Cloud Computing Vulnerability: DDoS as its main Security Threat, and Analysis of IDS as a Solution Model

被引:7
作者
Goel, Rajni [1 ]
Garuba, Moses [2 ]
Girma, Anteneh [2 ]
机构
[1] Howard Univ, Dept Informat Syst & Decis Sci, Washington, DC 20059 USA
[2] Howard Univ, Dept Syst & Comp Sci, Washington, DC 20059 USA
来源
2014 11TH INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY: NEW GENERATIONS (ITNG) | 2014年
关键词
Cloud; DDoS; IDS; Security; Vulnerability;
D O I
10.1109/ITNG.2014.77
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Cloud computing has emerged as an increasingly popular means of delivering IT-enabled business services and a potential technology resource choice for many private and government organizations in today's rapidly changing computing environment. Consequently, as cloud computing technology, functionality and usability expands unique security vulnerabilities and treats requiring timely attention arise continuously. The primary challenge being providing continuous service availability. This paper will address cloud security vulnerability issues, the threats propagated by a distributed denial of service (DDOS) attack on cloud computing infrastructure and also discuss the means and techniques that could detect and prevent the attacks.
引用
收藏
页码:307 / 312
页数:6
相关论文
共 24 条
[1]  
[Anonymous], 8 IEEE INT C DEP AUT
[2]  
[Anonymous], 2011, NATL I STANDARDS TEC
[3]  
[Anonymous], 2010, SECURITY PRIVACY CHA
[4]  
[Anonymous], 7 CLOUD COMPUTING SE
[5]  
[Anonymous], IJREAT INT J RES ENG
[6]  
Ashktorab Vahid, 2012, INT J APPL INNOVATIO, V1
[7]  
Bace R., 2001, MIST SPECIAL PUBLICA
[8]  
Burke John, 2013, DEFENSE DISTRIBUTED
[9]  
De Clercq Jan, 2011, WINDOWS IT PRO 0620
[10]  
Dobbins Roland, 2011, AUSTR NETWORK OPERAT