Google scholar arxiv informatics ads IJAIS publications are indexed with Google Scholar, NASA ADS, Informatics et. al.

Call for Paper

-

November Edition 2021

International Journal of Applied Information Systems solicits high quality original research papers for the November 2021 Edition of the journal. The last date of research paper submission is October 15, 2021.

An Overview of DDOS Attacks Detection and Prevention in the Cloud

Khalid A. Fakeeh. Published in Information Sciences

International Journal of Applied Information Systems
Year of Publication: 2016
Publisher: Foundation of Computer Science (FCS), NY, USA
Authors:Khalid A. Fakeeh
10.5120/ijais2016451628
Download full text
  1. Khalid A Fakeeh. An Overview of DDOS Attacks Detection and Prevention in the Cloud. International Journal of Applied Information Systems 11(7):25-34, December 2016. URL, DOI BibTeX

    @article{10.5120/ijais2016451628,
    	author = "Khalid A. Fakeeh",
    	title = "An Overview of DDOS Attacks Detection and Prevention in the Cloud",
    	journal = "International Journal of Applied Information Systems",
    	issue_date = "December 2016",
    	volume = 11,
    	number = 7,
    	month = "Dec",
    	year = 2016,
    	issn = "2249-0868",
    	pages = "25-34",
    	numpages = 11,
    	url = "http://www.ijais.org/archives/volume11/number7/952-2016451628",
    	doi = "10.5120/ijais2016451628",
    	publisher = "Foundation of Computer Science (FCS), NY, USA",
    	address = "New York, USA"
    }
    

Abstract

Security is an illusion unless you are hacked. Attacks in the Cloud have more catastrophic and destructive impact on the organizations than the user might expect. As attacks are constantly evolving and making it difficult to defend. Most of the organization will try to check their devices in the cloud to protect against viruses with traditional security measures like antiviruses, or firewall thinking it secures across different attacks, but with a wide range of change in attack pattern organizations have exposed to significant operational and business consequences, not to mention public embarrassment. In this paper, we conducted the survey on DDOS (Distributed Denial of Service) attacks research work and analyzed prevention and detection methods used for DDOS attacks in the cloud. We found that there is a good amount of research scope in detecting and preventing slow client application layer attacks in the cloud.

Reference

  1. Alzahrani, A., Alalwan, N. & Sarrab, M. 2014. Mobile Cloud Computing: Advantage, Disadvantage and Open Challenge. Proceedings of the 7th Euro American Conference on Telematics and Information Systems, hlm. 21.
  2. Curtis, G. and Cobham, D. (2005). Business Information Systems: Analysis, Design and Practice , 6thed, FT Prentice Hall, Harlow
  3. Zaigham Mahmood ."Cloud Computing: Characteristics and Deployment Approaches",2011 11th IEEE International Conference on Computer and Information Technology.
  4. Mr. P. R Ubhale & Prof. A. M. Sahu,"Securing Cloud Computing Environment using Intrusion Detection and Prevention System (IDPS),"International Journal of Computer Science and Management Research Vol 2 Issue 5 May 2013.
  5. Kazi Zunnurhain and Susan V. Vrbsky,"Security Attacks and Solutions in Clouds" in Proceedings of the 1st international conference on cloud computing, pp. 145–156, Citeseer, 2010.
  6. King, N. J. & Raja, V. 2013. What Do They Know About Me in the Cloud? A Comparative Law Perspective on Protecting Privacy and Security of Sensitive Consumer Data. American Business Law Journal 50(2): 413-482
  7. Bakshi, A. & Yogesh, B. 2010. Securing Cloud from DDoS Attacks Using Intrusion Detection System in Virtual Machine. Communication Software and Networks, 2010. ICCSN'10. Second International Conference on, him. 260-264
  8. David K. Y. Yau, John C. S. Lui, Feng Liang, and Yeung Yam,"Defending Against Distributed Denial-of-Service Attacks With Max-Min Fair Server-Centric Router Throttles," IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 13, NO. 1, FEBRUARY 2005
  9. Alqahtani, S. M., Balushi, M. A. & John, R. 2014. An Intelligent Intrusion Detection System for Cloud Computing (Sidscc). Computational Science and Computational Intelligence (CSCI), 2014 International Conference on, him. 135-141.
  10. Ahmed, Martuza, et al. "PIDS: A packet-based approach to network intrusion detection and prevention." Information Management and Engineering, 2009. ICIME'09. International Conference on. IEEE, 2009
  11. Pieter de Boer & Martin Pels, "Host-based Intrusion Detection Systems."
  12. Jensen, M., Schwenk, J., Gruschka, N. & Iacono, L. L. 2009. On Technical Security Issues in Cloud Computing. Cloud Computing, 2009. CLOUD'09. IEEE International Conference on, him. 109-116
  13. Babaie, T., Chawla, S. & Ardon, S. 2014. Network Traffic Decomposition for Anomaly Detection. arXiv preprint arXiv:1403.0157
  14. K Munivara Prasad, Dr. A Rama Mohan Reddy, IP Traceback for Flooding attacks on Internet Threat Monitors (ITM ) Using Honeypots, International Journal of Network Security & Its Applications (IJNSA), ISSN: 0974 - 9330, Vol.4, pp 13-27, No.1, Jan 2012.
  15. Y. C Wu,., Tseng, H. R., Yang, W., and Jan, R. H.,“DDoS "detection and traceback with a decision tree and grey relational analysis.,”, International Journal of Ad Hoc and Ubiquitous Computing, Vol-7, 121–136.2011.
  16. Y. Xiang, Li, K., and Zhou, W., ‘‘Low-rate DDoS attacks detection and traceback by using new information metrics,’’ IEEE T Inf. Foren. Sec., 6:426–437 (2011).
  17. H.F. Lipson, “Tracking and Tracing Cyber-Attacks: Technical Challenges and Global Policy Issues,” CERT Coordination Center, Special Report: CMU/SEI-2002-SR-009 (2002).
  18. K. Subhashini, and G. Subbalakshmi, ‘‘Tracing sources of DDoS attacks in IP networks using machine learning automatic defense system,’’International. Journal. Electron. Commun. Comput. Eng., 3: 164–169 (2012).
  19. Gautam Thatte, Urbashi Mitra and John Heidemann,“Detection of Low-Rate Attacks in Computer Networks,”University of Southern California IEEE (2005)
  20. C.Jin, H.Wang, and K.Shin: "Hop-Count Filtering An Effective Defense against Spoofed DoS Traffic,” ACM CCS (2003)
  21. Sandeep Sarat and Andreas Terz, “On the Effect of Router Buffer Sizes on Low-Rate Denial of Service Attacks,” IEEE Computer Society (2005)
  22. G.Yang, M.Gerla, and M.Y.Sanadidi, “Defense against low rate tcp-targeted denial- of-service attacks,” ISCC ’04 Proceedings of the Ninth International Symposium on Computers and Communications 2004 Volume 2 (ISCC”04), pages 345–350, Washington, DC, USA. IEEEComputer Society (2004)
  23. Y.K. Kwok, R .Tripathi, Y.Chen and H.K.HAWK,“Halting anomalies with weighted choking to rescue well-behaved TCP sessions from shrew DDoS attacks,” Proc.of the 3rd Int’l Conf. on Networking and Mobile Computing (ICCNMC 2005). New York: Springer-Verlag, pp: 423-432 (2005)
  24. J.C.C.Rodriguez, A.P. Briones and J.A.Nolazco, “Dynamic DDoS Mitigation based on TTL field using Fuzzy logic,” CONIELECOMP ’07, Mexico (2007)
  25. Rajkumar Buyya, Rajiv Ranjan, and Rodrigo N. Calheiros,” InterCloud: Utility-Oriented Federation of Cloud Computing Environments for Scaling of Application Services,” Springer 2010.
  26. Debajyoti Mukhopadhyay, Byung-Jun Oh, Sang-Heon Shim, Young-Chon Kim, “ A Study on Recent Approaches in Handling DDoS Attacks,” Cornell University Library,2010.
  27. Toma´s Jirsk, Martin Husak, Pavel Celeda, Zdenek Eichler, “Cloud-based Security Research Testbed: A DDoS Use Case,”IEEE, 2014.
  28. Sanguk Noh et al.," Detecting Distributed Denial of Service (DDoS) Attacks through Inductive Learning,"LNCS 2690, pp. 286–295, 2003.
  29. David Mankins, Rajesh Krishnan, Ceilyn Boyd, John Zao, Michael Frantz, “Mitigating Distributed Denial of Service Attacks with Dynamic Resource Pricing,” IEEE 2001.
  30. Ravi Chandra & Madhavi Gudavalli,"E-FireCol to Detect Multiple DDOS Attacks,"International Journal of Advanced Research in Computer Science and Software Engineering, Volume 3, Issue 12, December 2013
  31. A.S.Syed Navaz et al.," Entropy-based Anomaly Detection System to Prevent DDoS Attacks in Cloud,"International Journal of Computer Applications (0975 – 8887) Volume 62– No.15, January 2013
  32. Markku Antikainen, Tuomas Aura, and Mikko Särelä,” Denial-of-Service Attacks in Bloom-Filter-BasedForwarding,” IEEE/ACM Transactions On Networking, Vol. 22, No. 5, October 2014.
  33. Subramaniam.T.K and Deepa.B, "PREVENTING DISTRIBUTED DENIAL OF SERVICE ATTACKS IN CLOUD ENVIRONMENTS,"International Journal of Information Technology, Control and Automation (IJITCA) Vol. 6, No.2, April 2016.
  34. Pourya Shamsolmoali et al.," C2DF: High Rate DDOS filtering method in Cloud Computing", I.J. Computer Network and Information Security, 2014, 9, 43-50.
  35. H. V. Shashidhara & Dr. S. Balaji,"Low Rate Denial of Service (LDoS) attack – A Survey,"International Journal of Emerging Technology and Advanced Engineering, Volume 4, Issue 6, June 2014
  36. Aleksandar Kuzmanovic and Edward W. Knightly,"Low-Rate TCP-Targeted Denial of Service Attacks and Counter-Strategies."
  37. Baldev Singh and S.N. Panda,"An Adaptive Approach to Mitigate DDoS Attacks in Cloud,"(IJACSA) International Journal of Advanced Computer Science and Applications, Vol. 6, No. 10, 2015
  38. Iqra Sattar et al.,"A Review of Techniques to Detect and Prevent Distributed Denial of Service (DDoS) Attack in Cloud Computing Environment,"International Journal of Computer Applications (0975 – 8887) Volume 115 – No. 8, April 2015
  39. Aleksandar Kuzmanovic and Edward W. Knightly,"LowRate TCPTargeted Denial of Service Attacks," SIGCOMM’03, August 25–29,2003, Karlsruhe, Germany.
  40. T.Gunasekhar, K.Thirupathi Rao, P.Saikiran, P.V.S Lakshmi, "A Survey on Denial of Service Attacks," (IJCSIT) International Journal of Computer Science and Information Technologies, Vol. 5 (2), 2014, 2373-2376.
  41. T.Gunasekhar, K.Thirupathi Rao, P.Saikiran, P.V.S Lakshmi, "A Survey on Denial of Service Attacks," (IJCSIT) International Journal of Computer Science and Information Technologies, Vol. 5 (2), 2014, 2373-2376.
  42. Amit Khajuria, & Roshan Srivastava, "Analysis of the DDoS Defence Strategies in Cloud Computing " INTERNATIONAL JOURNAL OF ENHANCED RESEARCH IN MANAGEMENT & COMPUTER APPLICATIONS.
  43. Masudur Rahman & Wah Man Cheung, "A Novel Cloud Computing Security Model to Detect and Prevent DoS and DDoS Attack,"(IJACSA) International Journal of Advanced Computer Science and Applications, Vol. 5, No. 6, 2014
  44. Santhi et al.,"A Defense Mechanism to Protect Cloud Computing Against Distributed Denial of Service Attacks," International Journal of Advanced Research in Computer Science and Software Engineering 3(5), May - 2013, pp. 416-420
  45. FuiFui Wong and Cheng Xiang Tan,"A SURVEY OF TRENDS IN MASSIVE DDOS ATTACKS AND CLOUD-BASED MITIGATIONS," International Journal of Network Security & Its Applications (IJNSA), Vol.6, No.3, May 2014.
  46. Kumar Shridhar & Nikhil Gautam, "A Prevention of DDoS Attacks in Cloud Using Honeypot," International Journal of Science and Research (IJSR) ISSN (Online): 2319-7064
  47. Dr. S.SaravanaKumar, R.SenthilKumar et al.," Detecting and Preventing DDoS Attacks in Cloud,"International Journal of Innovative Research in Computer and Communication Engineering Vol. 3, Issue 3, March 2015.
  48. Kirtesh Agrawal and Nikita Bhatt et al., "Survey on DDoS Attack in Cloud Environment," International Journal of Innovative and Emerging Research in Engineering Volume 2, Issue 3, 2015.
  49. V.Priyadharshini & Dr.K.Kuppusamy,"Prevention of DDOS Attacks using New Cracking Algorithm," International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622.
  50. Iqra Sattar et al.,"A Review of Techniques to Detect and Prevent Distributed Denial of Service (DDoS) Attack in Cloud Computing Environment," International Journal of Computer Applications (0975 – 8887) Volume 115 – No. 8, April 2015.
  51. Upma Goyal, Gayatri Bhatti and Sandeep Mehmi,"A Dual Mechanism for defeating DDoS Attacks in Cloud Computing Model," International Journal of Application or Innovation in Engineering & Management (IJAIEM), Volume 2, Issue 3, March 2013.
  52. J.J.Shah and Dr. L.G.Malik, "Impact of DDOS Attacks on Cloud Environment," International Journal of Research in Computer and Communication Technology, Vol 2, Issue 7, July-2013
  53. Mohd Nazri Ismail et al., "New Framework to Detect and Prevent Denial of Service Attack in Cloud Computing Environment," International Journal of Computer Science and Security (IJCSS), Volume (6): Issue (4)
  54. A.M. Lonea, D.E. Popescu, H. Tianfield, "Detecting DDoS Attacks in Cloud Computing Environment," INT J COMPUT COMMUN, ISSN 1841-9836 8(1):70-78, February 2013.
  55. Krishna Modi and Prof. Abdul Quadir Md, "Detection and Prevention of DDoS Attacks on the Cloud using Double-TCP Mechanism and HMM-based Architecture," International Journal of Cloud Computing and Services Science (IJ-CLOSER) Vol. 3, No. 2, April 2014, pp. 113 – 120
  56. Esraa Alomari et al., Botnet-based Distributed Denial of Service (DDoS) Attacks on Web Servers: Classification and Art. International Journal of Computer Applications (0975 – 8887) Volume 49– No.7, July 2012
  57. Muhammad Morshed Alam et al.," Study on Auto Detecting Defence Mechanisms against Application Layer DDoS Attacks in SIP Server," JOURNAL OF NETWORKS, VOL. 10, NO. 6, JUNE 2015
  58. Muhammad Yeasir Arafat et al.,"A Practical Approach and Mitigation Techniques on Application Layer DDoS Attack in Web Server,"International Journal of Computer Applications (0975 – 8887) Volume 131 – No.1, December 2015
  59. Phenomon institute, "Efficacy of Emerging Network Security Technologies" February 2013.
  60. http://www.securityfocus.com/archive/1/456339/30/0/threaded
  61. http://www.cnet.com/news/paypal-suffers-from-e-commerce-outage/
  62. John Kindervag, “Develop a two-phased DDoS Mitigation Strategy,” Forrester Research, Inc., May 17, 2013. CyberFactors, a wholly owned subsidiary of CyberRiskPartners and sister company of CloudInsure.com
  63. https://www.maxmind.com/en/geoip2-databases
  64. http://www.forbes.com/sites/jonmatonis/2012/04/02/watch-bitcoin-robbery-in-slow-motion/#66190b922bb9
  65. C. Zhang, Z. Cai, W. Chen, Luo, X., and Yin, J. “Flow level detection and filtering of low-rate DDoS. Computer Networks,” 56, pages:3417–3431. (2012)
  66. Y. C Wu, Tseng, H. R., Yang, W., and Jan, R. H “DoS detection and traceback with decision tree and grey relational analysis.”, International Journal of Ad Hoc and Ubiquitous Computing, 7, 121–136. (2011)

Keywords

DDOS, Attacks, Security, Threats, SAAS, IAAS