Abstract
A denial of service attack becomes a major security issue in the network service provisioning. New worm detection methods are not capable to analyze and detect exponentially rising abnormal traffic patterns. In this paper, a new method called an integrated quantum flow and hidden Markov chain approach (IQF-HMC) is introduced in the internet service provisioning. The Quantum flow measured network traffic with features of origination source, nature of the data traffic, and time duration. The standard classes of traffic pattern are evaluated with training sample and the entropy of test traffic data flow patterns are analyzed and compared to detect and resist the abnormal traffic flooding attack. In addition, the quantum phase shift is done on incoming data traffic pattern enables the server to identify the abnormal cross traffic. After that, hidden Markov chain (HMC) is integrated with quantum flow model to restrict the propagation of uncontrolled malicious traffic by camouflage-Worm. Hidden Markov chain adapted a dynamic Bayesian network to evaluate the camouflaging worm propagation with optimal nonlinear filtering. This integrated method improves the performance of the secured network communication in the internet scenario. The performance parameters are DDoS flood attack resistance rate, execution time, true positive rate and memory utilization.
Similar content being viewed by others
References
Antikainen, M., Aura, T., Särelä, M.: Denial-of-service attacks in bloom-filter-based forwarding. IEEE/ACM Trans. Networ. 22(5), 1463–1476 (2014)
Francois, J., Aib, I., Boutaba, R.: FireCol: a collaborative protection network for the detection of flooding DDoS attacks. IEEE/ACM Trans. Networking 20(6), 1–14 (2012)
Lu, Z., Wang, W., Wang, C.: Camouflage traffic: minimizing message delay for smart grid applications under jamming. IEEE Trans. Dependable Secure Comput. 12(1), 31–44 (2015)
Merlo, A., Migliardi, M., Gobbo, N., Palmieri, F., Castiglione, A.: A denial of service attack to UMTS networks using SIM-less devices. IEEE Trans. Dependable Secure Comput. 11(3), 280–291 (2014)
Bedi, Harkeerat, Roy, Sankardas, Shiva, Sajjan: Mitigating congestion based DoS attacks with an enhanced AQM 4 technique. Comput. Commun. 56, 60–73 (2015)
Saied, A., Overill, R.E., Radzik, T.: Detection of known and unknown DDoS attacks using artificial neural networks. Neurocomputing 172, 385–393 (2016)
Xu, K., Shen, M., Cui, Y., Ye, M., Zhong, Y.: A model approach to the estimation of peer-to-peer traffic matrices. IEEE Trans. Parall. Distrib. Syst. 25(5), 1101–1111 (2014)
Ho, P.F., Kam, Y.H.S., Wee, M.C., Chong, Y.N., Por, L.Y.: Preventing shoulder-surfing attack with the concept of concealing the password objects’ information. Sci. World J. 2014, 1–12 (2014)
Jantila, Saksit, Chaipah, Kornchawal: A security analysis of a hybrid mechanism to defend DDoS attacks in SDN. Proc. Comput. Sci. 86, 437–440 (2016)
Feng, L., Song, L., Zhao, Q., Wang, H.: Modeling and stability analysis of worm propagation in wireless sensor network. Math. Prob. Eng. 2015, 1–8 (2015)
Patel, D.A., Patel, H.: Detection and mitigation of DDOS attack against web server. Int. Journal of Eng. Dev. Res. 2(2), 1767–1776 (2014)
Mazur, K., Ksiezopolski, B., Nielek, R.: Multilevel modeling of distributed denial of service attacks in wireless sensor networks. J. Sensors 2016, 1–13 (2016)
Ozcelik, Ilker, Brooks, Richard R.: Deceiving entropy based DoS detection. Comput. Secur. 48, 234–245 (2015)
Saleh, M.A., Manaf, A.A.: A novel protective framework for defeating HTTP-based denial of service and distributed denial of service attacks. Sci. World J. 2015, 1–19 (2014)
Dao, N.N., Kim, J., Park, M., Cho, S.: Adaptive suspicious prevention for defending DoS attacks in SDN-based convergent networks. PLoS ONE J. 11(8), 1–24 (2016)
Selvaraj, D., Ganapathi, P.: Packet payload monitoring for internet worm content detection using deterministic finite automaton with delayed dictionary compression. J. Comput. Netw. Commun. 2014, 1–9 (2014)
Lu, L., Hussain, M.J., Luo, G., Han, Z.: Pworm: passive and real-time wormhole detection scheme for WSNs. Int. J. Distributed Sensor Netw. 2015, 1–17 (2015)
Deka, R.K., Bhattacharyya, D.K.: Self-similarity based DDoS attack detection using Hurst parameter. Secur. Commun. Netw. 9, 1–14 (2016)
Mishra, B.K., Keshri, N.: Mathematical model on the transmission of worms in wireless sensor network. Appl. Math. Model. 37, 4103–4111 (2013)
Nagulancha, T., Kurma, L.: On modelling of camouflaging worm. Int. J. Emerg. Technol. Comput. Sci. Electr. 11(3), 73–77 (2014)
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Saranya, R., Kannan, S.S. & Sundaram, S.M. Integrated quantum flow and hidden Markov chain approach for resisting DDoS attack and C-Worm. Cluster Comput 22 (Suppl 6), 14299–14310 (2019). https://doi.org/10.1007/s10586-018-2288-7
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s10586-018-2288-7