[HTML][HTML] A deep learning based intelligent framework to mitigate DDoS attack in fog environment

R Priyadarshini, RK Barik - Journal of King Saud University-Computer and …, 2022 - Elsevier
R Priyadarshini, RK Barik
Journal of King Saud University-Computer and Information Sciences, 2022Elsevier
Fog computing (FC) is a contemporary computing paradigm that gives additional support to
cloud environment by carrying out some local data analysis in edge of the devices,
facilitating networking, computing, infrastructure and storage support as backbone for end
user computing. Still enterprises are not convinced to use this as security and privacy are
most of the open and challenging issues. Availability among the security requirements is the
one which is about rendering on demand service to different client applications without any …
Abstract
Fog computing (FC) is a contemporary computing paradigm that gives additional support to cloud environment by carrying out some local data analysis in edge of the devices, facilitating networking, computing, infrastructure and storage support as backbone for end user computing. Still enterprises are not convinced to use this as security and privacy are most of the open and challenging issues. Availability among the security requirements is the one which is about rendering on demand service to different client applications without any disruptions. It can often be demolished by Denial of service (DoS) and distributed denial of service (DDoS) attacks in fog and cloud computing environment. In this paper we propose a novel Source based DDoS defence mechanism which can be used in fog environment as well as the cloud environment to mitigate DDoS attacks. It makes use of Software Defined Network (SDN) to deploy the DDoS defender module at SDN controller to detect the anomalous behavior of DDoS attacks in Network/Transport level. The proposed work provides deep learning (DL) based detection method which makes use of the network traffic analysis mechanisms to filter and forward the legitimate packets to the server and can block the infected packets to cause further attacks.
Elsevier
以上显示的是最相近的搜索结果。 查看全部搜索结果