INTERNATIONAL JOURNAL OF APPLIED SCIENCES AND MATHEMATICAL THEORY (IJASMT )

E- ISSN 2489-009X
P- ISSN 2695-1908
VOL. 11 NO. 3 2025
DOI: 10.56201/ijasmt.vol.11.no3.2025.pg14.24


Real-Time Traffic Analysis and Filtering for Dos Attacks Detection and Mitigation in Cloud Environment

Dumnamene JS Sako, James Tonye Amachree, Joy Tochukwu Nnodi


Abstract


This paper proposed a system that detects and mitigates DoS attacks in the cloud in real time. Known DoS attacks in the Internet generally conquer the target by exhausting its resources, that can be anything related to network computing and service performance. This necessitates robust mitigation strategies capable of defending against a diverse array of attack vectors in real time. This response significantly reduces the impact of DOS attacks and safeguards cloud resources from resource exhaustion attacks. The system uses statistical analysis, payload and signature-based capturing and pattern matching algorithms to recognize malicious activities within the network traffic. Modular system architecture enables dynamic adaptation to new attack methods through Python's filtering capabilities. A user-friendly web interface empowers security personnel with real-time attack monitoring and visualization tools. By integrating real-time analysis, advanced filtering, user-centric design, and scalability, this comprehensive DoS mitigation system offers a robust defense against evolving threats, ensuring the uninterrupted operation of critical cloud services.


keywords:

DoS mitigation, Network traffic filtering, real-time analysis, cloud computing.


References:


Ali, M., Khan, S.U., & Vasilakos, A.V. (2015). Security in cloud computing: Opportunities and
challenges. Inform. Sci. 305, 357–383. http://dx.doi.org/10.1016/j.ins.2015.01.025.
Bamasag, O., Alsaeedi, A., Munshi, A., Alghazzawi, D., Alshehri, S., and Jamjoom, A. (2022).
Real-time ddos flood attack monitoring and detection (RT-AMD) model for cloud
computing. PeerJ Comput. Sci. 7, e814. http://dx.doi.org/10.7717/peerj-cs.814.
Behal, S. and Kumar, K. (2017). Detection of DDoS attacks and flash events using novel
information theory metrics, Computer Networks, 116(4), 96–110.
Cheng, J., Yin, J., Wu, C., Zhang, B. and Liu, Y. (2009). DDoS attack detection method based
on linear prediction model, Emerging Intelligent Computing Technology and
Applications,1004–1013, Springer, Berlin Heidelberg.
Deshmukh RV, Devadkar K. Understanding DDoS attack & its effect in cloud environment.
Procedia Comput Sci 2015;49:202–10. doi: 10.1016/j.procs. 2015.04.245 .
Gu, Q. and Liu, P. (n.d.), Denial of Service Attacks, Accessed: 12-Jan-2025
https://s2.ist.psu.edu/paper/ddos-chap-gu-june-07.pdf
Jacques, S. and Christe, B. (2020), Information technology, In Introduction to Clinical
Engineering, Academic Press, 109-126, https://doi.org/10.1016/B978-0-12-818103-
4.00005-3.
Lundqvist, A. and landsberg, J. (n.d.). DoS Mitigation using Proof of Work. Accessed: 12-Jan-
2025
https://www.csc.kth.se/utbildning/kth/kurser/DD143X/dkand12/Group5Mikael/final/
Jonatan_Landsberg_and_Anton_Lundqvist.pdf
Ouhssini, M., Afdel, K., Agherrabi, E., Akouhar, M., and Abarda, A. (2024). DeepDefend: A
comprehensive framework for DDoS attack detection and prevention in cloud
computing, Journal of King Saud University - Computer and Information Sciences, 36.
Poonam Gupta, P. & Om Prabha, M.I. (2022). IoT in healthcare ecosystem, In Advances in
Biomedical Information, Applications of Computational Intelligence in Multi-
Disciplinary Research, Academic Press, 187-204, https://doi.org/10.1016/B978-0-12-
823978-0.00003-4.
Jazi, H.H., Gonzalez, H., Stakhanova, N. and Ghorbani, A.A. (2017) Detecting http-based
application layer DoS attacks on web servers in the presence of sampling, Computer
Networks, 121, (7) 25–36.
Sachdeva, M., Kumar, K. and Singh, G. (2016) A comprehensive approach to discriminate
DDoS attacks from flash events’, Journal of Information Security and Applications, 26
(2), 8–22.
Sharma, A., Pujari, A.K. and Paliwal, K.K. (2007). Intrusion detection using text processing
techniques with a kernel based similarity measure, Computers & Security, 26(7–
8),488–495.
Shidaganti, G.I., Inamdar, A. S., Rai, S.V., & Rajeev, A.M. (2020). SCEF: A model for
prevention of ddos attacks from the cloud. Int. J. Cloud Appl. Comput. 10 (3), 67–81.
http://dx.doi.org/10.4018/IJCAC.2020070104.
Shiravi, A., Shiravi, H., Tavallaee, M., & Ghorbani, A.A. (2012). Toward developing a
systematic approach to generate benchmark datasets for intrusion detection, Computers
& Security, 31(3), 357-374, https://doi.org/10.1016/j.cose.2011.12.012.
Susnjara, S. and Smalley, I. (n.d.). What is cloud computing? Accessed: 10-Jan-2025
https://www.ibm.com/think/topics/cloud-
computing#:~:text=Cloud%20computing%20is%20the%20on,pay%2Dper%2Duse%
20pricing.
Yan, Q., Yu, F. R., Gong, Q., & Li, J. (2015). Software-defined networking (SDN) and
distributed denial of service (ddos) attacks in cloud computing environments: A survey,
some
research
issues,
and
challenges.
IEEE
Comm.
Surv.
Tutor.
http://dx.doi.org/10.1109/COMST.2015.2487361.
Zargar, S.T., Joshi, J. and Tipper, D. (2013).A survey of defense mechanisms against
distributed denial of service (DDoS) flooding attacks, IEEE Communications Surveys
& Tutorials,15(4), 2046–2069.


DOWNLOAD PDF

Back


Google Scholar logo
Crossref logo
ResearchGate logo
Open Access logo
Google logo