Academia.edu no longer supports Internet Explorer.
To browse Academia.edu and the wider internet faster and more securely, please take a few seconds to upgrade your browser.
Safet y and reliabilit y are important in the cloud computing environment. This is especiall y true toda y as distributed denial-of-service (DDoS) attacks constitute one of the largest threats faced b y Internet users and cloud computing services. DDoS attacks target the resources of these services, lowering their abilit y to provide optimum usage of the network infrastructure. Due to the nature of cloud computing, the methodologies for preventing or stopping DDoS attacks are quite different compared to those used in traditional networks. In this paper, we investigate the effect of DDoS attacks on cloud resources and recommend practical defense mechanisms against different t y pes of DDoS attacks in the cloud environment.
Cloud computing is one of the emerging technologies in which a huge amount of storage, data and services are available over the internet. The main advantage of cloud computing environment is the users have to pay only for what they use. Cloud services are distributed in nature so they can be sharable by millions of users. Because of this, the cloud environment has numerous security challenges. Distributed Denial of Service (DDoS) is most prominent security attack in cloud computing. DDOS is the largest threat which can impact on the availability of cloud services since it has multi-tenant architecture. This paper highlights various DDoS attacks and its countermeasures.
Cloud computing is a distributive and scalable computing architecture. It provides sharing of data and other resources which are accessible from any part of the world for a very low cost. However, Security is one major concern for such computing environment. Distributed Denial of Service (DDoS) is an attack that consumes all the cloud resources may have making it unavailable to other general users. This paper identifies characteristics of DDoS attack and provides an Intrusion Detection System (IDS) tool based on Snort to detect DDoS. The proposed tool will alert the network administrator regarding any attack for any possible resources and the nature of the attack. Also, it suspends the attacker for some time to allow the network admin to implement a fall back plan. As Snort is an open source system, modifying different parameters of the system showed a significant aid in not only detection of DDoS, but also reduction the time for the down time of the network. The proposed tool helps minimize the effect of DDoS by detecting the attack at very early stage and by altering with various parameters which facilitates easy diagnose of the problem.
GEDRAG & ORGANISATIE, 2020
In the current internet world , most of the services , businesses and other things are mostly relying on the cloud services let it be mail service , social medias , payment gateways , and nowadays traditional computing and data storage of businesses are done in the cloud environment , but are they safe enough that we are putting all our sensitive data on cloud , are they reliable , are they secure , so in this paper we are going to analyze the various DDOS(Distributed Denial of Service) attacks in cloud environments and their mitigation strategies and will conclude with which method is better and which methods need a little improvement or which method may harm your clients , because in DDOS the main aim is to provide access to legitimate user 24*7 but not to unauthorized user, along with that we have also proposed a methodology/ algorithm which is completely cloud based and this will remove some limitations from earlier technologies, We will discuss all types of DDOS attack and their mitigation strategies in this paper.
International journal of health sciences
Network communication is gaining day by day in different ways. Cloud is one of the most recent and latest environments in communication. Whereas this environment is a facilitator for the user to access his/her information from anywhere as and when required. But this technological enhancement is also opening the door for new attacks. In this paper, we have conducted an extensive study on the Distributed Denial of Service Attack (DDoS) as well as the techniques which are used up till now for detection as well as prevention of those attacks. We also have thoroughly presented the details of some very frequent techniques and in the end, we have also discussed some research gaps. This study will facilitate the new research in this era to find out the research problems and provide the optimal solutions for those problems.
International Journal of Advanced Computer Science and Applications, 2020
The Cloud Computing attacks have been increased since the expanded use of the cloud computing. One of the famous attacks that targets the cloud computing is the distributed denial of service (DDoS) attack. The common features and component of the cloud structure make it more reachable from this kind of attack. The DDOS is targeting the large number of devices connected in any cloud service provider based on its scalability and reliability features that make the cloud available from anywhere and anytime. This attack mainly generate a large number of malicious packets to make the targeted server busy dealing with these huge number of packets. There many techniques to defend the DDOS attack in the regular networks, while in the cloud computing this task is more complicated regarding the various characteristics of the cloud that make the defending process not an easy task. This paper will investigate most of the method used in detecting and preventing and then recover from the DDoS in the cloud computing environment.
Journal of Network and Computer Applications, 2016
Despite the increasing popularity of cloud services, ensuring the security and availability of data, resources and services remains an ongoing research challenge. Distributed denial of service (DDoS) attacks are not a new threat, but remain a major security challenge and are a topic of ongoing research interest. Mitigating DDoS attack in cloud presents a new dimension to solutions proffered in traditional computing due to its architecture and features. This paper reviews 96 publications on DDoS attack and defense approaches in cloud computing published between January 2009 and December 2015, and discusses existing research trends. A taxonomy and a conceptual cloud DDoS mitigation framework based on change point detection are presented. Future research directions are also outlined.
Cihan University-Erbil Scientific Journal
This paper aimed to identify the various kinds of distributed denial of service attacks (DDoS) attacks, their destructive capabilities, and most of all, how best these issues could be counter attacked and resolved for the benefit of all stakeholders along the cloud continuum, preferably as permanent solutions. A compilation of the various types of DDoS is done, their strike capabilities and most of all, how best cloud computing environment issues could be addressed and resolved for the benefit of all stakeholders along the cloud continuum. The key challenges against effective DDoS defense mechanism are also explored.
Cloud computing is the subject of the era and is the current keen domain of interest of organizations due to its promising opportunities and catastrophic impacts on availability, confidentiality and integrity. On the other hand, moving to cloud computing paradigm, new security mechanisms and defense frameworks are being developed against all threats and malicious network attacks that threaten the service availability of cloud computing for continuity of public and private services. Considering the increasing usage of cloud services by government bodies poses an emerging threat to e-government and e-governance structures and continuity of public services of national and local government bodies. IoT, industry 4.0, smart cities and novel artificial intelligence (AI) applications that require devices to be connected in ever present cloud platforms, provide an increasing wide range of potential zombie armies to be used in Distributed Denial of Service (DDoS) attacks which are amongst the most critical attacks under cloud computing environment. In this survey, we discuss in detail the classification of DDoS attacks threatening the cloud computing components and make analysis and assessments on the emerging usage of cloud infrastructures that poses both advantages and risks. We assert that considering various kinds of DDoS attack tools, proactive capabilities, virtual connecting infrastructures and innovative methods which are being developed by attackers very rapidly for compromising and halting cloud systems, it is of crucial importance for cyber security strategies of both national, central and local government bodies to consider pertinent pre-emptive countermeasures periodically and revise their cyber strategies and action plans dynamically.
Security in this world of digital computing plays a typical role, since all the operations are automated and large volumes of data are being maintained in the servers. Cloud computing is one of the evolving technologies where a huge volume of storage is made on-line, data and services are also distributed. Because of its distributed nature, they have become easy targets for the intruders to exploit the information. The well known Distributed Denial of Service (DDoS) attack is the most prominent attacks in this area of computing. DDoS is the single largest threat to internet and internet of things. This paper provides a wide survey on various DDoS attacks, their vulnerabilities and countermeasures proposed against them. Also this paper provides an in-depth analysis on effects of DDoS attacks in the Cloud environment. Through the analysis done it will be useful for designing a secured cloud infrastructure which will abide the DDoS attacks.
PALLOFE (Revue de l'Association Numismatique du Roussillon) n° 62, p. 5-6, 2023
Çelebi Dergisi - 5. Sayı (Türk Devlet Geleneği), 2021
Fundamentos para uma Psiconeurologia A fenomenologia subjetiva nas relações humanas, 2019
Results in Mathematics, 2023
Quaternary Science Reviews, 2022
Cross-regional Ethnopolitics in Central and Eastern Europe: Lessons from the Western Balkans and the Baltic States, 2022
Applied Soil Ecology, 2018
Physicochemical, Thermal and Spectroscopic Characterization of the Energy of Consciousness Healing Treated Withania somnifera (Ashwagandha) Root Extract, 2021
Bulletin of the World Health Organization, 2003
International Journal of Food Science & Technology, 2020
Journal of Community Service in Science and Engineering (JoCSE)