Algorithm for Secure Hybrid Cloud Design Against DDoS Attacks

被引:2
|
作者
Bhardwaj, Akashdeep [1 ]
Goundar, Sam [2 ]
机构
[1] Univ Petr & Energy Studies, Dehra Dun, Uttar Pradesh, India
[2] Victoria Univ Wellington, Informat Syst, Wellington, New Zealand
关键词
Algorithm; Cloud Computing; Data Center; DDoS; DDoS Mitigation; Defense in Depth; Hybrid Cloud; Multiple Tiers; Network Architecture; Three Tier;
D O I
10.4018/IJITWE.2018100104
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This article describes how cloud computing has become a significant IT infrastructure in business, government, education, research, and service industry domains. Security of cloud-based applications, especially for those applications with constant inbound and outbound user traffic is important. It becomes of the utmost importance to secure the data flowing between the cloud application and user systems against cyber criminals who launch Denial of Service (DoS) attacks. Existing research related to cloud security focuses on securing the flow of information on servers or between networks but there is a lack of research to mitigate Distributed Denial of Service attacks on cloud environments as presented by Buyya et al. and Fachkha, et al. In this article, the authors propose an algorithm and a Hybrid Cloud-based Secure Architecture to mitigate DDoS attacks. By proposing a three-tier cloud infrastructure with a two-tier defense system for separate Network and Application layers, the authors show that DDoS attacks can be detected and blocked before reaching the infrastructure hosting the Cloud applications.
引用
收藏
页码:61 / 77
页数:17
相关论文
共 50 条
  • [1] Using SDN Approach to Secure Cloud Servers Against Flooding Based DDoS Attacks
    Guesmi, Houda
    Saidane, Leila Azouz
    [J]. 2017 25TH INTERNATIONAL CONFERENCE ON SYSTEMS ENGINEERING (ICSENG), 2017, : 309 - 315
  • [2] A Hybrid Intrusion Detection Architecture for Defense against DDoS Attacks in Cloud Environment
    Gupta, Sanchika
    Horrow, Susmita
    Sardana, Anjali
    [J]. CONTEMPORARY COMPUTING, 2012, 306 : 498 - 499
  • [3] A Dynamic Hybrid Timeout Method to Secure Flow Tables Against DDoS Attacks in SDN
    Sooden, Balram
    Abbasi, Mohammad Reza
    [J]. 2018 FIRST INTERNATIONAL CONFERENCE ON SECURE CYBER COMPUTING AND COMMUNICATIONS (ICSCCC 2018), 2018, : 29 - 34
  • [4] Hybrid Algorithm to Detect DDoS Attacks in VANETs
    Adhikary, Kaushik
    Bhushan, Shashi
    Kumar, Sunil
    Dutta, Kamlesh
    [J]. WIRELESS PERSONAL COMMUNICATIONS, 2020, 114 (04) : 3613 - 3634
  • [5] Hybrid Algorithm to Detect DDoS Attacks in VANETs
    Kaushik Adhikary
    Shashi Bhushan
    Sunil Kumar
    Kamlesh Dutta
    [J]. Wireless Personal Communications, 2020, 114 : 3613 - 3634
  • [6] Analysis of DDoS Attacks and an Introduction of a Hybrid Statistical Model to Detect DDoS Attacks on Cloud Computing Environment
    Girma, Anteneh
    Garuba, Moses
    Li, Jiang
    Liu, Chunmei
    [J]. 2015 12TH INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY - NEW GENERATIONS, 2015, : 212 - 217
  • [7] Securing Cloud Servers against Flooding Based DDOS Attacks
    Chopade, S. S.
    Pandey, K. U.
    Bhade, D. S.
    [J]. 2013 INTERNATIONAL CONFERENCE ON COMMUNICATION SYSTEMS AND NETWORK TECHNOLOGIES (CSNT 2013), 2013, : 524 - 528
  • [8] Simulated Raindrop Algorithm to Mitigate DDoS Attacks in Cloud Computing
    Bhagat, Sourabh
    Pasupuleti, Syam Kumar
    [J]. 6TH INTERNATIONAL CONFERENCE ON COMPUTER & COMMUNICATION TECHNOLOGY (ICCCT-2015), 2015, : 412 - 418
  • [9] Extenuate DDoS Attacks in Cloud
    Kiranmai, B.
    Damodaram, A.
    [J]. PROCEEDINGS OF THE 2016 2ND INTERNATIONAL CONFERENCE ON APPLIED AND THEORETICAL COMPUTING AND COMMUNICATION TECHNOLOGY (ICATCCT), 2016, : 235 - 238
  • [10] Solutions for DDoS Attacks on Cloud
    Bhardwaj, Akashdeep
    Subrahmanyam, G. V. B.
    Avasthi, Vinay
    Sastry, Hanumat G.
    [J]. 2016 6th International Conference - Cloud System and Big Data Engineering (Confluence), 2016, : 163 - 167