Design Issues of Enhanced DDoS Protecting Scheme under the Cloud Computing Environment

被引:2
|
作者
Yang, Shin-Jer [1 ]
Li, Yu-Zhan [1 ]
机构
[1] Soochow Univ, Dept Comp Sci & Informat Management, Taipei, Taiwan
关键词
Cloud Computing; DDoS; N-CBF; CBF; Detection ratio; SERVICE ATTACKS; DEFENSE;
D O I
10.1109/NaNA.2016.68
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Du to the growth of the Internet and the increase of data, many companies have begun to migrate their data services from the Web to the Cloud, but it comes with many security issues, such as Distributed Denial of Service (DDoS) attacks and Zero-day attacks. DDoS is a critical threat under cloud computing environment, it attempts to make a machine or network unavailable to their users. Confidence Based Filtering (CBF) is one of the conventional approaches to defending against DDoS. The CBF method is to collect the packets and extract attribute pairs for calculating the score of each packet, then it decides to discard it or not. However, the weight of each attribute pair and the threshold value in the calculation is static in the CBF method. Therefore, we propose a novel method called N-CBF that improves these drawbacks of the CBF method. First, the N-CBF scheme can dynamically adjust the weight values of each attribute pair. Second, each packet will have the unique threshold value. Third, we performed simulations to compare and analyze the effectiveness and efficiency of N-CBF scheme according to the KPIs. Then, the simulation results indicate that the proposed N-CBF scheme can obtain higher detection ratios on average of 9.02% and a little overhead in average processing time than CBF. Finally, the N-CBF can support more refined and robust protection mechanisms against DDoS attacks and also provide a more secure cloud computing environment.
引用
收藏
页码:178 / 183
页数:6
相关论文
共 50 条
  • [1] Design Issues of a Hybrid Wrapping Attack Protecting Scheme in Cloud Computing Environment
    Yang, Shin-Jer
    Huang, Yu-Hsuan
    ADVANCES IN E-BUSINESS ENGINEERING FOR UBIQUITOUS COMPUTING, 2020, 41 : 113 - 127
  • [2] Design Issues of the Side-Channel Attacks Protecting Scheme in Cloud Computing Environment
    Yang, Shin-Jer
    Yen, Chia-Chi
    JOURNAL OF INTERNET TECHNOLOGY, 2020, 21 (03): : 713 - 721
  • [3] Detection of DDOS Attacks in Cloud Computing Environment
    Hamdani, Farhaan Noor
    Siddiqui, Farheen
    PROCEEDINGS OF THE 2019 INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTING AND CONTROL SYSTEMS (ICCS), 2019, : 83 - 87
  • [4] Detecting DDoS Attacks in Cloud Computing Environment
    Lonea, A. M.
    Popescu, D. E.
    Tianfield, H.
    INTERNATIONAL JOURNAL OF COMPUTERS COMMUNICATIONS & CONTROL, 2013, 8 (01) : 70 - 78
  • [5] Intrusion detection and prevention of DDoS attacks in cloud computing environment: a review on issues and current methods
    Devi B.S.K.
    Subbulakshmi T.
    International Journal of Cloud Computing, 2023, 12 (05) : 450 - 481
  • [6] Effective Detection and Prevention of DDoS in Cloud Computing Environment
    Tajane, Vrushali
    Sharma, Deepak
    2018 FOURTH INTERNATIONAL CONFERENCE ON COMPUTING COMMUNICATION CONTROL AND AUTOMATION (ICCUBEA), 2018,
  • [7] DDoS attacks in cloud computing: Issues, taxonomy, and future directions
    Somani, Gaurav
    Gaur, Manoj Singh
    Sanghi, Dheeraj
    Conti, Mauro
    Buyya, Rajkumar
    COMPUTER COMMUNICATIONS, 2017, 107 : 30 - 48
  • [8] Effective DDoS security scheme for mobile cloud computing systems
    Ishak, Chaima
    Ben Saied, Yosra
    2024 13TH IFIP/IEEE INTERNATIONAL CONFERENCE ON PERFORMANCE EVALUATION AND MODELING IN WIRED AND WIRELESS NETWORKS, PEMWN 2024, 2024,
  • [9] A REVOCATION SCHEME FOR THE CLOUD COMPUTING ENVIRONMENT
    Li, Xiaobiao
    Wen, Qiaoyan
    2011 IEEE INTERNATIONAL CONFERENCE ON CLOUD COMPUTING AND INTELLIGENCE SYSTEMS, 2011, : 254 - 258
  • [10] DDoS Attack Detection and Mitigation Techniques in Cloud Computing Environment
    Devi, Kiruthika B. S.
    Subbulakshmi, T.
    PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON INTELLIGENT SUSTAINABLE SYSTEMS (ICISS 2017), 2017, : 512 - 517