1. Application of soft computing techniques and software defined networks for detection of fraudulent resource consumption attacks: A comprehensive review.
- Author
-
Shinde, Amar and Bhingarkar, Sukhada
- Subjects
- *
SOFTWARE-defined networking , *SOFT computing , *CLOUD computing , *ENERGY consumption , *MACHINE learning - Abstract
With most businesses increasing its dependency on the internet, it has become largely evident that several resources will be required to be either constructed or hired to sustain the growing needs of their businesses. Here comes the main requirement of usage of hired services like cloud computing which can be hired by many businesses for their continuous growth and sustenance. With the growing number of inventions and discoveries in the field of cyber-security, large number of attacks are also possible on the cyber assets. Cloud computing architecture is also no exception and is vulnerable with different breeds of attacks which threaten the utility of the cloud. Cloud computing architecture and the services it provides on cloud mainly use the feature of pay as you use with many of the services being auto scaled to a larger extent thereby required to maintain the flexibility for any growing business with a larger customer base. There are various fraudulent threats related to the energy utilization that attempt to exploit the elasticity of the cloud and the multi-tenant model it provides. In addition, with the rapid development in technologies, the networking systems are becoming complex which requires a detailed study on the various detection and mitigation techniques that are available against the different breeds of attacks on cloud paradigm. In this paper, an attempt is made to compile in detail various detection and mitigation techniques against a variant of DDoS called the fraudulent resource consumption (FRC) attacks. It also considers the review of different techniques applied in machine learning that train the models for detecting the attacks. This paper also provides the review of the studies based on use of SDN technique used for detecting these attacks using its inbuilt features. The paper concludes by proposing a set of recommendations for future studies concerning the identification and prevention of FRC attacks, leveraging SDN and machine learning. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF