scispace - formally typeset
Proceedings ArticleDOI

DDoS attack detection and mitigation techniques in cloud computing environment

Reads0
Chats0
TLDR
The article provides an overview of the DDoS attacks in cloud, recent trends and the existing methodologies that are adopted for ensuring cloud security, as well as comparing the significance of the current deployed solutions.
Abstract
Cloud computing is the emerging technology and most of the IT enabled services are operating in this platform. In the recent era, the internet infrastructure relies on the cloud for their business and the cloud deployment model is inevitable. The important aspects of the cloud infrastructure are confidentiality, integrity, availability and accessibility. Availability is one of the major concern in providing services to the cloud users without disruption. There exists security and privacy issues in the cloud that affects the cloud utilities. Distributed Denial of Service (DDoS) attack is one of the major cloud security attack that needs utmost consideration. The cloud resources are degraded and the access to critical services are denied to genuine users leading to severe financial loss, data theft and non-repudiation. The article provides an overview of the DDoS attacks in cloud, recent trends and the existing methodologies that are adopted for ensuring cloud security. The threats alarming the security in cloud and the DDoS detection and mitigation methods are discussed and compared to comprehend the significance of the current deployed solutions. Further, the need for devising effective DDoS countermeasures are emphasized and the recent era in cloud computing requires strong security standards and solutions for real time deployment.

read more

Citations
More filters
Journal ArticleDOI

Rival-Model Penalized Self-Organizing Map enforced DDoS attack prevention mechanism for software defined network-based cloud computing environment

TL;DR: A Rival-Model Penalized Self-Organizing Map (RMP-SOM) enforced DDoS Attack Prevention Mechanism is proposed for the remarkable prevention of DDoS attack by utilizing the potential characteristics of SDN that focuses on the possibility of facilitating network global perspective, effective investigation of network traffic, and an enhanced process of rule updating.
Book ChapterDOI

Security Issues and Solutions in Cloud Robotics: A Survey

TL;DR: The paper tries to put forth an in depth review on various security aspects of cloud robotics, throwing light on the different cryptographic algorithms: RSA (Rivest Shamir Andelmen), AES (Advanced Encryption Standard), ECC (Elliptic Curve Cryptography).
Proceedings ArticleDOI

Self-Adaptive Secure Mechanism for Containers

TL;DR: In this paper , an algorithm is defined to counteract this threat by migrating the service to another container, increasing the threshold, and restarting the service, where the number of requests for the service is increased beyond a set threshold to simulate the DoS attack.
Journal ArticleDOI

Detection of DDoS attack in cloud computing and its prevention: a systematic review

TL;DR: This paper analyses the latest methods for detecting and preventing Distributed Denial of Service (DDoS) attacks and provided methods and technologies for preventing, detecting, and responding to DDoS flood attacks.
Proceedings ArticleDOI

Self-Adaptive Secure Mechanism for Containers

TL;DR: In this paper , an algorithm is defined to counteract this threat by migrating the service to another container, increasing the threshold, and restarting the service, where the number of requests for the service is increased beyond a set threshold to simulate the DoS attack.
References
More filters
Journal ArticleDOI

NICE: Network Intrusion Detection and Countermeasure Selection in Virtual Network Systems

TL;DR: This work proposes a multiphase distributed vulnerability detection, measurement, and countermeasure selection mechanism called NICE, which is built on attack graph-based analytical models and reconfigurable virtual network-based countermeasures to significantly improve attack detection and mitigate attack consequences.
Proceedings ArticleDOI

Emerging security challenges in cloud computing: An insight to cloud security challenges and their mitigation

TL;DR: The security issues related to the cloud are explored, some key research challenges of implementing new cloud-aware security solutions that can provide the likes of pre-emptive protection for complex and ever dynamic Cloud infrastructure are explored and a security strategy is formulated to enable the Cloud providers and customers alike to fight against ever emerging security threats.
Journal ArticleDOI

Entropy based Anomaly Detection System to Prevent DDoS Attacks in Cloud

TL;DR: In this article, the proposed system combines entropy based intrusion detection system with anomaly detection system for providing multilevel Distributed Denial of Service (DDoS) in cloud environment. But, it fails to detect those attacks that are not included in database.
Proceedings ArticleDOI

A security aspects in cloud computing

TL;DR: The core concept of secured cloud computing is proposed, which is a cloud computing based on separate encryption and decryption services from the storage service and how they can be avoided.
Journal ArticleDOI

A method of DDoS attack detection using HTTP packet pattern and rule engine in cloud computing environment

TL;DR: This study proposes a method of integration between HTTP GET flooding among Distributed Denial-of-Service attacks and MapReduce processing for fast attack detection in a cloud computing environment and experiments show that the proposed method is better than Snort detection because the processing time of the former is shorter with increasing congestion.
Related Papers (5)