Distributed Denial of Service attack on Cloud: Detection and Prevention

被引:0
|
作者
Khadka, Bikram [1 ]
Withana, Chandana [1 ]
Alsadoon, Abeer [1 ]
Elchouemi, Amr [2 ]
机构
[1] Charles Sturt Univ, Sch Comp & Math, Sydney, NSW, Australia
[2] Hewlett Packard Corp, Palo Alto, CA USA
关键词
cloud computing; security; DDoS; snort; open source;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Cloud computing is a distributive and scalable computing architecture. It provides sharing of data and other resources which are accessible from any part of the world for a very low cost. However, Security is one major concern for such computing environment. Distributed Denial of Service (DDoS) is an attack that consumes all the cloud resources may have making it unavailable to other general users. This paper identifies characteristics of DDoS attack and provides an Intrusion Detection System (IDS) tool based on Snort to detect DDoS. The proposed tool will alert the network administrator regarding any attack for any possible resources and the nature of the attack. Also, it suspends the attacker for some time to allow the network admin to implement a fall back plan. As Snort is an open source system, modifying different parameters of the system showed a significant aid in not only detection of DDoS, but also reduction the time for the down time of the network. The proposed tool helps minimize the effect of DDoS by detecting the attack at very early stage and by altering with various parameters which facilitates easy diagnose of the problem.
引用
收藏
页数:6
相关论文
共 50 条
  • [31] The Design of SDN based Detection for Distributed Denial of Service (DDoS) attack
    Oo, Myo Myint
    Kamolphiwong, Sinchai
    Kamolphiwong, Thossaporn
    [J]. 2017 21ST INTERNATIONAL COMPUTER SCIENCE AND ENGINEERING CONFERENCE (ICSEC 2017), 2017, : 258 - 263
  • [32] Optimal Placement of Detection Nodes against Distributed Denial of Service Attack
    Islam, Muhammad Hasan
    Nadeem, Kamran
    Khan, Shoab A.
    [J]. INTERNATIONAL CONFERENCE ON ADVANCED COMPUTER CONTROL : ICACC 2009 - PROCEEDINGS, 2009, : 675 - 679
  • [33] Review on distributed denial of service attack detection in software defined network
    Karthika, P.
    Karmel, A.
    [J]. International Journal of Wireless and Mobile Computing, 2023, 25 (02) : 128 - 146
  • [34] Intrusion Detection Systems' Performance for Distributed Denial-of-Service Attack
    de Sousa Araujo, Tiago Emilio
    Matos, Fernando Menezes
    Moreira, Josilene Aires
    [J]. 2017 CHILEAN CONFERENCE ON ELECTRICAL, ELECTRONICS ENGINEERING, INFORMATION AND COMMUNICATION TECHNOLOGIES (CHILECON), 2017,
  • [35] Efficient Placement of Sensors for Detection against Distributed Denial of Service Attack
    Islam, Muhammad Hasan
    Nadeem, Kamran
    Khan, Shoab A.
    [J]. IIT: 2008 INTERNATIONAL CONFERENCE ON INNOVATIONS IN INFORMATION TECHNOLOGY, 2008, : 262 - 266
  • [36] Distributed denial of service attack detection using machine learning classifiers
    Gautam, R.
    Padmavathy, R.
    [J]. INTERNATIONAL JOURNAL OF AD HOC AND UBIQUITOUS COMPUTING, 2024, 46 (03)
  • [37] A novel mechanism for detection and prevention of Distributed Denial of Service attacks
    Lin Pingping
    Zhang Xiaosong
    [J]. PROCEEDINGS OF THE INTERNATIONAL CONFERENCE INFORMATION COMPUTING AND AUTOMATION, VOLS 1-3, 2008, : 289 - 292
  • [38] An inline detection and prevention framework for distributed denial of service attacks
    Chen, Zhongqiang
    Chen, Zhongrong
    Delis, Alex
    [J]. COMPUTER JOURNAL, 2007, 50 (01): : 7 - 40
  • [39] Formalized Description of Distributed Denial of Service Attack
    杜彦辉
    马锐
    刘玉树
    [J]. Journal of Beijing Institute of Technology, 2004, (04) : 360 - 364
  • [40] Efficient Distributed Denial-of-Service Attack Defense in SDN-Based Cloud
    Phan, Trung, V
    Park, Minho
    [J]. IEEE ACCESS, 2019, 7 (18701-18714) : 18701 - 18714