Algorithm for Secure Hybrid Cloud Design Against DDoS Attacks

被引:2
作者
Bhardwaj, Akashdeep [1 ]
Goundar, Sam [2 ]
机构
[1] Univ Petr & Energy Studies, Dehra Dun, Uttar Pradesh, India
[2] Victoria Univ Wellington, Informat Syst, Wellington, New Zealand
关键词
Algorithm; Cloud Computing; Data Center; DDoS; DDoS Mitigation; Defense in Depth; Hybrid Cloud; Multiple Tiers; Network Architecture; Three Tier;
D O I
10.4018/IJITWE.2018100104
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This article describes how cloud computing has become a significant IT infrastructure in business, government, education, research, and service industry domains. Security of cloud-based applications, especially for those applications with constant inbound and outbound user traffic is important. It becomes of the utmost importance to secure the data flowing between the cloud application and user systems against cyber criminals who launch Denial of Service (DoS) attacks. Existing research related to cloud security focuses on securing the flow of information on servers or between networks but there is a lack of research to mitigate Distributed Denial of Service attacks on cloud environments as presented by Buyya et al. and Fachkha, et al. In this article, the authors propose an algorithm and a Hybrid Cloud-based Secure Architecture to mitigate DDoS attacks. By proposing a three-tier cloud infrastructure with a two-tier defense system for separate Network and Application layers, the authors show that DDoS attacks can be detected and blocked before reaching the infrastructure hosting the Cloud applications.
引用
收藏
页码:61 / 77
页数:17
相关论文
共 18 条
  • [1] Ajagekar S.K., P IEEE INT C COMP IN, DOI [10.1109/ICCIC.2016.7919656, DOI 10.1109/ICCIC.2016.7919656]
  • [2] Apiecionek L, 2014, COMM COM INF SC, V424, P405
  • [3] Banafar H., 2014, INT J COMPUTER APPL, V90
  • [4] Bongiovanni W., 2016, P IEEE 40 C LOC COMP, V1, P209, DOI [10.1109/LCN.2015.7366308, DOI 10.1109/LCN.2015.7366308]
  • [5] Buyya R., 2017, SCI DIRECT COMPUTER, V105, P30, DOI [10.1016/j.comcom.2017.03.010, DOI 10.1016/J.COMCOM.2017.03.010]
  • [6] Cloud H., 2017, TRUE ENTERPRISE CLOU
  • [7] E-Tutorials, 2017, NETW CISC AD SEC ALG
  • [8] Darknet as a Source of Cyber Intelligence: Survey, Taxonomy, and Characterization
    Fachkha, Claude
    Debbabi, Mourad
    [J]. IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2016, 18 (02): : 1197 - 1227
  • [9] Analysis of DDoS Attacks and an Introduction of a Hybrid Statistical Model to Detect DDoS Attacks on Cloud Computing Environment
    Girma, Anteneh
    Garuba, Moses
    Li, Jiang
    Liu, Chunmei
    [J]. 2015 12TH INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY - NEW GENERATIONS, 2015, : 212 - 217
  • [10] Hameed S, 2016, IEEE IFIP NETW OPER, P488, DOI 10.1109/NOMS.2016.7502848