Distributed denial of service attacks in cloud: State-of-the-art of scientific and commercial solutions

被引:27
|
作者
Bhardwaj, Aanshi [1 ]
Mangat, Veenu [1 ]
Vig, Renu [1 ]
Halder, Subir [2 ]
Conti, Mauro [2 ]
机构
[1] Panjab Univ, Univ Inst Engn & Technol UIET, Chandigarh, India
[2] Univ Padua, Dept Math, I-35121 Padua, Italy
关键词
Anomaly based detection; Cloud computing; DDoS attack; Economic denial of sustainability; Machine learning; Deep learning; Statistical methods; DDOS ATTACKS; INTRUSION DETECTION; DEFENSE-MECHANISMS; ANOMALY DETECTION; MITIGATION; DOS; SDN; TAXONOMY;
D O I
10.1016/j.cosrev.2020.100332
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Cloud computing model provides on demand, elastic and fully managed computer system resources and services to organizations. However, attacks on cloud components can cause inestimable losses to cloud service providers and cloud users. One such category of attacks is the Distributed Denial of Service (DDoS), which can have serious consequences including impaired customer experience, service outage and in severe cases, complete shutdown and total economic unsustainability. Advances in Internet of Things (IoT) and network connectivity have inadvertently facilitated launch of DDoS attacks which have increased in volume, frequency and intensity. Recent DDoS attacks involving new attack vectors and strategies, have precipitated the need for this survey. In this survey, we mainly focus on finding the gaps, as well as bridging those gaps between the future potential DDoS attacks and state-of-the-art scientific and commercial DDoS attack defending solutions. It seeks to highlight the need for a comprehensive detection approach by presenting the recent threat landscape and major cloud attack incidents, estimates of future DDoS, illustrative use cases, commercial DDoS solutions, and the laws governing DDoS attacks in different nations. An upto-date survey of DDoS detection methods, particularly anomaly based detection, available research tools, platforms and datasets, has been given. This paper further explores the use of machine learning methods for detection of DDoS attacks and investigates features, strengths, weaknesses, tools, datasets, and evaluates results of the methods in the context of the cloud. A summary comparison of statistical, machine learning and hybrid methods has been brought forth based on detailed analysis. This paper is intended to serve as a ready reference for the research community to develop effective and innovative detection mechanisms for forthcoming DDoS attacks in the cloud environment. It will also sensitize cloud users and providers to the urgent need to invest in deployment of DDoS detection mechanisms to secure their assets. (C) 2020 Elsevier Inc. All rights reserved.
引用
收藏
页数:28
相关论文
共 50 条
  • [1] Distributed Denial of Service Attacks in Cloud Computing
    Abusaimeh, Hesham
    [J]. INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2020, 11 (06) : 163 - 168
  • [2] Defence for Distributed Denial of Service Attacks in Cloud Computing
    Carlin, Andrew
    Hammoudeh, Mohammad
    Aldabbas, Omar
    [J]. INTERNATIONAL CONFERENCE ON ADVANCED WIRELESS INFORMATION AND COMMUNICATION TECHNOLOGIES (AWICT 2015), 2015, 73 : 490 - 497
  • [3] Denial of service and distributed denial of service attacks
    Piskozub, A
    [J]. MODERN PROBLEMS OF RADIO ENGINEERING, TELECOMMUNICATIONS AND COMPUTER SCIENCE, PROCEEDINGS, 2002, : 303 - 304
  • [4] Methods for Preventing Distributed Denial of Service Attacks in Cloud Computing
    Jaber, Aws Naser
    Zolkipli, Mohamad Fadli
    Majid, Mazlina Abdul
    Anwar, Shahid
    [J]. ADVANCED SCIENCE LETTERS, 2017, 23 (06) : 5282 - 5285
  • [5] Distributed denial of service attacks
    Lau, F
    Rubin, SH
    Smith, MH
    Trajkovic, L
    [J]. SMC 2000 CONFERENCE PROCEEDINGS: 2000 IEEE INTERNATIONAL CONFERENCE ON SYSTEMS, MAN & CYBERNETICS, VOL 1-5, 2000, : 2275 - 2280
  • [6] Review on Mitigation of Distributed Denial of Service (DDoS) Attacks in Cloud Computing
    Khadke, Ashwini
    Madankar, Mangala
    Motghare, Manish
    [J]. PROCEEDINGS OF THE 10TH INTERNATIONAL CONFERENCE ON INTELLIGENT SYSTEMS AND CONTROL (ISCO'16), 2016,
  • [7] Detecting Denial of Service Attacks in the Cloud
    Kumar, Raneel
    Lal, Sunil Pranit
    Sharma, Alok
    [J]. 2016 IEEE 14TH INTL CONF ON DEPENDABLE, AUTONOMIC AND SECURE COMPUTING, 14TH INTL CONF ON PERVASIVE INTELLIGENCE AND COMPUTING, 2ND INTL CONF ON BIG DATA INTELLIGENCE AND COMPUTING AND CYBER SCIENCE AND TECHNOLOGY CONGRESS (DASC/PICOM/DATACOM/CYBERSC, 2016, : 309 - 316
  • [8] Denial of Service Attacks Mitigation in the Cloud
    Alosaimi, Wael
    Zak, Michal
    Al-Begain, Khalid
    [J]. 2015 9TH INTERNATIONAL CONFERENCE ON NEXT GENERATION MOBILE APPLICATIONS, SERVICES AND TECHNOLOGIES (NGMAST 2015), 2015, : 47 - 53
  • [9] Honeypots for distributed Denial of Service Attacks
    Weiler, N
    [J]. WET ICE 2002: ELEVENTH IEEE INTERNATIONAL WORKSHOPS ON ENABLING TECHNOLOGIES: INFRASTRUCTURE FOR COLLABORATIVE ENTERPRISES, PROCEEDINGS, 2002, : 109 - 114
  • [10] A Taxonomy of Distributed Denial of Service Attacks
    De Donno, Michele
    Giaretta, Alberto
    Dragoni, Nicola
    Spognardi, Angelo
    [J]. 2017 INTERNATIONAL CONFERENCE ON INFORMATION SOCIETY (I-SOCIETY 2017), 2017, : 100 - 107