DDoS Malicious Node Detection by Jaccard and Page Rank Algorithm in Cloud Environment

  IJCTT-book-cover
 
International Journal of Computer Trends and Technology (IJCTT)          
 
© 2021 by IJCTT Journal
Volume-69 Issue-5
Year of Publication : 2021
Authors : Adil Hussain Mohammed
  10.14445/22312803/IJCTT-V69I5P108

MLA Style: 
Adil Hussain Mohammed. "DDoS Malicious Node Detection by Jaccard and Page Rank Algorithm in Cloud Environment."  International Journal of Computer Trends and Technology,  vol. 69, no. 5, May. 2021, pp.55-59. Crossref https://doi.org/ 10.14445/22312803/IJCTT-V69I5P108

APA Style:   
Adil Hussain Mohammed 
(2021) . DDoS Malicious Node Detection by Jaccard and Page Rank Algorithm in Cloud Environment.  International Journal of Computer Trends and Technology , 69(5), 55-59. https://doi.org/ 10.14445/22312803/IJCTT-V69I5P108

Abstract
Cloud infrastructure increases the strength of service and product based companies by serving more users with limited infrastructure. Many of researcher are working to improve the security of vulnerable cloud infrastructure. This paper has proposed a trust based model for detection of DDoS attacked malicious nodes in the network. Based on node resource uses in the network a belief was developed by the cloud bridge. Further paper evaluates jaccard coefficient trust value based on transaction happens between nodes. This jaccard coefficient is social feature calculate as per node behavior with all other nodes. Finally a cumulative trust was estimate by page rank method using jaccard and initial belief model. Experiment was done on DDoS attack network. Result shows that proposed model has increases the malicious node detection.

Keywords
Cloud computing, Jaccard Coefficient, Page Rank, Classification, Trust Model.

Reference

[1] Manoj, K., Manglem, S. CBMIR: Content based medical image retrieval system using texture and intensity for eye images. International Journal of Scientific & Engineering Research, (2016).
[2] J. Heiser, and M. Nicolett, Accessing the Security Risks of Cloud Computing, G00157782, Gartner, Inc., Stamford, CT,(2008).
[3] M. Armbrust, A. Fox, It Griffith, et al., Above the Clouds: A Berkeley View of Cloud Computing, University of California Berkeley, Berkeley, CA, (2009).
[4] Zhang, Y. & Joshi, J. Access Control and Trust Management for Emerging Multidomain Environments. Annals of Emerging Research in Information Assurance, Security and Privacy Services, S. Upadhyay and R.O. Rao (eds.), Emerald Group Publishing, (2009) 421-452.
[5] Tingwei Chen, China Jing Lei. Research on Service Reputation Evaluation Method Based on Cloud Model. International Journal of Intelligent Information Systems 4(1) (2015) 8-15.
[6] I. Odun-Ayo, M. Ananya, F. Agono and R. Goddy-Worlu, Cloud Computing Architecture: A Critical Analysis, 2018 18th International Conference on Computational Science and Applications (ICCSA), Melbourne, VIC,( 2018).
[7] Rafey S.E.A., Abdel-Hamid A., El-Nasr M.A. CBSTM-IoT: Contextbased social trust model for the Internet of Things; Proceedings of the 2016 International Conference on Selected Topics in Mobile & Wireless Networking (MoWNeT); Cairo, Egypt. 11–13 (2016)1–8.
[8] Chen Z., Ling R., Huang C.M., Zhu X. A scheme of access service recommendation for the Social Internet of Things. Int. J. Commun. Syst.( 2016).
[9] Peiyun Zhang, Senior Member, IEEE, Yang Kong, And Mengchu Zhou. A Domain Partition-Based Trust Model For Unreliable Clouds. IEEE Transactions On Information Forensics And Security, 13( 9)(2018).
[10] T. F. J.-M. Pasquier, J. Singh, D. Eyers, and J. Bacon, Cam_ow: Managed data-sharing for cloud services, IEEE Trans. Cloud Comput., 5( 3)(2017)472-484.
[11] Z. Wu, X.-Y. Chen, and X.-H. Du, Enhancing sensitive data security based-on double-layer information _ow controlling in the cloud, Acta Electron. Sinica, 46( 9)(2018) 2245-2250.
[12] N. E. Moussaid and M. E. Azhari, Enhance the security properties and information _ow control, Int. J. Electron. Bus., 15(3)(2020) 249-274.
[13] X. Lu, L. Cao, and X. Du, Dynamic control method for tenants sensitive information _ow based on virtual boundary recognition,IEEE Access, 8(2020)162548-162568.
[14] Omar Abdel Wahab, Jamal Bentahar, HadiOtrok, and Azzam Mourad. Optimal Load Distribution for the Detection of VM-based DDoS Attacks in the Cloud. IEEE Transaction, Services Computing ( 2020).
[15] Talal H Noor Quan Z Sheng Abdullah AlfaziJeriel Law and Anne HH Ngu Identifying fake feedback for effective trust management in cloud environments in Service Oriented Computing (2013) 47- 58.
[16] P. Jaccard. Etude comparative de la distribution orale dans une portion des alpes et des jura.Bulletin de la SocieteVaudoise des Science Naturelles, 37( 1901).
[17] Larry, PageRank: Bringing Order to the Web. Archived from the original on May 6,( 2002).
[18] Subburaj.V, & Srinivasan.M, & Surendiran, R & Sundaranarayanan, R. (2010). DDoS Defense Mechanism by Applying Stamps using Cryptography. International Journal of Computer Applications. 1(6), ISSN: 0975 – 8887, pp.48-52. DOI: 10.5120/143-262.