Review on Mitigation of Distributed Denial of Service (DDoS) Attacks in Cloud Computing

被引:0
作者
Khadke, Ashwini [1 ]
Madankar, Mangala [1 ]
Motghare, Manish [2 ]
机构
[1] GH Raisoni Coll Engn Nagpur, Dept Comp Sci & Engn, Nagpur, Maharashtra, India
[2] Priyadarshini Indira Coll Engn, Dept Comp Sci & Engn, Nagpur, Maharashtra, India
来源
PROCEEDINGS OF THE 10TH INTERNATIONAL CONFERENCE ON INTELLIGENT SYSTEMS AND CONTROL (ISCO'16) | 2016年
关键词
Cloud Computing; DDoS; Data Integrity; Spoofing;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Distributed Denial of Service (DDoS) attacks are aimed at exhausting various resources of victim hosts, thereby preventing legitimate usage of their computational capabilities. DDoS attacks are often launched by organized crime, hacktivists, or other (un) usual suspects, making this type of cyber crime a major concern for many organizations around the world. Performance plays an important role in cloud computing. Cloud is known for its availability of resources that makes it as leading computing platform. In this paper, the aim is to develop a collaborative defense framework against DDoS attacks in cloud. We focus on two main phases, which are anomaly detection and filtering of malicious traffic, to achieve a successful defense against DDoS attacks. Firstly, in order to detect the stealthy DDoS attack at an early stage, we proposed an effective detection scheme based on time-series decomposition method. Secondly, current defense systems are not scalable well to high-speed networks and few of them are able to defend against attacks originated from both spoofed and genuine source addresses.
引用
收藏
页数:5
相关论文
共 19 条
[1]  
[Anonymous], P ACM SIGCOMM
[2]  
[Anonymous], P ACM SIGCOMM
[3]   ALPi: A DDoS defense system for high-speed networks [J].
Ayres, Paulo E. ;
Sun, Huizhong ;
Chao, H. Jonathan ;
Lau, Wing Cheong .
IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2006, 24 (10) :1864-1876
[4]  
Brutlag Jake D., 2000, P LISA 24 DEC
[5]   Collaborative detection and filtering of shrew DDoS attacks using spectral analysis [J].
Chen, Yu ;
Hwang, Kai .
JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING, 2006, 66 (09) :1137-1151
[6]  
Cheng C., 2002, P 2002 IEEE GLOBECOM
[7]   FireCol: A Collaborative Protection Network for the Detection of Flooding DDoS Attacks [J].
Francois, Jerome ;
Aib, Issam ;
Boutaba, Raouf .
IEEE-ACM TRANSACTIONS ON NETWORKING, 2012, 20 (06) :1828-1841
[8]   Exploiting the transients of adaptation for RoQ attacks on Internet resources [J].
Guirguis, M ;
Bestavros, A ;
Matta, I .
12TH IEEE INTERNATIONAL CONFERENCE ON NETWORK PROTOCOLS - PROCEEDINGS, 2004, :184-195
[9]  
JIN C., 2003, CCS '03, P30
[10]  
KENCL L, 2006, P 2006 INT S WOWMOM