rp118 vol.2 d10122Icimt 2010 procediing rp118 vol.2 d10122
Icimt 2010 procediing rp118 vol.2 d10122
 
Secured Authorized Data Using Hybrid Encryption in Cloud Computing
Secured Authorized Data Using Hybrid Encryption in Cloud ComputingSecured Authorized Data Using Hybrid Encryption in Cloud Computing
Secured Authorized Data Using Hybrid Encryption in Cloud Computing
 
Drops division and replication of data in cloud for optimal performance and s...
Drops division and replication of data in cloud for optimal performance and s...Drops division and replication of data in cloud for optimal performance and s...
Drops division and replication of data in cloud for optimal performance and s...
 
Survey on Division and Replication of Data in Cloud for Optimal Performance a...
Survey on Division and Replication of Data in Cloud for Optimal Performance a...Survey on Division and Replication of Data in Cloud for Optimal Performance a...
Survey on Division and Replication of Data in Cloud for Optimal Performance a...
 
Securing the cloud computing systems with matrix vector and multi-key using l...
Securing the cloud computing systems with matrix vector and multi-key using l...Securing the cloud computing systems with matrix vector and multi-key using l...
Securing the cloud computing systems with matrix vector and multi-key using l...
 
AN ACCESS CONTROL MODEL OF VIRTUAL MACHINE SECURITY
AN ACCESS CONTROL MODEL OF VIRTUAL MACHINE SECURITYAN ACCESS CONTROL MODEL OF VIRTUAL MACHINE SECURITY
AN ACCESS CONTROL MODEL OF VIRTUAL MACHINE SECURITY
 
IRJET- Improving Data Spillage in Multi-Cloud Capacity Administration
IRJET- Improving Data Spillage in Multi-Cloud Capacity AdministrationIRJET- Improving Data Spillage in Multi-Cloud Capacity Administration
IRJET- Improving Data Spillage in Multi-Cloud Capacity Administration
 
Fs2510501055
Fs2510501055Fs2510501055
Fs2510501055
 
BEST FINAL YEAR PROJECT IEEE 2015 BY SPECTRUM SOLUTIONS PONDICHERRY
BEST FINAL YEAR PROJECT IEEE 2015 BY SPECTRUM SOLUTIONS PONDICHERRYBEST FINAL YEAR PROJECT IEEE 2015 BY SPECTRUM SOLUTIONS PONDICHERRY
BEST FINAL YEAR PROJECT IEEE 2015 BY SPECTRUM SOLUTIONS PONDICHERRY
 
Data Replication In Cloud Computing
Data Replication In Cloud ComputingData Replication In Cloud Computing
Data Replication In Cloud Computing
 
Improving Efficiency of Security in Multi-Cloud
Improving Efficiency of Security in Multi-CloudImproving Efficiency of Security in Multi-Cloud
Improving Efficiency of Security in Multi-Cloud
 
An Optimal Cooperative Provable Data Possession Scheme for Distributed Cloud ...
An Optimal Cooperative Provable Data Possession Scheme for Distributed Cloud ...An Optimal Cooperative Provable Data Possession Scheme for Distributed Cloud ...
An Optimal Cooperative Provable Data Possession Scheme for Distributed Cloud ...
 
call for papers, research paper publishing, where to publish research paper, ...
call for papers, research paper publishing, where to publish research paper, ...call for papers, research paper publishing, where to publish research paper, ...
call for papers, research paper publishing, where to publish research paper, ...
 
AN EFFICIENT INTRUSION DETECTION SYSTEM WITH CUSTOM FEATURES USING FPA-GRADIE...
AN EFFICIENT INTRUSION DETECTION SYSTEM WITH CUSTOM FEATURES USING FPA-GRADIE...AN EFFICIENT INTRUSION DETECTION SYSTEM WITH CUSTOM FEATURES USING FPA-GRADIE...
AN EFFICIENT INTRUSION DETECTION SYSTEM WITH CUSTOM FEATURES USING FPA-GRADIE...
 
Dynamic Chunks Distribution Scheme for Multiservice Load Balancing Using Fibo...
Dynamic Chunks Distribution Scheme for Multiservice Load Balancing Using Fibo...Dynamic Chunks Distribution Scheme for Multiservice Load Balancing Using Fibo...
Dynamic Chunks Distribution Scheme for Multiservice Load Balancing Using Fibo...
 
Dotnet 2015 2016 2017 ieee project list-with abstract
Dotnet 2015 2016 2017 ieee project list-with abstractDotnet 2015 2016 2017 ieee project list-with abstract
Dotnet 2015 2016 2017 ieee project list-with abstract
 
Analysis of rsa algorithm using gpu
Analysis of rsa algorithm using gpuAnalysis of rsa algorithm using gpu
Analysis of rsa algorithm using gpu
 
DESIGNING SECURE CLUSTERING PROTOCOL WITH THE APPROACH OF REDUCING ENERGY CON...
DESIGNING SECURE CLUSTERING PROTOCOL WITH THE APPROACH OF REDUCING ENERGY CON...DESIGNING SECURE CLUSTERING PROTOCOL WITH THE APPROACH OF REDUCING ENERGY CON...
DESIGNING SECURE CLUSTERING PROTOCOL WITH THE APPROACH OF REDUCING ENERGY CON...
 

Similar to Securing cloud computing environment against d do s attacks

DDOS DETECTION IN SOFTWARE-DEFINED NETWORK (SDN) USING MACHINE LEARNING
DDOS DETECTION IN SOFTWARE-DEFINED NETWORK (SDN) USING MACHINE LEARNINGDDOS DETECTION IN SOFTWARE-DEFINED NETWORK (SDN) USING MACHINE LEARNING
DDOS DETECTION IN SOFTWARE-DEFINED NETWORK (SDN) USING MACHINE LEARNINGIJCI JOURNAL
 
IRJET- A Survey on DDOS Attack in Manet
IRJET-  	  A Survey on DDOS Attack in ManetIRJET-  	  A Survey on DDOS Attack in Manet
IRJET- A Survey on DDOS Attack in ManetIRJET Journal
 
Evasion Streamline Intruders Using Graph Based Attacker model Analysis and Co...
Evasion Streamline Intruders Using Graph Based Attacker model Analysis and Co...Evasion Streamline Intruders Using Graph Based Attacker model Analysis and Co...
Evasion Streamline Intruders Using Graph Based Attacker model Analysis and Co...Editor IJCATR
 
Cybersecurity Threat Detection of Anomaly Based DDoS Attack Using Machine Lea...
Cybersecurity Threat Detection of Anomaly Based DDoS Attack Using Machine Lea...Cybersecurity Threat Detection of Anomaly Based DDoS Attack Using Machine Lea...
Cybersecurity Threat Detection of Anomaly Based DDoS Attack Using Machine Lea...IRJET Journal
 
A Collaborative Intrusion Detection System for Cloud Computing
A Collaborative Intrusion Detection System for Cloud ComputingA Collaborative Intrusion Detection System for Cloud Computing
A Collaborative Intrusion Detection System for Cloud Computingijsrd.com
 
Ijsrdv1 i4019
Ijsrdv1 i4019Ijsrdv1 i4019
Ijsrdv1 i4019ijsrd.com
 
Impact of Flash Crowd Attack in Online Retail Applications
Impact of Flash Crowd Attack in Online Retail ApplicationsImpact of Flash Crowd Attack in Online Retail Applications
Impact of Flash Crowd Attack in Online Retail ApplicationsIJEACS
 
DDoS Attack Detection on Internet o Things using Unsupervised Algorithms
DDoS Attack Detection on Internet o Things using Unsupervised AlgorithmsDDoS Attack Detection on Internet o Things using Unsupervised Algorithms
DDoS Attack Detection on Internet o Things using Unsupervised Algorithmsijfls
 
DDOS ATTACK DETECTION ON INTERNET OF THINGS USING UNSUPERVISED ALGORITHMS
DDOS ATTACK DETECTION ON INTERNET OF THINGS USING UNSUPERVISED ALGORITHMSDDOS ATTACK DETECTION ON INTERNET OF THINGS USING UNSUPERVISED ALGORITHMS
DDOS ATTACK DETECTION ON INTERNET OF THINGS USING UNSUPERVISED ALGORITHMSijfls
 
IRJET- Detection and Isolation of Zombie Attack under Cloud Computing
IRJET- Detection and Isolation of Zombie Attack under Cloud ComputingIRJET- Detection and Isolation of Zombie Attack under Cloud Computing
IRJET- Detection and Isolation of Zombie Attack under Cloud ComputingIRJET Journal
 
A Survey of the Homomorphic Encryption Approach for Data Security in Cloud Co...
A Survey of the Homomorphic Encryption Approach for Data Security in Cloud Co...A Survey of the Homomorphic Encryption Approach for Data Security in Cloud Co...
A Survey of the Homomorphic Encryption Approach for Data Security in Cloud Co...Patel Dasharathbhai
 
A brief review: security issues in cloud computing and their solutions
A brief review: security issues in cloud computing and their solutionsA brief review: security issues in cloud computing and their solutions
A brief review: security issues in cloud computing and their solutionsTELKOMNIKA JOURNAL
 
Intrusion Detection and Marking Transactions in a Cloud of Databases Environm...
Intrusion Detection and Marking Transactions in a Cloud of Databases Environm...Intrusion Detection and Marking Transactions in a Cloud of Databases Environm...
Intrusion Detection and Marking Transactions in a Cloud of Databases Environm...neirew J
 
INTRUSION DETECTION AND MARKING TRANSACTIONS IN A CLOUD OF DATABASES ENVIRONMENT
INTRUSION DETECTION AND MARKING TRANSACTIONS IN A CLOUD OF DATABASES ENVIRONMENTINTRUSION DETECTION AND MARKING TRANSACTIONS IN A CLOUD OF DATABASES ENVIRONMENT
INTRUSION DETECTION AND MARKING TRANSACTIONS IN A CLOUD OF DATABASES ENVIRONMENTijccsa
 
New Framework to Detect and Prevent Denial of Service Attack in Cloud Computi...
New Framework to Detect and Prevent Denial of Service Attack in Cloud Computi...New Framework to Detect and Prevent Denial of Service Attack in Cloud Computi...
New Framework to Detect and Prevent Denial of Service Attack in Cloud Computi...CSCJournals
 
A ROBUST MECHANISM FOR DEFENDING DISTRIBUTED DENIAL OF SERVICE ATTACKS ON WEB...
A ROBUST MECHANISM FOR DEFENDING DISTRIBUTED DENIAL OF SERVICE ATTACKS ON WEB...A ROBUST MECHANISM FOR DEFENDING DISTRIBUTED DENIAL OF SERVICE ATTACKS ON WEB...
A ROBUST MECHANISM FOR DEFENDING DISTRIBUTED DENIAL OF SERVICE ATTACKS ON WEB...IJNSA Journal
 
EFFECTIVE METHOD FOR MANAGING AUTOMATION AND MONITORING IN MULTI-CLOUD COMPUT...
EFFECTIVE METHOD FOR MANAGING AUTOMATION AND MONITORING IN MULTI-CLOUD COMPUT...EFFECTIVE METHOD FOR MANAGING AUTOMATION AND MONITORING IN MULTI-CLOUD COMPUT...
EFFECTIVE METHOD FOR MANAGING AUTOMATION AND MONITORING IN MULTI-CLOUD COMPUT...IJNSA Journal
 
Computing_Paradigms_An_Overview.pdf
Computing_Paradigms_An_Overview.pdfComputing_Paradigms_An_Overview.pdf
Computing_Paradigms_An_Overview.pdfHODCS6
 
APPLICATION-LAYER DDOS DETECTION BASED ON A ONE-CLASS SUPPORT VECTOR MACHINE
APPLICATION-LAYER DDOS DETECTION BASED ON A ONE-CLASS SUPPORT VECTOR MACHINEAPPLICATION-LAYER DDOS DETECTION BASED ON A ONE-CLASS SUPPORT VECTOR MACHINE
APPLICATION-LAYER DDOS DETECTION BASED ON A ONE-CLASS SUPPORT VECTOR MACHINEIJNSA Journal
 

Similar to Securing cloud computing environment against d do s attacks (20)

DDOS DETECTION IN SOFTWARE-DEFINED NETWORK (SDN) USING MACHINE LEARNING
DDOS DETECTION IN SOFTWARE-DEFINED NETWORK (SDN) USING MACHINE LEARNINGDDOS DETECTION IN SOFTWARE-DEFINED NETWORK (SDN) USING MACHINE LEARNING
DDOS DETECTION IN SOFTWARE-DEFINED NETWORK (SDN) USING MACHINE LEARNING
 
IRJET- A Survey on DDOS Attack in Manet
IRJET-  	  A Survey on DDOS Attack in ManetIRJET-  	  A Survey on DDOS Attack in Manet
IRJET- A Survey on DDOS Attack in Manet
 
Evasion Streamline Intruders Using Graph Based Attacker model Analysis and Co...
Evasion Streamline Intruders Using Graph Based Attacker model Analysis and Co...Evasion Streamline Intruders Using Graph Based Attacker model Analysis and Co...
Evasion Streamline Intruders Using Graph Based Attacker model Analysis and Co...
 
Cybersecurity Threat Detection of Anomaly Based DDoS Attack Using Machine Lea...
Cybersecurity Threat Detection of Anomaly Based DDoS Attack Using Machine Lea...Cybersecurity Threat Detection of Anomaly Based DDoS Attack Using Machine Lea...
Cybersecurity Threat Detection of Anomaly Based DDoS Attack Using Machine Lea...
 
A Collaborative Intrusion Detection System for Cloud Computing
A Collaborative Intrusion Detection System for Cloud ComputingA Collaborative Intrusion Detection System for Cloud Computing
A Collaborative Intrusion Detection System for Cloud Computing
 
Ijsrdv1 i4019
Ijsrdv1 i4019Ijsrdv1 i4019
Ijsrdv1 i4019
 
Impact of Flash Crowd Attack in Online Retail Applications
Impact of Flash Crowd Attack in Online Retail ApplicationsImpact of Flash Crowd Attack in Online Retail Applications
Impact of Flash Crowd Attack in Online Retail Applications
 
DDoS Attack Detection on Internet o Things using Unsupervised Algorithms
DDoS Attack Detection on Internet o Things using Unsupervised AlgorithmsDDoS Attack Detection on Internet o Things using Unsupervised Algorithms
DDoS Attack Detection on Internet o Things using Unsupervised Algorithms
 
DDOS ATTACK DETECTION ON INTERNET OF THINGS USING UNSUPERVISED ALGORITHMS
DDOS ATTACK DETECTION ON INTERNET OF THINGS USING UNSUPERVISED ALGORITHMSDDOS ATTACK DETECTION ON INTERNET OF THINGS USING UNSUPERVISED ALGORITHMS
DDOS ATTACK DETECTION ON INTERNET OF THINGS USING UNSUPERVISED ALGORITHMS
 
IRJET- Detection and Isolation of Zombie Attack under Cloud Computing
IRJET- Detection and Isolation of Zombie Attack under Cloud ComputingIRJET- Detection and Isolation of Zombie Attack under Cloud Computing
IRJET- Detection and Isolation of Zombie Attack under Cloud Computing
 
A Survey of the Homomorphic Encryption Approach for Data Security in Cloud Co...
A Survey of the Homomorphic Encryption Approach for Data Security in Cloud Co...A Survey of the Homomorphic Encryption Approach for Data Security in Cloud Co...
A Survey of the Homomorphic Encryption Approach for Data Security in Cloud Co...
 
A brief review: security issues in cloud computing and their solutions
A brief review: security issues in cloud computing and their solutionsA brief review: security issues in cloud computing and their solutions
A brief review: security issues in cloud computing and their solutions
 
Intrusion Detection and Marking Transactions in a Cloud of Databases Environm...
Intrusion Detection and Marking Transactions in a Cloud of Databases Environm...Intrusion Detection and Marking Transactions in a Cloud of Databases Environm...
Intrusion Detection and Marking Transactions in a Cloud of Databases Environm...
 
INTRUSION DETECTION AND MARKING TRANSACTIONS IN A CLOUD OF DATABASES ENVIRONMENT
INTRUSION DETECTION AND MARKING TRANSACTIONS IN A CLOUD OF DATABASES ENVIRONMENTINTRUSION DETECTION AND MARKING TRANSACTIONS IN A CLOUD OF DATABASES ENVIRONMENT
INTRUSION DETECTION AND MARKING TRANSACTIONS IN A CLOUD OF DATABASES ENVIRONMENT
 
New Framework to Detect and Prevent Denial of Service Attack in Cloud Computi...
New Framework to Detect and Prevent Denial of Service Attack in Cloud Computi...New Framework to Detect and Prevent Denial of Service Attack in Cloud Computi...
New Framework to Detect and Prevent Denial of Service Attack in Cloud Computi...
 
A ROBUST MECHANISM FOR DEFENDING DISTRIBUTED DENIAL OF SERVICE ATTACKS ON WEB...
A ROBUST MECHANISM FOR DEFENDING DISTRIBUTED DENIAL OF SERVICE ATTACKS ON WEB...A ROBUST MECHANISM FOR DEFENDING DISTRIBUTED DENIAL OF SERVICE ATTACKS ON WEB...
A ROBUST MECHANISM FOR DEFENDING DISTRIBUTED DENIAL OF SERVICE ATTACKS ON WEB...
 
EFFECTIVE METHOD FOR MANAGING AUTOMATION AND MONITORING IN MULTI-CLOUD COMPUT...
EFFECTIVE METHOD FOR MANAGING AUTOMATION AND MONITORING IN MULTI-CLOUD COMPUT...EFFECTIVE METHOD FOR MANAGING AUTOMATION AND MONITORING IN MULTI-CLOUD COMPUT...
EFFECTIVE METHOD FOR MANAGING AUTOMATION AND MONITORING IN MULTI-CLOUD COMPUT...
 
Computing_Paradigms_An_Overview.pdf
Computing_Paradigms_An_Overview.pdfComputing_Paradigms_An_Overview.pdf
Computing_Paradigms_An_Overview.pdf
 
APPLICATION-LAYER DDOS DETECTION BASED ON A ONE-CLASS SUPPORT VECTOR MACHINE
APPLICATION-LAYER DDOS DETECTION BASED ON A ONE-CLASS SUPPORT VECTOR MACHINEAPPLICATION-LAYER DDOS DETECTION BASED ON A ONE-CLASS SUPPORT VECTOR MACHINE
APPLICATION-LAYER DDOS DETECTION BASED ON A ONE-CLASS SUPPORT VECTOR MACHINE
 
Final report
Final reportFinal report
Final report
 

Securing cloud computing environment against d do s attacks

  • 1. Securing Cloud Computing Environment Against DDoS Attacks Bansidhar Joshi Department of computer Science NIT, Tiruchirappalli Tiruchirappalli, India bansidhar11@gmail A. Santhana Vijayan Department of computer Science NIT, Tiruchirappalli Tiruchirappalli, India vijayana@gmail Bineet Kumar Joshi ICFAI University Dehradun, India bineetjoshi@gmail.com Abstract— Cloud computing is becoming one of the next IT industry buzz word. However, as cloud computing is still in its infancy, current adoption is associated with numerous challenges like security, performance, availability, etc. In cloud computing where infrastructure is shared by potentially millions of users, Distributed Denial of Service (DDoS) attacks have the potential to have much greater impact than against single tenanted architectures. This paper tested the efficiency of a cloud trace back model in dealing with DDoS attacks using back propagation neural network and finds that the model is useful in tackling Distributed Denial of Service attacks. Keywords- Denial of Service, Cloud Computing, Cloud Trace Back Model, Cloud Protector, Neural Network I. INTRODUCTION Cloud computing is defined as the storage, management, processing, and accessing information and other data stored in a specific server. The “cloud” pertains to all these necessary information. Cloud Computing makes computer infrastructure and services available "on-need" basis. A computing cloud is a set of a network enabled services, providing scalable, QoS guaranteed, inexpensive computing infrastructures on demand, which could be accessed in a simple and pervasive way [1]. Cloud computing is becoming one of the next IT industry buzz words: user moves out their data and applications to remote “cloud” and then access them in simple and flexible way [1]. As cloud computing is still in its infancy, current adoption is associated with numerous challenges like security, performance, availability, integrity, cost etc. Out of these, Security issue has played the most important role in hindering cloud computing. Putting data, running software at someone else’s hard disk using someone else’s CPU appears daunting to many. Out of confidentiality, integrity and availability as three major issues in cloud security, availability is the area where cloud based infrastructure appears to have had its largest challenges to date; and it is Distributed Denial of Service (DDoS) attack, a major threat to availability [2] [3]. In cloud computing where infrastructure is shared by potentially millions of users, DDoS attacks have the potential to have much greater impact than against single tenanted architectures. Distributed Denial of Service is a type of attack that aims to make services or resources unavailable for indefinite amount of time by flooding it with useless traffic [4]. The two main objectives of these attacks are, to exhaust computer resources (CPU time, Network bandwidth) so that it makes services unavailable to legitimate users. The second objective is, to hide their identity by mimicking legitimate web service traffic, in order to create a large group of agents to launch an attack [3] [5]. In a general DDoS attack, the attacker usually disguises or ‘spoofs’ the IP address section of a packet header in order to hide their identity from their victim. This makes it extremely difficult to track the source of the attack. IP trace back is a scheme that provides an effective way to trace the source of DDoS attacks to its point of origin. This work will test the efficiency of a Cloud Trace Back model using a new data set. Cloud Trace Back model (CTB) is based upon Deterministic Packet Marking (DPM) algorithm [6] [7]. However this work will check the Cloud Trace Back model using Flexible Deterministic Packet Marking, which provides a defense system with the ability to find out the real sources of attacking packets that traverse through the network [8]. Our contributions are as follows: Section 2 introduces Cloud Trace Back model and Cloud protector. Section 3 describes Flexible Deterministic Packet Marking. Results are presented in section 4. Section 5 summarizes, draws conclusions and indicates direction for further research. II. CLOUD TRACE BACK MODEL AND CLOUD PROTECTOR The main focus of proposed model shown in Fig. 1 is to offer a solution to Trace Back through our application module Cloud Trace Back (CTB) to find the source of DDoS attacks, and introduce the use of a back propagation neutral network, called Cloud Protector, which was trained to detect and filter such attack traffic. A. Cloud Traceback (CTB) Cloud Trace Back Architecture’s (CTB) main objective is to apply a SOA approach to Trace Back methodology, in order to identify the true source of a DDoS. CTB is based upon Deterministic Packet Marking (DPM) algorithm. DPM
  • 2. ! # $% ' % % (% )*+
  • 3. marks the ID field and reserved flag within the IP header. As each incoming packet enters an edge ingress router it is marked, outgoing packets are usually ignored. The marked packets will remain unchanged for as long as the packet traverses the network. We propose, in a CTB framework, to employ the FDPM methodology by placing our Cloud Trace Back Mark (CTM) within a web service message [7]. CTB is deployed at the edge routers in order to be close to the source end of the cloud network. Usually, if no security services are in place for web services, the system becomes quite vulnerable to attacks. Fig.1 demonstrates how CTB can remedy this by being located before the Web Server, in order to place a Cloud Trace Back Mark (CTM) tag within the CTB header. As a result, all service requests are first sent to the CTB for marking, thereby effectively removing the service provider’s address and preventing a direct attack. If an attack is discovered or was successful at bringing down the web server, the victim will be able to recover and reconstruct the CTM tag and as a result reveal the identity of the source. In an attack scenario, the attack client will request a web service from CTB, which in turn will pass the request to the web server. The attack client will then formulate a SOAP request message based on the service description. Upon receipt of SOAP request message, CTB will place a CTM within the header. Once the CTM has been placed, the SOAP message will be sent to the Web Server. Upon discovery of an attack, the victim will ask for reconstruction to extract the mark and inform them of the origin of the message. The reconstruction will also begin to filter out the attack traffic. If the message is normal, the SOAP message is then forwarded to the request handler for processing. Upon receipt of the SOAP request, the Web Service will prepare a SOAP response. The web server then takes the SOAP response and sends it back to the client as part of the HTTP response. CTB will not interfere with the response requests or any outgoing message. Fig.1: The Proposed Model B. Cloud Protector CTB does not directly eliminate a DDoS attack message. This is left for the filter section of a defense system called Cloud Protector. The Cloud Protector is a trained back propagation neural network (NN), to help detect and filter out DDoS messages. A neural network is a set of connected units made up of input, hidden and output layers [8] [9]. Each of the connections in a neural network has a weight associated with it. In a neural net the focus is on the threshold logic unit (TLU). The TLU inserts input objects into an array of weighted quantities and sums them up to see if they are above the threshold. The cloud protector system is implemented in five different phases as shown in Fig. 2 and described below. Fig. 2: Implementation phases 1) Dataset For Training and Testing The efficiency of the neural network depends on the training data. If the training data is more accurate then performance of trained system will be improved. Therefore collecting of data for training is a critical problem. This can be obtained by three ways as by using real traffic, by using sanitized traffic and by using simulated traffic [9]. The third and the most common way to obtain data are to create a testbed network and generate background traffic on this network. In the testbed environment, background traffic is generated either by using complex traffic generators modeling actual network statistics, or by using simpler commercial traffic generators creating small number of packets at a high rate. Advantage of this approach is that data can be freely distributed as it does not contain any sensitive information. Also, it is guaranteed that generated traffic does not contain any unknown attacks as the background traffic is created by simulators. However difficulties exist when using this approach too. Firstly, it’s very costly and difficult to create a simulation. Secondly, in order to model various networks, different types of traffic is needed. In order to avoid dealing with difficulties of all three approaches, DARPA 1999 attack detection evaluation dataset was used for training/testing data [10]. 2) Preprocessing Dataset The data set is preprocessed so that it may be able to give it as an input to the developed system. This data set
  • 4. consists of numeric and symbolic features and it is converted in numeric form so that it can be given as inputs to required neural network. Now this modified data set is ready to be used as training and testing of the neural network. 3) Determining the NN architecture There is no certain mathematical approach for obtaining the optimum number of hidden layers and their neurons. For choosing optimum set of hidden layers and its no. of neuron a comparison is made for many cases and optimum is selected. III. FDPM MARKING SCHEME A. The Encoding Procedure Before the FDPM mark can be generated, the length of the mark must be determined based on the network protocols deployed within the network to be protected. According to different situations, the mark length could be 24 bits long at most, 19 bits at middle, and 16 bits at least[8][9]. Fig. 3: FPDM encoding procedure B. The Reconstruction Procedure Mark recognition and Address recovery are the two main steps of the reconstruction procedure. The mark recognition step is the reverse process of the encoding process. By reading the control fields in the mark, the length of the mark and which fields in the IP header store the mark can be recognized. If the RF is 0, the mark length is 24 (both TOS and ID are deployed). If the RF is 1, according to different protocols of TOS used, the mark length is 16 or 19. The second step, address recovery, analyzes the mark and stores it in a recovery table. It is a linked-list table; the number of rows is a variable, and the number of columns in the table is k, representing the number of segments used to carry the source address in the packets. Here, the segment number is used to correlate the data into the correct order. The row of the table means the entry and each digest owns one entry (source IP address). Fig. 4: FDPM reconstruction scheme Fig. 4 shows the reconstruction scheme. When all fields in one entry are filled according to the segment number, this source IP address is reconstructed and the entry in the recovery table is then deleted. IV. RESULT AND DISCUSSION A. Training and Testing The result of the Cloud Protector shown in Fig. 5(a, b) demonstrates that on its training sets it detected around 91% of with a miss rating of 9%. Also, against the test dataset, the results slightly varied down by 3% (88% of attack traffic). Fig. 5.a: Training set results
  • 5. Fig. 5.b: testing set results The main issue from the results was that the response time varied significantly from being able to detect the attack traffic within a matter of 20–30 ms to 1 s. One hypothesis is that the dataset was scattered far apart, and so the error ratio within the neural network kept fluctuating. Another hypothesis is that it could be the back propagation. These results are at 4 Neuron Layers, Learning Rate of 0.2, Momentum of 0.6, and a variable threshold of 0.1. B. Evaluation Using DARPA(KDD99) Data Set Using the MIT week-II data set, experiments are set out to test to if CTB could detect the DDoS attack packets that we inserted into the data. Fig. 7 show’s that CTB successfully detected 75-79% of the legitimate traffic in the data set. Fig. 6: Avg. legitimate traffic detected by CTB CTB was able to detect 76-81% of the attack traffic. Fig. 8 results show that only a small number of attack traffic was misidentified, thereby we can conclude CTB can classify what is and is not attack traffic to around 75% accuracy. Fig. 7: Avg. attack traffic detected by CTB V. CONCLUSION The cloud computing model has the ability to scale computer resources on demand, and give users a number of advantages to progress their conventional cluster system. In fact the total cost of going towards cloud is almost zero when resources are not in use. Therefore it is no wonder that academic research and industry are moving towards cloud computing. However, Security should in fact be implemented it along side functionality and performance. One of the most serious threats to cloud computing security itself comes from Distributed Denial of Service attacks. These types of attacks are simple and easy to implement by the attacker, but to security experts they are twice as difficult to stop. So, a solution model is offered to Trace Back through proposed Cloud Trace Back (CTB) to find the source of real attacks, and introduce the use of a back propagation neutral network, called Cloud Protector, which was trained to detect and filter such attack traffic. The result we achieved was around 88% and 91%, for testing and training datasets, respectively. The proposed model’s results show that it is able to detect most of the attack messages within a very short period of time. We also show that CTB can successfully traceback 75-81% In the future, we will be setting up to begin real-time data gathering and testing of Cloud Protector. This will allow us to fine tune CTB to better detect and filter DDoS attacks. REFERENCES [1] Lizhe W. and Gregor V. L.,(2008), “Cloud Computing : a Perspective Study,” New Generation Computing Volume 28, Number 2, 137-146, DOI: 10.1007/s00354-008-0081-5 [2] [2] Bouzida Y, Cuppens F, Gombault S, (2006), “Detecting and Reacting against Distributed Denial of Service Attacks,” IEEE International Conference on Communication, Volume 5. [3] [3] Trostle J, (2006), “protecting Against Distributed Denial of service attacks Using Distributed Filtering,” Securecomm and Workshops, Aug 28 2006- sept1 2006, pp 1-11 [4] [4] Iftikhar A., Azween B. A., Abdullah S.A.,(2009), “Application of Artificial neural Network in Detection of DoS attacks,” SIN’09, Oct 6-10. [5] [5] Bhaskaran M., Natrarajan. A.M. and Sivanandam. S.N.,(2007),” Trace Backing the Spoofed IP Packets in Multi ISP Domains with Secured Communication,” IEEE-ICSCN 2007,pp 579-584.
  • 6. [6] [6] Chonka A, Zhou W, Xiang Y., (2008), “Protecting web services with service oriented Trace Back architecture,” IEEE eighth international conference on computer and information technology, IEEE, 2008a. [7] [7] Chonka A, Xiang Y., Zhou W., Allessio B.,(2010), “Cloud security defence to protect cloud computing against HTTP-DoS and XML –DoS attacks,” Journal of Network and Computer Applications, doi :10.1016/j.jnca.2010.06.004 [8] [8] Belenky A, Ansari N. (2003); “Tracing multiple attackers with deterministic packet marking (DPM),” Proc. IEEE Pacific Rim conference on communications, computers and signal processing, vol. 1, p. 49–52. [9] Xiang X, Zhou W, Guo M. ,(2009), “Flexible deterministic packet marking: an IP Trace Back system to find the real source of attacks,” IEEE Transactions on Parallel and Distributed Systems, Volume 20,No 4, pp 567–80 [10] MIT 1998 DARPA Intrusion Detection Evaluation Data Set http://www.ll.mit.edu/index.html.