Distributed denial of service (DDoS) resilience in cloud: Review and conceptual cloud DDoS mitigation framework

被引:188
|
作者
Osanaiye, Opeyemi [1 ,2 ]
Choo, Kim-Kwang Raymond [2 ,3 ]
Dlodlo, Mqhele [1 ]
机构
[1] Univ Cape Town, Dept Elect Engn, ZA-7700 Rondebosch, South Africa
[2] Univ S Australia, Informat Assurance Res Grp, Adelaide, SA 5001, Australia
[3] INTERPOL Global Complex Innovat, Singapore, Singapore
关键词
Anomaly-based; Change point detection; Cloud distributed denial of service (DDoS) attacks; Cloud distributed denial of service (DDoS) survey; Distributed denial of service (DDoS) attack taxonomy; Flooding attacks; ATTACK DETECTION; DEFENSE; PROTECTION; DOS;
D O I
10.1016/j.jnca.2016.01.001
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Despite the increasing popularity of cloud services, ensuring the security and availability of data, resources and services remains an ongoing research challenge. Distributed denial of service (DDoS) attacks are not a new threat, but remain a major security challenge and are a topic of ongoing research interest. Mitigating DDoS attack in cloud presents a new dimension to solutions proffered in traditional computing due to its architecture and features. This paper reviews 96 publications on DDoS attack and defense approaches in cloud computing published between January 2009 and December 2015, and discusses existing research trends. A taxonomy and a conceptual cloud DDoS mitigation framework based on change point detection are presented. Future research directions are also outlined. (C) 2016 Elsevier Ltd. All rights reserved.
引用
下载
收藏
页码:147 / 165
页数:19
相关论文
共 50 条
  • [41] DDoS Detection and Mitigation in cloud via FogFiter: a defence mechanism
    Paharia, Bhumika
    Bhushan, Kriti
    2018 9TH INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION AND NETWORKING TECHNOLOGIES (ICCCNT), 2018,
  • [42] A Study on the Impacts of DoS and DDoS Attacks on Cloud and Mitigation Techniques
    Balobaid, Awatef
    Alawad, Wedad
    Aljasim, Hanan
    2016 INTERNATIONAL CONFERENCE ON COMPUTING, ANALYTICS AND SECURITY TRENDS (CAST), 2016, : 416 - 421
  • [43] Cloud Shield: Effective Solution for DDoS in Cloud
    Saxena, Rajat
    Dey, Somnath
    INTERNET AND DISTRIBUTED COMPUTING SYSTEMS, IDCS 2015, 2015, 9258 : 3 - 10
  • [44] Protecting against distributed denial of service (DDoS) attacks using distributed filtering
    Trostle, Jonathan
    2006 SECURECOMM AND WORKSHOPS, 2006, : 201 - 211
  • [45] The Distributed Denial of Service Attacks (DDoS) Prevention Mechanisms on Application Layer
    Bhosale, Karuna S.
    Nenova, Maria
    Iliev, Georgi
    2017 13TH INTERNATIONAL CONFERENCE ON ADVANCED TECHNOLOGIES, SYSTEMS AND SERVICES IN TELECOMMUNICATIONS (TELSIKS), 2017, : 136 - 139
  • [46] Developing Realistic Distributed Denial of Service (DDoS) Attack Dataset and Taxonomy
    Sharafaldin, Iman
    Lashkari, Arash Habibi
    Hakak, Saqib
    Ghorbani, Ali A.
    2019 IEEE 53RD INTERNATIONAL CARNAHAN CONFERENCE ON SECURITY TECHNOLOGY (ICCST 2019), 2019,
  • [47] Present Status of Distributed Denial of service (DDoS) Attacks in Internet World
    Singh, Rajeev
    Sharma, T. P.
    INTERNATIONAL JOURNAL OF MATHEMATICAL ENGINEERING AND MANAGEMENT SCIENCES, 2019, 4 (04) : 1008 - 1017
  • [48] Distributed denial of service (DDoS) attack detection using data mining approach in cloud-assisted wireless body area networks
    Latif, Rabia
    Abbas, Haider
    Latif, Seemab
    INTERNATIONAL JOURNAL OF AD HOC AND UBIQUITOUS COMPUTING, 2016, 23 (1-2) : 24 - 35
  • [49] Impact of Distributed Denial of Service (DDoS) attack due to ARP storm'
    Kumar, S
    NETWORKING - ICN 2005, PT 2, 2005, 3421 : 997 - 1002
  • [50] The compliance implications of a cyberattack: a distributed denial of service (DDoS) attack explored
    Fabian Maximilian Johannes Teichmann
    Bruno S. Sergi
    Chiara Wittmann
    International Cybersecurity Law Review, 2023, 4 (3): : 291 - 298