Skip to main content
Log in

Integrated quantum flow and hidden Markov chain approach for resisting DDoS attack and C-Worm

  • Published:
Cluster Computing Aims and scope Submit manuscript

Abstract

A denial of service attack becomes a major security issue in the network service provisioning. New worm detection methods are not capable to analyze and detect exponentially rising abnormal traffic patterns. In this paper, a new method called an integrated quantum flow and hidden Markov chain approach (IQF-HMC) is introduced in the internet service provisioning. The Quantum flow measured network traffic with features of origination source, nature of the data traffic, and time duration. The standard classes of traffic pattern are evaluated with training sample and the entropy of test traffic data flow patterns are analyzed and compared to detect and resist the abnormal traffic flooding attack. In addition, the quantum phase shift is done on incoming data traffic pattern enables the server to identify the abnormal cross traffic. After that, hidden Markov chain (HMC) is integrated with quantum flow model to restrict the propagation of uncontrolled malicious traffic by camouflage-Worm. Hidden Markov chain adapted a dynamic Bayesian network to evaluate the camouflaging worm propagation with optimal nonlinear filtering. This integrated method improves the performance of the secured network communication in the internet scenario. The performance parameters are DDoS flood attack resistance rate, execution time, true positive rate and memory utilization.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6

Similar content being viewed by others

References

  1. Antikainen, M., Aura, T., Särelä, M.: Denial-of-service attacks in bloom-filter-based forwarding. IEEE/ACM Trans. Networ. 22(5), 1463–1476 (2014)

    Article  Google Scholar 

  2. Francois, J., Aib, I., Boutaba, R.: FireCol: a collaborative protection network for the detection of flooding DDoS attacks. IEEE/ACM Trans. Networking 20(6), 1–14 (2012)

    Article  Google Scholar 

  3. Lu, Z., Wang, W., Wang, C.: Camouflage traffic: minimizing message delay for smart grid applications under jamming. IEEE Trans. Dependable Secure Comput. 12(1), 31–44 (2015)

    Article  MathSciNet  Google Scholar 

  4. Merlo, A., Migliardi, M., Gobbo, N., Palmieri, F., Castiglione, A.: A denial of service attack to UMTS networks using SIM-less devices. IEEE Trans. Dependable Secure Comput. 11(3), 280–291 (2014)

    Article  Google Scholar 

  5. Bedi, Harkeerat, Roy, Sankardas, Shiva, Sajjan: Mitigating congestion based DoS attacks with an enhanced AQM 4 technique. Comput. Commun. 56, 60–73 (2015)

    Article  Google Scholar 

  6. Saied, A., Overill, R.E., Radzik, T.: Detection of known and unknown DDoS attacks using artificial neural networks. Neurocomputing 172, 385–393 (2016)

    Article  Google Scholar 

  7. Xu, K., Shen, M., Cui, Y., Ye, M., Zhong, Y.: A model approach to the estimation of peer-to-peer traffic matrices. IEEE Trans. Parall. Distrib. Syst. 25(5), 1101–1111 (2014)

    Article  Google Scholar 

  8. Ho, P.F., Kam, Y.H.S., Wee, M.C., Chong, Y.N., Por, L.Y.: Preventing shoulder-surfing attack with the concept of concealing the password objects’ information. Sci. World J. 2014, 1–12 (2014)

    Article  Google Scholar 

  9. Jantila, Saksit, Chaipah, Kornchawal: A security analysis of a hybrid mechanism to defend DDoS attacks in SDN. Proc. Comput. Sci. 86, 437–440 (2016)

    Article  Google Scholar 

  10. Feng, L., Song, L., Zhao, Q., Wang, H.: Modeling and stability analysis of worm propagation in wireless sensor network. Math. Prob. Eng. 2015, 1–8 (2015)

    MathSciNet  MATH  Google Scholar 

  11. Patel, D.A., Patel, H.: Detection and mitigation of DDOS attack against web server. Int. Journal of Eng. Dev. Res. 2(2), 1767–1776 (2014)

    Google Scholar 

  12. Mazur, K., Ksiezopolski, B., Nielek, R.: Multilevel modeling of distributed denial of service attacks in wireless sensor networks. J. Sensors 2016, 1–13 (2016)

    Article  Google Scholar 

  13. Ozcelik, Ilker, Brooks, Richard R.: Deceiving entropy based DoS detection. Comput. Secur. 48, 234–245 (2015)

    Article  Google Scholar 

  14. Saleh, M.A., Manaf, A.A.: A novel protective framework for defeating HTTP-based denial of service and distributed denial of service attacks. Sci. World J. 2015, 1–19 (2014)

    Article  Google Scholar 

  15. Dao, N.N., Kim, J., Park, M., Cho, S.: Adaptive suspicious prevention for defending DoS attacks in SDN-based convergent networks. PLoS ONE J. 11(8), 1–24 (2016)

    Article  Google Scholar 

  16. Selvaraj, D., Ganapathi, P.: Packet payload monitoring for internet worm content detection using deterministic finite automaton with delayed dictionary compression. J. Comput. Netw. Commun. 2014, 1–9 (2014)

    Article  Google Scholar 

  17. Lu, L., Hussain, M.J., Luo, G., Han, Z.: Pworm: passive and real-time wormhole detection scheme for WSNs. Int. J. Distributed Sensor Netw. 2015, 1–17 (2015)

    Google Scholar 

  18. Deka, R.K., Bhattacharyya, D.K.: Self-similarity based DDoS attack detection using Hurst parameter. Secur. Commun. Netw. 9, 1–14 (2016)

    Article  Google Scholar 

  19. Mishra, B.K., Keshri, N.: Mathematical model on the transmission of worms in wireless sensor network. Appl. Math. Model. 37, 4103–4111 (2013)

    Article  MathSciNet  Google Scholar 

  20. Nagulancha, T., Kurma, L.: On modelling of camouflaging worm. Int. J. Emerg. Technol. Comput. Sci. Electr. 11(3), 73–77 (2014)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to R. Saranya.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Saranya, R., Kannan, S.S. & Sundaram, S.M. Integrated quantum flow and hidden Markov chain approach for resisting DDoS attack and C-Worm. Cluster Comput 22 (Suppl 6), 14299–14310 (2019). https://doi.org/10.1007/s10586-018-2288-7

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10586-018-2288-7

Keywords

Navigation