A survey of Denial-of-Service and distributed Denial of Service attacks and defenses in cloud computing

被引:26
作者
Bonguet A. [1 ,2 ]
Bellaiche M. [1 ]
机构
[1] Computer Engineering and Engineering Software, École Polytechnique de Montréal, H3T 1J4, QC
[2] 2900, boul. Édouard-Montpetit, Montréal, H3T 1J4, QC
关键词
Cloud computing; Countermeasures; Denial-of-service; Security;
D O I
10.3390/fi9030043
中图分类号
学科分类号
摘要
Cloud Computing is a computing model that allows ubiquitous, convenient and on-demand access to a shared pool of highly configurable resources (e.g., networks, servers, storage, applications and services). Denial-of-Service (DoS) and Distributed Denial-of-Service (DDoS) attacks are serious threats to the Cloud services' availability due to numerous new vulnerabilities introduced by the nature of the Cloud, such as multi-tenancy and resource sharing. In this paper, new types of DoS and DDoS attacks in Cloud Computing are explored, especially the XML-DoS and HTTP-DoS attacks, and some possible detection and mitigation techniques are examined. This survey also provides an overview of the existing defense solutions and investigates the experiments and metrics that are usually designed and used to evaluate their performance, which is helpful for the future research in the domain. © 2017 by the authors. Licensee MDPI, Basel, Switzerland.
引用
收藏
相关论文
共 55 条
[1]  
Zissis D., Lekkas D., Addressing cloud computing security issues, Future Gener. Comput. Syst., 28, pp. 583-592, (2012)
[2]  
Sridhar T., Cloud Computing: Infrastructure and Implementation Topics, Int. Protoc. J. CISCO, 12, (2009)
[3]  
Los R., Gray D., Shackleford D., Sullivan B., The Notorious Nine: Cloud Computing Top Threats in 2013, (2013)
[4]  
Ristenpart T., Tromer E., Shacham H., Savage S., Hey, You, Get off of My Cloud: Exploring Information Leakage in Third-party Compute Clouds, CCS'09, Proceedings of the 16th ACM Conference on Computer and Communications Security, Chicago, IL, USA, 9–13 November 2009, pp. 199-212, (2009)
[5]  
(2017)
[6]  
(2017)
[7]  
Security Overview of the Integrity Virtual Machines Architecture, (2017)
[8]  
Hashizume K., Rosado D., Fernandez-Medina E., Fernandez E., An analysis of security issues for cloud computing, J. Int. Serv. Appl., 4, (2013)
[9]  
Gonzalez N., Miers C., Redigolo F., Carvalho T., Simplicio M., de Sousa G., Pourzandi M., A Quantitative Analysis of Current Security Concerns and Solutions for Cloud Computing, Proceedings of the 2011 IEEE Third International Conference on Cloud Computing Technology and Science (CloudCom), pp. 231-238, (2011)
[10]  
DDoS on Dyn Impacts Twitter, Spotify, Reddit, (2017)