Distributed denial of service attacks in cloud computing

被引:0
|
作者
Abusaimeh, Hesham [1 ]
机构
[1] Associate Professor in Computer Science, Middle East University, Amman,11831, Jordan
关键词
Network security - Cloud computing;
D O I
10.14569/IJACSA.2020.0110621
中图分类号
学科分类号
摘要
The Cloud Computing attacks have been increased since the expanded use of the cloud computing. One of the famous attacks that targets the cloud computing is the distributed denial of service (DDoS) attack. The common features and component of the cloud structure make it more reachable from this kind of attack. The DDOS is targeting the large number of devices connected in any cloud service provider based on its scalability and reliability features that make the cloud available from anywhere and anytime. This attack mainly generate a large number of malicious packets to make the targeted server busy dealing with these huge number of packets. There many techniques to defend the DDOS attack in the regular networks, while in the cloud computing this task is more complicated regarding the various characteristics of the cloud that make the defending process not an easy task. This paper will investigate most of the method used in detecting and preventing and then recover from the DDoS in the cloud computing environment. © Science and Information Organization.
引用
收藏
页码:163 / 168
相关论文
共 50 条
  • [31] Distributed denial of service attacks and detection mechanisms
    Rafsanjani, Marjan Kuchaki
    Kazeminejad, Neda
    [J]. JOURNAL OF COMPUTATIONAL METHODS IN SCIENCES AND ENGINEERING, 2014, 14 (06) : 329 - 345
  • [32] Proactively defeating distributed denial of service attacks
    Fan, YH
    Hassanein, H
    Martin, P
    [J]. CCECE 2003: CANADIAN CONFERENCE ON ELECTRICAL AND COMPUTER ENGINEERING, VOLS 1-3, PROCEEDINGS: TOWARD A CARING AND HUMANE TECHNOLOGY, 2003, : 1047 - 1050
  • [33] Distributed denial of service attacks in cloud: State-of-the-art of scientific and commercial solutions
    Bhardwaj, Aanshi
    Mangat, Veenu
    Vig, Renu
    Halder, Subir
    Conti, Mauro
    [J]. COMPUTER SCIENCE REVIEW, 2021, 39
  • [34] Detecting distributed denial of service attacks by sharing distributed beliefs
    Peng, T
    Leckie, C
    Ramamohanarao, K
    [J]. INFORMATION SECURITY AND PRIVACY, PROCEEDINGS, 2003, 2727 : 214 - 225
  • [35] Distributed Detection and Response for the Mitigation of Distributed Denial of Service Attacks
    Grant, D. C.
    [J]. 2018 32ND INTERNATIONAL CONFERENCE ON INFORMATION NETWORKING (ICOIN), 2018, : 495 - 497
  • [36] Distributed defense against distributed denial-of-service attacks
    Shi, W
    Xiang, Y
    Zhou, WL
    [J]. DISTRIBUTED AND PARALLEL COMPUTING, 2005, 3719 : 357 - 362
  • [37] Stealthy Denial of Service Strategy in Cloud Computing
    Ficco, Massimo
    Rak, Massimiliano
    [J]. IEEE TRANSACTIONS ON CLOUD COMPUTING, 2015, 3 (01) : 80 - 94
  • [38] Mitigation of Cloud-Internal Denial of Service Attacks
    Alarifi, Suaad
    Wolthusen, Stephen D.
    [J]. 2014 IEEE 8TH INTERNATIONAL SYMPOSIUM ON SERVICE ORIENTED SYSTEM ENGINEERING (SOSE), 2014, : 478 - 483
  • [39] Distributed Denial of Service (DDoS) Attacks Detection System for OpenStack-based Private Cloud
    Virupakshar, Karan B.
    Asundi, Manjunath
    Channal, Kishor
    Shettar, Pooja
    Patil, Somashekar
    Narayan, D. G.
    [J]. INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND DATA SCIENCE, 2020, 167 : 2297 - 2307
  • [40] CloudZombie: Launching and Detecting Slow-Read Distributed Denial of Service Attacks from the Cloud
    Shafieian, Saeed
    Zulkernine, Mohammad
    Haque, Anwar
    [J]. CIT/IUCC/DASC/PICOM 2015 IEEE INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION TECHNOLOGY - UBIQUITOUS COMPUTING AND COMMUNICATIONS - DEPENDABLE, AUTONOMIC AND SECURE COMPUTING - PERVASIVE INTELLIGENCE AND COMPUTING, 2015, : 1734 - 1741