Simulation-Based Study of Distributed Denial of Service Attacks Prevention in the Cloud

被引:4
作者
Alosaimi, Wael [1 ]
Alshamrani, Mazin [1 ]
Al-Begain, Khalid [1 ]
机构
[1] Univ South Wales, Fac Comp Engn & Sci, Pontypridd, M Glam, Wales
来源
2015 9TH INTERNATIONAL CONFERENCE ON NEXT GENERATION MOBILE APPLICATIONS, SERVICES AND TECHNOLOGIES (NGMAST 2015) | 2015年
关键词
cloud computing; Distributed Denial of Service attacks; DDoS; Economical Denial of Sustainability; EDoS; DEFENSE-MECHANISMS;
D O I
10.1109/NGMAST.2015.50
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Distributed Denial of Service (DDoS) attacks can affect the availability of the networks. In the age of cloud computing, these attacks are being more harmful in terms of their common influences and their new effects that harm the cloud sustainability by exploiting its scalability and payment model (pay-as-you-use). Therefore, a new form of DDoS attacks is introduced in the cloud context as an economical version of such attack. This new form is known as Economical Denial of Sustainability (EDoS) attack. To counteract such attacks, traditional network security means are used. Specifically, the firewalls that are working as filters for the incoming packets to the targeted network according to designated rules by the administrators can mitigate the impacts of DDoS and EDoS attacks. In this paper, a new solution called Enhanced DDoS-Mitigation System (Enhanced DDoS-MS) is proposed to encounter these attacks by utilizing the firewall capabilities in controlling a verification process to protect the targeted system. These capabilities are evaluated in a simulation environment. The results proved that the firewall mitigates the DDoS impacts successfully by improving the provided services to the users in terms of the response time and server load under attack. The study also suggests following implementation for the proposed framework with an active testbed.
引用
收藏
页码:60 / 65
页数:6
相关论文
共 50 条
[11]   Distributed denial of service attacks in cloud: State-of-the-art of scientific and commercial solutions [J].
Bhardwaj, Aanshi ;
Mangat, Veenu ;
Vig, Renu ;
Halder, Subir ;
Conti, Mauro .
COMPUTER SCIENCE REVIEW, 2021, 39
[12]   Honeypots for distributed Denial of Service Attacks [J].
Weiler, N .
WET ICE 2002: ELEVENTH IEEE INTERNATIONAL WORKSHOPS ON ENABLING TECHNOLOGIES: INFRASTRUCTURE FOR COLLABORATIVE ENTERPRISES, PROCEEDINGS, 2002, :109-114
[13]   A Taxonomy of Distributed Denial of Service Attacks [J].
De Donno, Michele ;
Giaretta, Alberto ;
Dragoni, Nicola ;
Spognardi, Angelo .
2017 INTERNATIONAL CONFERENCE ON INFORMATION SOCIETY (I-SOCIETY 2017), 2017, :100-107
[14]   Detection of Distributed Denial of Service (DDoS) Attacks Using Artificial Intelligence on Cloud [J].
Alzahrani, Saba ;
Hong, Liang .
2018 IEEE WORLD CONGRESS ON SERVICES (IEEE SERVICES 2018), 2018, :35-36
[15]   Intrusion Prevention Against Distributed Denial-of-Service(DDoS) on the cloud [J].
Vanitha, R. .
INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2016, 16 (04) :90-96
[16]   Effective mitigation against IoTs using super materials for distributed denial of service attacks in cloud computing [J].
Bhardwaj, Aanshi ;
Mangat, Veenu ;
Vig, Renu .
MATERIALS TODAY-PROCEEDINGS, 2020, 28 :1359-1362
[17]   Bandwidth Distributed Denial of Service: Attacks and Defenses [J].
Geva, Moti ;
Herzberg, Amir ;
Gev, Yehoshua .
IEEE SECURITY & PRIVACY, 2014, 12 (01) :54-61
[18]   Distributed denial of service attacks detection in cloud computing using extreme learning machine [J].
Kushwah, Gopal Singh ;
Ali, Syed Taqi .
INTERNATIONAL JOURNAL OF COMMUNICATION NETWORKS AND DISTRIBUTED SYSTEMS, 2019, 23 (03) :328-351
[19]   Evaluation of Experiments on Detecting Distributed Denial of Service (DDoS) Attacks in Eucalyptus Private Cloud [J].
Lonea, Alina Madalina ;
Popescu, Daniela Elena ;
Prostean, Octavian ;
Tianfield, Huaglory .
SOFT COMPUTING APPLICATIONS, 2013, 195 :367-379
[20]   Characterization of defense mechanisms against distributed denial of service attacks [J].
Chen, LC ;
Longstaff, TA ;
Carley, KM .
COMPUTERS & SECURITY, 2004, 23 (08) :665-678