DSpace Repository

Detecting Different Attack Instances of DDoS Vulnerabilities on Edge Network of Fog Computing using Gaussian Naive Bayesian Classifier

Show simple item record

dc.contributor.author Dua, Amit
dc.contributor.author Gupta, Shashank
dc.date.accessioned 2024-10-29T09:22:17Z
dc.date.available 2024-10-29T09:22:17Z
dc.date.issued 2020
dc.identifier.uri https://ieeexplore.ieee.org/abstract/document/9145195
dc.identifier.uri http://dspace.bits-pilani.ac.in:8080/jspui/handle/123456789/16275
dc.description.abstract Fog computing generally uses the host's resources instead of acquiring resources from remote PC leading to less latency problems and moreover, improving the performance which makes it more competent. Distributed denials of service (DDOS) attack exhausts the existing resources which make the services inaccessible to genuine users. DDoS has deep impact on the computer networks. As a cyber-threat, it compromises the standard performance of the organization by Internet protocol (IP) spoofing, overflow of bandwidth, memory space consumption and leading to immense loss. DoS attacks are a great threat to computerized association. Primary objective of any defense system for DoS is knowledge that it exists, preferably as early prior to accumulation of attack traffic. In case of large traffic inflow to an attacked server, it is essential to categorize the legitimate acquisitions and intrusions. In this work, the authors present a model that draws out the key parameters from requests in traffic for DDoS attack recognition in fog network. It benefits from existing data, and presents competent algorithms to detect and predict most probable cases. Authors have used Bayesian Network to calculate the conditional probabilities to decide whether the new packet is normal or intruded. A log of the path of the attacker is maintained in a VHD so as to easily detect attacks that have previously occurred. Having both the systems in place, the false positives of DDoS attacks detection have decreased immensely which has been observed through the implementation of this experiment. en_US
dc.language.iso en en_US
dc.publisher IEEE en_US
dc.subject Computer Science en_US
dc.subject Bayesian Networks (BN) en_US
dc.subject Virtual Honeypot Devices en_US
dc.subject Fog Computing en_US
dc.subject Markov model en_US
dc.title Detecting Different Attack Instances of DDoS Vulnerabilities on Edge Network of Fog Computing using Gaussian Naive Bayesian Classifier en_US
dc.type Article en_US


Files in this item

Files Size Format View

There are no files associated with this item.

This item appears in the following Collection(s)

Show simple item record

Search DSpace


Advanced Search

Browse

My Account