Denial of Service Attacks Mitigation in the Cloud

被引:4
作者
Alosaimi, Wael [1 ]
Zak, Michal [1 ]
Al-Begain, Khalid [1 ]
机构
[1] Univ South Wales, Fac Comp Engn & Sci, Pontypridd, M Glam, Wales
来源
2015 9TH INTERNATIONAL CONFERENCE ON NEXT GENERATION MOBILE APPLICATIONS, SERVICES AND TECHNOLOGIES (NGMAST 2015) | 2015年
关键词
Cloud Computing; DDoS; Denial of Service; Distributed Denial of Service attacks; DoS; Economical Denial of Sustainability; EDoS;
D O I
10.1109/NGMAST.2015.48
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Denial of Service attack (DoS) forms a permanent risk to the traditional networks and the cloud environment. This malicious attack can be amplified by Distributed Denial of Service (DDoS) attacks. Moreover, the cloud payment model can be affected by such attacks exploiting the cloud scalability. In this case, it is called Economical Denial of Sustainability (EDoS) attack. This study introduces an effective solution that is designed to counteract such attacks and protect targeted networks. The proposed framework is called Enhanced DDoS-Mitigation System (Enhanced DDoS-MS). This method is tested practically and the test's results proved the success of the framework in limiting the end-to-end response time and handling complex versions of these attacks on multiple layers.
引用
收藏
页码:47 / 53
页数:7
相关论文
共 13 条
  • [1] Al-Haidari F., 2012, 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), P1167, DOI 10.1109/TrustCom.2012.146
  • [2] Alosaimi W., 2013, Proceedings of the 14th Annual Post Graduates Symposium on the convergence of Telecommunication, Networking and Broadcasting (PGNet), P116
  • [3] Cook DL, 2003, ICON 2003: 11TH IEEE INTERNATIONAL CONFERENCE ON NETWORKS, P461
  • [4] Hoff C., 2008, RATIONAL SURVIVABILI
  • [5] Kandula S, 2005, USENIX Association Proceedings of the 2nd Symposium on Networked Systems Design & Implementation (NSDI '05), P287
  • [6] Kumar M. N., 2012, 2012 4th International Conference on Computational Intelligence and Communication Networks (CICN 2012), P535, DOI 10.1109/CICN.2012.149
  • [7] Taming IP packet flooding attacks
    Lakshminarayanan, K
    Adkins, D
    Perrig, A
    Stoica, I
    [J]. ACM SIGCOMM COMPUTER COMMUNICATION REVIEW, 2004, 34 (01) : 45 - 50
  • [8] Research on DoS Attack and Detection Programming
    Liu, Wentao
    [J]. 2009 THIRD INTERNATIONAL SYMPOSIUM ON INTELLIGENT INFORMATION TECHNOLOGY APPLICATION, VOL 1, PROCEEDINGS, 2009, : 207 - 210
  • [9] Morein WilliamG., 2003, Proceedings of the 10th ACM conference on Computer and communications security, P8
  • [10] Raju B., 2011, INT J, V1, P128