Academia.eduAcademia.edu

DDoS attacks in cloud environment

International journal of health sciences

Network communication is gaining day by day in different ways. Cloud is one of the most recent and latest environments in communication. Whereas this environment is a facilitator for the user to access his/her information from anywhere as and when required. But this technological enhancement is also opening the door for new attacks. In this paper, we have conducted an extensive study on the Distributed Denial of Service Attack (DDoS) as well as the techniques which are used up till now for detection as well as prevention of those attacks. We also have thoroughly presented the details of some very frequent techniques and in the end, we have also discussed some research gaps. This study will facilitate the new research in this era to find out the research problems and provide the optimal solutions for those problems.

How to Cite: Madan, S., Anita, A., & Ali, A. (2022). DDoS attacks in cloud environment. International Journal of Health Sciences, 6(S4), 5836–5847. https://doi.org/10.53730/ijhs.v6nS4.9457 DDoS attacks in cloud environment Shefali Madan Associate Professor, Echelon Institute of Technology, Faridabad Corresponding author email: [email protected] Anita Associate Professor, Echelon Institute of Technology, Faridabad Email: [email protected] Ashif Ali Assistant Professor, Echelon Institute of Technology, Faridabad Email: [email protected] Abstract---Network communication is gaining day by day in different ways. Cloud is one of the most recent and latest environments in communication. Whereas this environment is a facilitator for the user to access his/her information from anywhere as and when required. But this technological enhancement is also opening the door for new attacks. In this paper, we have conducted an extensive study on the Distributed Denial of Service Attack (DDoS) as well as the techniques which are used up till now for detection as well as prevention of those attacks. We also have thoroughly presented the details of some very frequent techniques and in the end, we have also discussed some research gaps. This study will facilitate the new research in this era to find out the research problems and provide the optimal solutions for those problems. Keywords---DDoS, HTTP flood molest, cloud security worries, cloud computing, ping death, slow loris, SYN flood assaults. Introduction Infrastructure as a service, software as a service, and platform as a service are three key cloud computing services made possible by the Internet [1]. Increased cloud storage of data and information has prompted cloud security worries about the protection of data and information. A side from ICMP flood, Ping of Death, Slow Loris, and SYN flood assaults [2] and [3], HTTP flood molest, protocol vulnerability exploitation, and malformed packet attacks, [2], distributed attacks have also resulted. It is up to the attacker to determine how easy it is to exploit a system and how well-versed he or she is in that particular attack technique. A DDoS attack is an attempt to disrupt and deny access to services or network International Journal of Health Sciences ISSN 2550-6978 E-ISSN 2550-696X © 2022. Manuscript submitted: 27 March 2022, Manuscript revised: 18 May 2022, Accepted for publication: 9 June 2022 5836 5837 resources. During anattack, the targeted website is flooded with unwanted, illegitimate traffic from several computers. Distributed assaults on the cloud may be discovered, stopped, and mitigated by previous studies. These strategies rely heavily on the two primary detection mechanisms of signature or abnormalities. If they're clever enough, they'll be able to learn new attacks based on predetermined guidelines. Intrusion detection methods that use classical methods are discussed in the next section. In addition, it provides examples of different cloud computing-based detection approaches. There is an underlying goal of comparing the different detection systems and highlighting their strengths and weaknesses. In addition to the review, the article will demonstrate the success or failure of individual strategies developed by specific researchers in the detection of cloud-based DDoS assaults. For each approach, the measures used to evaluate its performance will be presented. These strategies employ a variety of data sets and technologies that will be highlighted throughout the study. Thus, it is easy to determine if an approach is effective or has the possibility for improvement. Fig. 1 Cloud-Server Architecture According to Cloud Security Alliance, DDoS is one of the top nine threats to cloud computing environment 13 . Out of many attacks in clod envi- ronment 14% are DoS attacks. Many popular websites like yahoo were affected by DDoS in early 2000. Website of grc.com was hit by huge DDoS in May, 2001. Cloud Cloud computing provides the platform, resources, and high availability and web applications on demand. The computing framework has shifted the whole viewpoint of businesses and industries far from the concept of deploying the daily work base of their applications/services by providing on-demand and charging you for your use. In the IT industry, cloud computing has become more popular due to the availability and quality of services for the customer. On-demand 5838 computing, resource spooling, and quality of service are all embodied by the National Institute of Standards and Technology (NIST). Based on the diagram in Fig.1.1, services may be divided into three broad categories: platform services, software services, and infrastructure services [1] and [4]. Services such as operating system, software, middleware, virtual server, and storage space are provided via SaaS. Vendors in the cloud provide this service, which may be accessible through a web application. Create, remove, and query permissions may be granted to users at their request. User-level services, rather than infrastructure and platform services, are the primary emphasis of this product line [5]. User-level applications are virtualized; therefore cloud service providers have full control over the user-level application. Also, the program is likely to have constraints on the modification that may be done. Although the program is customizable to some level, users are free to alter it to suit their needs. Outlook, Google Drive, and Salesforce are just a few examples of this kind of software. Fig 1.1: Cloud Services Fig 1.1 for “Cloud Services” The implementation of PaaS enables businesses to build and install cloud applications without having to own the corresponding infrastructure themselves. Users may manage their application and data using PaaS capabilities that include advancement services, integration, and testing. The service provider is in charge of everything else. In a PaaS, the cloud service provider holds the data. When it comes to the working platform and development platform, cloud users are often responsible for everything above them. Additional applications that may be needed in the future will be the responsibility of the user. 5839 Fig. 1.2 Cloud Services AWS Services Used 1. AWS WAF:-AWS WAF includes a full-featured API that you can use to automate the creation, deployment, and maintenance of security rules. With AWS WAF, you pay only for what you use. The pricing is based on how many rules you deploy and how many web requests your application receives. There are no upfront commitments. 2. AWS GuardDuty:-Amazon GuardDuty is priced based on the quantity of AWS CloudTrail Events analyzed and the volume of Amazon VPC Flow Log and DNS Log data analyzed. There is no additional charge to enable these log sources for GuardDuty analysis. 3. AWS Shield:- AWS Shield is a service that provides protection against DDoS attacks for web applications on AWS. There are two types of AWS Shield, Standard and Advanced, with Standard being free and Advanced being paid version. This includes software component updates and online application monitoring, among other responsibilities. Despite immediate access, the database may be shared with the customer if necessary. Google apps and Salesforce apps are two examples of useful programs. Core infrastructure, such as computing power, storage, a network, and an operating platform, are all provided by IaaS. The allotted resources may then be used to build one's surroundings. Cloud clients may use the hardware provided by IaaS, such as a server. The server will be hosted on the provider's side, and the users will have full access. Servers may be configured to run any software that cloud users need. Because the cloud service provider is unable to deliver multitenancy, the services are more costly. [2]. Because of this, customers will be able to pay the costs of the system. It's becoming more commonplace to use IaaS, and there are a variety of platforms available. DDoS DDoS assaults are a subset of denial of service (DoS) attacks that are distributed. A botnet is a collection of linked internet devices that are used to overload a target website with bogus traffic in a DDoS attack. A DDoS attack is an attempt to disrupt and deny access to services or network resources. During an attack, the targeted website is flooded with unwanted, illegitimate traffic from several computers. DDoS attacks, unlike other types of cyberattacks, do not aim to penetrate your network's defenses. Instead, a DDoS 5840 assault seeks to prevent genuine people from accessing your website or servers. There are many different ways in which DDoS may be utilized, such as a smokescreen for other malicious actions and for taking down the target's protection equipment. DDoS attacks that target the whole internet user population are quite apparent. Hacktivists, cyber vandals, extortionists, and anybody else who wants to make a point or advocate a cause utilize it often. DDoS attacks may take days, weeks, or even months for a website or company to recover from, regardless of how many times they occur. As a result, DDoS attacks on online organizations may be devastating. DoS assaults may destroy a company's income, faith in customers, cost millions in compensation, and harm its brand, just to name a few consequences. Cloud-based DDoS attack Twitter, Amazon, Github, and others have been affected by DDoS assaults on Dyn [9] DNS infrastructure, which is operated by the company. To resolve DNS and other third-party CSPs, AWS uses various service providers. There was an issue with hostname resolution as a result of the assaults, resulting in sporadic connection. When Mirai, a malicious virus that infiltrated an unprotected IoT system, got a command from a central server, it launched a flood assault on the device. As a result, internet service providers (ISP) reported poor service as millions of botnets were using network capacity. Assailants are now focusing their efforts on the gaming industry, which is open 24 hours a day, seven days a week, and has high bandwidth and a large number of online transactions. DDoS assaults on Xbox and Reddit disrupted service for real users [11]. With DNS reflection patterns and overload, Feedly [12] also survived an assault by a DDoS swarm. DDoS assaults resulting in service interruptions are the result of this ransomware attack. Some are shown in Table 2.1. Attacks requesting large quantities of money from SaaS-based firms were also common. DDoS flood attacks using a UDP protocol vulnerability have been reported on the biggest cloud provider, Amazon [13], as well [14]. Table 2.1: Cause of Attacks # 1 2 3 4 5 6 Target Dyn [9] News Site and Xbox Live Reddit [11] Feedly News [12] Amazon Cloud Services [13] Microsoft Cloud Services [14] US Banking Websites [15] Cause of Attack DNS Flood DDoS Year Oct 2016 Dec 2015 Application Overload and DNS Reflection attack UDP Flood Nov 2014 UDP Flood Feb 2014 ICMP/UDP with HTTPS attacks Apr 2013 Jul 2014 5841 DDoS flood packets were sent by taking advantage of a vulnerability in the virtual machine. DDoS assaults and cryptocurrency mining were shown in a botnet built by Bishop Fox at the black hat conference [14] and [20]. UDP/ICMP and HTTPS DDoS assaults were used to infiltrate banking websites [15]. More than 70Gbps of bandwidth and 30 million packets are used in DDoS assaults. The attacks are explained in detail 1. ICMP Floods: An Internet Control Message Protocol (ICMP) flood DDoS attack, also known as a Ping flood attack, is a common Denial-of-Service (DoS) attack in which an attacker attempts to overwhelm a targeted device with ICMP echo-requests (pings). 2. DNS Amplification: Using various amplification techniques, perpetrators can “inflate” the size of these UDP packets, making the attack so potent as to bring down even the most robust Internet infrastructure. DNS amplification, like other amplification attacks, is a type of reflection attack. 3. Volume Based Attacks: Attacks utilize a huge quantity of traffic which saturating the total bandwidth of the Target. 4. Application Layer Attacks: Protection and Preventive Measures An Application Layer attack (DDoS attack) exploits system vulnerabilities and loopholes to attack the application resulting in complete malfunction. Loss of profitability is another effect. Numerous organizations and associations utilize their system, online assets and openly accessible services to help their essential business. Any interruption to the accessibility of these important assets brings about lost profitability. Fig. 2 Direct and Indirect DDoS Attack diagram 5842 Fig. 3 Process of DDOS Attack Cloud-Based DDoS Solutions DDoS attacks have risen to prominence as the most damaging kind of cyberattack on cloud computing infrastructure. To guarantee that genuine customers get a high-quality service, cloud security must be maintained Among the most important characteristics of the cloud is its capacity to provide high levels of security while still allowing for ease of use. DDoS assaults must be analyzed to ensure a safe cloud environment. Table 3.1 discusses in depth the different “DDoS solutions in the cloud computing context.” “Cloud DDoS Detection Rulebased engines” in a cloud computing environment detect the application layer attack. For speeding up the processing and eliminating errors, the MapReduce framework is employed. In comparison to SNORT, this pattern detection method performs better and takes less time to process [16]. Table 3.1:Different “DDoS solutions in the cloud computing context Authors Choi 2014 [16] Techniques Signature Cha and Kim 2011 [17] Signature Navaz 2013 [18] Entropy Chouhan 2012 [19] Hop count Advantages Error is low Fast, processing time Error is low, Fast processing time Error is low, Fast processing time Error is low, Fast processing time Disadvantages High response time High response time Efficiency reduces if the attack distribution varies. Difficult maintenance of a legitimate database 5843 Chouhan 2012 [19] Network Detects collaborative attacks Difficult maintenance of a legitimate database DDoS assaults in the cloud may be detected using a method called multistage anomaly detection [17]. In the monitoring phase, the attack patterns are compared to the rule base to determine whether misuse has occurred. Based on the volume, anomaly detection is used for in- depth analysis and Bayesian classification to identify assaults. For the identification of large anomalies that lead to DDoS assaults, unsupervised learning is used in targeted anomaly detection. Genuine users can pass via the router with the help of an entropy-based approach [18]. When the threshold value is below a certain level, the confirmation algorithm sends an alert to the cloud service provider (CSP). Gathering information on ports and IP addresses is used to determine the entropy threshold. Customers are alerted to and blocked from transmitting packets at a high rate by the cloud service provider (CSP). In the cloud, faked sources can be detected via hop count detection [19]. The IP packet's originating IP and TTL are used to identify it. The packet is considered valid if the source IP and the related TTL are located in the database. At the gateway router, the attack packets are discarded with minimal computational overhead. An attack analyzer is part of the networkbased detection [20], which includes the network controller and a profile server. Fig. 4 Flowchart of DDoS Solution Mechanism The analyzer determines the most effective defenses, and the network controller implements them. The profile server contains all of the virtual machine's security flaws in a cloud-based system. DDoS attack origins may be located via attack graph modeling. Users' typical profile is maintained by collecting information from their packet header using confidence-based filtering [21]. The incoming packet's 5844 correlation parameter is assessed. The packet is accepted if the value is within the acceptable range; else, it is rejected. Statistics filtering [22] keeps the regular profile with information such as hop count and TTL value gathered from the header. If the inbound source IP address can be found in a valid database, the IP address is regarded as genuine; otherwise, the IP address is considered spoofing. Divergence metrics are applied to the non-spoof IP address, and the likelihood of observation is calculated. The IP address of the source is banned if there is any variance. Attack Mitigation :DDoS mitigation is a set of network management techniques and/or tools, for resisting or mitigating the impact of distributed denial-of-service (DDoS) attacks on networks attached to the Internet, by protecting the target, and relay networks. DDoS attacks are a constant threat to businesses and organizations, by delaying service performance, or by shutting down a website entirely Fig. 5 DDos Mitigation Stages Conclusion and Further Scope Cloud data must be protected from any sort of cyberattack. The challenge of securing the cloud is daunting, but it is necessary. Assaults in the cloud are known as “Distributed Denial of Service (DDoS) attacks.” The techniques used to counter DDoS attacks are heavily influenced by tried-and-true methods, as this paper has demonstrated. DDoS assaults may be detected and prevented using several techniques, although none have been shown to be completely foolproof. For a DDoS assault to be detected or prevented, the attacker's motive must be established. There are seven reasons given by reference [40] for DDoS assaults, namely: intellectual challenge, vengeance, ideological belief, sluggish network performance, financial and commercial gain, service unavailability, and cyber warfare. An assault might be motivated by a single factor or a combination of factors. Researchers in the future will have to devise ways for not only detecting an attack but also intelligently identifying the attacker's tactics and traffic rates. In addition, the techniques should be able to determine the validity of the attacker's origins, as well. It is possible to further improve the performance of the IDS using several of the previously suggested and implemented ways. Instead of focusing on one location, the method might strive toward having several sites of attack detection and repair. Distributed attack analysis points can be added to the approaches to increase detection and inference speed by relaying attack 5845 descriptions to a central location. As a result, all aspects of an assault might be identified without compromising system performance. References 1. 2. 3. 4. 5. 6. 7. 8. 9. 10. 11. 12. 13. 14. 15. Yang, L.; Shami, A. A Lightweight Concept Drift Detection and Adaptation Framework for IoT Data Streams. IEEE Internet ThingsMag. 2021, 4, 96–101. Qaddoura, R.; Al-Zoubi, A.M.; Almomani, I.; Faris, H. A Multi-Stage Classification Approach for IoT Intrusion Detection Basedon Clustering with Oversampling. Appl. Sci. 2021, 11, 3022. Shi, W.C.; Sun, H.M. DeepBot: A time-based botnet detection with deep learning. Soft. Comput. 2020, 24, 16605–16616. Nguyen, H.-T.; Ngo, Q.-D.; Le, V.-H. IoT Botnet Detection Approach Based on PSI graph and DGCNN classifier. In Proceedingsof the 2018 IEEE International Conference on Information Communication and Signal Processing (ICICSP), Singapore, 28–30September 2018; pp. 118–122. McDermott, C.D.; Majdani, F.; Petrovski, A.V. Botnet Detection in the Internet of Things using Deep Learning Approaches. InProceedings of the 2018 International Joint Conference on Neural Networks (IJCNN), Rio de Janeiro, Brazil, 8–13 July 2018; pp. 1–8. Stiawan, D.; Suryani, M.E.; Susanto; Idris, M.Y.; Aldalaien, M.N.; Alsharif, N.; Budiarto, R. Ping Flood Attack Pattern RecognitionUsing a K-Means Algorithm in an Internet of Things (IoT) Network. IEEE Access 2021, 9, 116475–116484. Al-Haija, Q.A.; Smadi, A.A.; Allehyani, M.F. Meticulously Intelligent Identification System for Smart Grid Network Stability toOptimize Risk Management. Energies 2021, 14, 6935. Chandra, B.E.; Karthikeyan, E. Sigmis: A feature selection algorithm using the correlation-based method. J. Algorithms Comput. Technol. 2012, 6, 385– 394. Singh, D.; Birmohan, S. Investigating the impact of data normalization on classification performance. Appl. Soft Comput. 2020,97, 105524. Al-Haija, Q.A.; Alsulami, A.A. High-Performance Classification Model to Identify Ransomware Payments for HeterogeneousBitcoin Networks. Electronics 2021. Abu Al-Haija, Q.; Krichen, M.; Abu Elhaija, W. Machine-Learning-Based Darknet Traffic Detection System for IoT Applications.Electronics 2022, 11, 556. Stamp, M. A survey of machine learning algorithms and their application in information security. In Guide to Vulnerability Analysisfor Computer Networks and Systems; Springer: Cham, Switzerland, 2018; pp. 33–55. Timˇcenko, V.; Gajin, S. Ensemble classifiers for supervised anomaly-based network intrusion detection. In Proceedings of the2017 13th IEEE International Conference on Intelligent Computer Communication and Processing (ICCP), Cluj-Napoca, Romania,7–9 September 2017; pp. 13–19. Gaikwad, D.P.; Thool, R.C. Intrusion detection system using bagging with partial decision tree based classifier. Procedia Comput. Sci.2015, 49, 92–98. Al-Haija, Q.A.; Ishtaiwi, A. Multiclass Classification of Firewall Log Files Using Shallow Neural Network for Network SecurityApplications. In Soft Computing for Security Applications. Advances in Intelligent Systems and 5846 16. 17. 18. 19. 20. 21. 22. 23. 24. 25. 26. 27. 28. 29. 30. 31. Computing; Ranganathan, G.,Fernando, X., Shi, F., El-Allioui, Y., Eds.; Springer: Singapore, 2022; Volume 1397. Aygun, R.C.; Yavuz, A.G. Network anomaly detection with stochastically improved autoencoder based models. In Proceedingsof the 4th International Conference on Cyber Security and Cloud Computing, New York, NY, USA, June 2017; pp. 193–198. Kumar, A.; Lim, T.J. EDIMA: Early detection of IoT malware network activity using machine learning techniques. In Proceedingsof the 2019 IEEE 5th World Forum on Internet of Things (WF-IoT), Limerick, Ireland, 15–18 April 2019; pp. 289–294. Ioannou, C.; Vassiliou, V. Classifying Security Attacks in IoT Networks Using Supervised Learning. In Proceedings of the 201915th International Conference on Distributed Computing in Sensor Systems (DCOSS), Santorini Island, Greece, 29–31 May2019; pp. 652–658. Gao, X.; Shan, C.; Hu, C.; Niu, Z.; Liu, Z. An Adaptive Ensemble Machine Learning Model for Intrusion Detection. IEEE Access2019, 7, 82512–82521. Abu Al-Haija, Q.; Sabatto, S.Z. An Efficient Deep-Learning-Based Detection and Classification System for Cyber-Attacks in IoTCommunication Networks. Electronics 2020, 9, 2152. Jung, W.; Zhao, H.; Sun, M.; Zhou, G. IoT botnet detection via power consumption modeling. Smart Health 2020, 15, 100103. Ashraf, J.; Keshk, M.; Moustafa, N.; Abdel-Basset, M.; Khurshid, H.; Bakhshi, A.D.; Mostafa, R.R. IoTBoT-IDS: A novel statisticallearning-enabled botnet detection framework for protecting networks of smart cities. Sustain. Cities Soc. 2021, 72, 103041. Abu Al-Haija, Q.; al-Badawi, A.; Bojja, G.R. Boost-Defence for resilient IoT networks: A head-to-toe approach. Expert Syst. 2022,39, e12934. B.S.K. Devi and T. Subbulakshmi, “A Comparative Analysis of Security Methods for DDoS attacks in the Cloud Computing Environment”, Indian Journal of Science and Technology, vol. 9, no. 34, pp. 1-7, 2016. M. Sebastian, Major DDoS attack on Dyn disrupts AWS Twitter Spotify and more, October 2016. A. Kumar et al., “Early Detection of Mirai-Like IoT Bots in Large-Scale Networks through Sub-Sampled Packet Traffic Analysis”, 2019. J. Choi, C. Choi, B. Ko and P. Kim, “A Method of DDoS Attack Detection using HTTP Packet Pattern and Rule Engine in Cloud Computing Environment”, Soft Computing, vol. 18, no. 9, pp. 1697-1703, 2014. A.S. Navaz, V. Sangeetha and C. Prabhadevi, “Entropy-based Anomaly Detection System to Prevent DDoS Attacks in Cloud”, International Journal of Computer Applications, vol. 62, no. 14, 2013. V. Chouhan and S.K. Peddoju, “Packet Monitoring Approach to Prevent DDoS Attack in Cloud Computing”, International Journal of Computer Science and Electrical Engineering, vol. 1, no. 1, pp. 38-42, 2012. W. Dou, Q. Chen and J. Chen, “A confidence-based filtering method for DDoS attack defense in cloud environment”, Future Generation. Systems., vol. 29, no. 7, pp. 1838-1850, 2013. P. Shamsolmoali and M. Zareapoor, “Statistical-based filtering system against DDOS Attacks in cloud computing”, Proceedings of the International Conference on Advances in Computing Communications and Informatics, pp. 1234-1239, 2014. 5847 32. F.A. Guenane, B. Jaafar, M. Nogueira, and G. Pujolle, “Autonomous architecture for managing firewalling cloud-based service”, Proceedings of the International Conference and Workshop on the Network of the Future, pp. 15, 2014. 33. Kshirsagar, Deepak, and Sandeep Kumar. "A feature reduction based reflected and exploited DDoS attacks detection system." Journal of Ambient Intelligence and Humanized Computing 13, no. 1 (2022): 393-405. 34. Kautish, Sandeep, A. Reyana, and Ankit Vidyarthi. "SDMTA: Attack Detection and Mitigation Mechanism for DDoS Vulnerabilities in Hybrid Cloud Environment." IEEE Transactions on Industrial Informatics (2022). 35. Gaur, Vimal, and Rajneesh Kumar. "Analysis of Machine Learning Classifiers for Early Detection of DDoS Attacks on IoT Devices." Arabian Journal for Science and Engineering 47, no. 2 (2022): 1353-1374. 36. Aziz, Israa T., Ihsan H. Abdulqadder, and Thakwan A. Jawad. "Distributed Denial of Service Attacks on Cloud Computing Environment." Cihan University-Erbil Scientific Journal 6, no. 1 (2022): 47-52. 37. Raich, Anagha, and Vijay Gadicha. "Overview of passive attacks in cloud environment." In AIP Conference Proceedings, vol. 2424, no. 1, p. 030004. AIP Publishing LLC, 2022. 38. Chaudhary, Deepali, Kriti Bhushan, and Brij B. Gupta. "Survey on DDoS attacks and defense mechanisms in cloud and fog computing." International Journal of E-Services and Mobile Applications (IJESMA) 10, no. 3 (2018): 6183. 39. Aydın, Hakan, Zeynep Orman, and Muhammed Ali Aydın. "A Long ShortTerm Memory (LSTM)-Based Distributed Denial of Service (DDoS) Detection and Defense System Design in Public Cloud Network Environment." Computers & Security (2022): 102725. 40. Agrawal, Ankit, Rajiv Singh, Manju Khari, S. Vimal, and Sangsoon Lim. "Autoencoder for Design of Mitigation Model for DDOS Attacks via M-DBNN." Wireless Communications and Mobile Computing 2022 (2022). 41. Nyandra, M., Suryasa, W. (2018). Holistic approach to help sexual dysfunction. Eurasian Journal of Analytical Chemistry, 13(3), pp. 207–212. 42. Suryasa, W. (2019). Historical Religion Dynamics: Phenomenon in Bali Island. Journal of Advanced Research in Dynamical and Control Systems, 11(6), 1679-1685. 43. Wijayanti, N. (2021). Factors related to behavior the community in disposing of garbage. International Journal of Health & Medical Sciences, 4(1), 74-79. https://doi.org/10.31295/ijhms.v4n1.1226