[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ Skip to main content

Advertisement

Log in

Detection and prevention of DDoS attacks on M-healthcare sensitive data: a novel approach

  • Original Research
  • Published:
International Journal of Information Technology Aims and scope Submit manuscript

Abstract

In today’s world m-Health (also termed as Mobile Health) is an integral part of the healthcare industry. M-health uses various kinds of mobile devices such as mobile phones, personal digital assistants, tablets, laptops, and wireless-based arrangements to collect and transfer run-time medical data between patients and healthcare institutions. The entire process of the m-healthcare system is dependent on a cloud system. As a result of services provided through the cloud platform, it is observed that network equipment is likely prone to different types of attacks in the system. The most extensively used of these attacks are Distributed Denial of Services (DDoS) attack which can halt the network service instantly and prevent the accessing of sensitive data. The attack can destroy the privacy and security of the data by injecting wrong information into it. The most crucial way in the battle against DDoS attacks is the fast detection and taking apart of network traffic. A novel DDoS detection algorithm is proposed for the early detection of the attack in the system. The DDoS preventive algorithms are designed efficiently to restrict the access of attackers in the system. Further, the effect of the different types of DDoS attacks with their preventive approach experimented in the cloud-based simulation environment. The maximum success of the attacker concerning time is also analyzed as a part of the research paper.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
£29.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price includes VAT (United Kingdom)

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9

Similar content being viewed by others

Explore related subjects

Discover the latest articles, news and stories from top researchers in related subjects.

References

  1. Resende PAA, Drummond AC (2018) A survey of random forest-based methods for intrusion detection systems. ACM Comput Surv 51(3):1–36

    Article  Google Scholar 

  2. Yang L, Zhao H (2019) DDoS attack identification and defense using SDN based on machine learning method”. Int Symp Pervasive Syst Algorithms Netw. https://doi.org/10.1109/I-SPAN.2018.000036

    Article  Google Scholar 

  3. Priyadarshini R, Barik RK (2019) A deep learning-based intelligent framework to mitigate DDoS attack in fog environment. J King Saud Univ Comput Inf Sci. https://doi.org/10.1016/j.jksuci.2019.04.010

    Article  Google Scholar 

  4. Somani G, Gaur MS, Sanghi D, Conti M, Rajarajan M (2017) Scale inside-out: rapid mitigation of cloud DDoS attacks. IEEE Trans Dependable Secure Comput 15(6):959–973

    Article  Google Scholar 

  5. Sharafaldin I, Lashkari AH, Hakak S, Ghorbani AA (2019) Developing realistically distributed denial of service (DDoS) attack dataset and taxonomy. In: 2019 International Carnahan Conference on Security Technology (ICCST), Chennai, India, pp 1–8

  6. Yan Q, Yu FR, Gong Q, Li J (2016) Software-defined networking (sdn) and distributed denial of service (DDoS) attacks in cloud computing environments: a survey, some research issues, and challenges. IEEE Commun Surv Tutor 18(1):602–622

    Article  Google Scholar 

  7. Ko I, Chambers D, Barrett E (2020) Adaptable feature-selecting and threshold-moving complete autoencoder for DDoS flood attack mitigation. J Inf Secur Appl 55:102647

    Google Scholar 

  8. Bhuyan MH, Elmroth E (2018) Multi-scale low-rate DDoS attack detection using the generalized total variation metric”. IEEE Int Conf Mach Learn Appl. https://doi.org/10.1109/ICMLA.2018.00170

    Article  Google Scholar 

  9. Cambiaso E, Papaleo G, Chiola G, Aiello M (2015) Designing and modeling the slow next DoS attack. Computational intelligence in security for information systems conference. Springer, Berlin, pp 249–259

    Google Scholar 

  10. Hosseini S, Azizi M (2019) The hybrid technique for DDoS detection with supervised learning algorithms. Comput Netw 158:35–45. https://doi.org/10.1016/j.comnet.2019.04.027

    Article  Google Scholar 

  11. Alrehan AM, Alhaidari FA (2019) Machine learning techniques to detect DDoS attacks on VANET system: a survey. Int Conf Comput Appl Inf Secur. https://doi.org/10.1109/CAIS.2019.8769454

    Article  Google Scholar 

  12. Fulber Garcia V, De Freitas Gaiardo G, Da Cruz Marcuzzo L, Ceretta Nunes R, Paula Dos Santos CR (2018) DeMONS: a DDoS Mitigation NFV Solution. In: Proceedings of the Proceedings—International Conference on Advanced Information Networking and Applications (AINA), Krakow, Poland, 16–18 May 2018, pp 769–776

  13. Dehkordi AB, Soltanaghaei MR, Boroujeni FZ (2020) The DDoS attacks detection through machine learning and statistical methods in SDN. J Supercomput 77:2383–2415

    Article  Google Scholar 

  14. Harrou F, Bouyeddou B, Sun Y, Kadri B (2018) A method to detect dos and ddos attacks based on generalized likelihood ratio test. In: International Conference on Applied Smart Systems, Medea, Algeria, 24–25, November 2018

  15. Saad RM, Anbar M, Manickam S, Alomari E (2016) An intelligent icmpv6 DDoS flooding-attack detection framework (v6iids) using back-propagation neural network. IETE 33:1–12

    Google Scholar 

  16. Rahmani, AM, Thanigaivelan NK, Gia TN, Granados J, Negas B, Liljeberg P, Tenhunen H (2015) Smart e-health gateway: bringing intelligence to Internet-of-Things-based ubiquitous healthcare systems. In: Proceedings of the Annual IEEE Consumer Communications and Networking Conference. NV, USA: IEEE, January 2015

  17. Rodrigues B, Bocek T, Stiller B (2017) Enabling a Cooperative, Multi-domain DDoS Defense by a Blockchain Signaling System (BloSS). In: 43rd IEEE Conference on Local Computer Networks (LCN2018), Demonstration Track, Singapore, Singapore, October 2017, pp 1–3

  18. Zhang J, Xue N, Huang X (2016) A secure system for pervasive social network-based healthcare. IEEE Access 4:9239–9250

    Article  Google Scholar 

  19. Wei Q, Wu Z, Ren K, Wang Q (2016) An open flow user-switch remapping approach for DDoS defense. KSII Trans Internet Inf Syst 10(9):4529–4548

    Google Scholar 

  20. Giotis K, Apostolaki M, Maglaris V (2016) A reputation-based collaborative schema for the mitigation of distributed attacks in sdn domains. In: IEEE/IFIP Network Operations and Management Symposium, 2016

  21. Zhang G, Parashar M (2006) Cooperative defense against DDoS attacks. J Res Pract Inf Technol 38(1):69–84

    Google Scholar 

  22. Rashidi B, Fung C, Bertino E (2017) A collaborative DDoS defence framework using network function virtualization. IEEE Trans Inf Forensics Secur 12(10):2483–2497

    Article  Google Scholar 

  23. Giri N, Jaisinghani R, Kriplani R, Ramrakhyani T, Bhatia V (2019) Distributed Denial of Service (DDoS) mitigation in software defined network using blockchain. In: Proceedings of the 3rd International Conference on I-SMAC IoT in Social, Mobile, Analytics and Cloud (I-SMAC), Palladam, India, 12–14 December 2019, pp 673–678

  24. Al-Sakran H, Alharbi Y, Serguievskaia I (2019) Framework architecture for securing IoT using blockchain, smart contract and software defined network technologies. In: Proceedings of the 2019 2nd International Conference on New Trends in Computing Sciences (ICTCS), Amman, Jordan, 9–11 October 2019

  25. Alkadi O, Moustafa N, Turnbull B (2020) A review of intrusion detection and blockchain applications in the cloud: approaches, challenges, and solutions. IEEE Access 8:104893–104917

    Article  Google Scholar 

  26. Abou El Houda Z, Hafid AS, Khoukhi L (2019) Cochain-SC: an intra-and inter-domain ddos mitigation scheme based on blockchain using SDN and smart contract. IEEE Access 7:98893–98907

    Article  Google Scholar 

  27. Wang A, Chang W, Chen S, Mohaisen A (2020) A data-driven study of DDoS attacks and their dynamics. IEEE Trans Dependable Secure Comput 17:648–661

    Google Scholar 

  28. Wani AR, Rana QP, Saxena U, Pandey N (2019) Analysis and detection of DDoS attacks on cloud computing environment using machine learning techniques. Amity Int Conf Artif Intell. https://doi.org/10.1109/AICAI.2019.8701238

    Article  Google Scholar 

  29. Yu G, Li T, Wei J, Liu C (2017) Assessment of reduction of quality attacks on mobile IP networks. IEEE Int Symp Parallel Distrib Process Appl IEEE Int Conf Ubiquitous Comput Commun. https://doi.org/10.1109/ISPA/IUCC.2017.00073

    Article  Google Scholar 

  30. Jia B, Ma Y, Huang X, Lin Z, Sun Y (2016) A novel real-Time DDoS attack detection mechanism based on MDRA algorithm in big data. Math Probl Eng. https://doi.org/10.1155/2016/1467051

    Article  MathSciNet  MATH  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Soumya Ray.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Ray, S., Mishra, K.N. & Dutta, S. Detection and prevention of DDoS attacks on M-healthcare sensitive data: a novel approach. Int. j. inf. tecnol. 14, 1333–1341 (2022). https://doi.org/10.1007/s41870-022-00869-1

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s41870-022-00869-1

Keywords

Navigation