Simulation-Based Study of Distributed Denial of Service Attacks Prevention in the Cloud

被引:4
|
作者
Alosaimi, Wael [1 ]
Alshamrani, Mazin [1 ]
Al-Begain, Khalid [1 ]
机构
[1] Univ South Wales, Fac Comp Engn & Sci, Pontypridd, M Glam, Wales
来源
2015 9TH INTERNATIONAL CONFERENCE ON NEXT GENERATION MOBILE APPLICATIONS, SERVICES AND TECHNOLOGIES (NGMAST 2015) | 2015年
关键词
cloud computing; Distributed Denial of Service attacks; DDoS; Economical Denial of Sustainability; EDoS; DEFENSE-MECHANISMS;
D O I
10.1109/NGMAST.2015.50
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Distributed Denial of Service (DDoS) attacks can affect the availability of the networks. In the age of cloud computing, these attacks are being more harmful in terms of their common influences and their new effects that harm the cloud sustainability by exploiting its scalability and payment model (pay-as-you-use). Therefore, a new form of DDoS attacks is introduced in the cloud context as an economical version of such attack. This new form is known as Economical Denial of Sustainability (EDoS) attack. To counteract such attacks, traditional network security means are used. Specifically, the firewalls that are working as filters for the incoming packets to the targeted network according to designated rules by the administrators can mitigate the impacts of DDoS and EDoS attacks. In this paper, a new solution called Enhanced DDoS-Mitigation System (Enhanced DDoS-MS) is proposed to encounter these attacks by utilizing the firewall capabilities in controlling a verification process to protect the targeted system. These capabilities are evaluated in a simulation environment. The results proved that the firewall mitigates the DDoS impacts successfully by improving the provided services to the users in terms of the response time and server load under attack. The study also suggests following implementation for the proposed framework with an active testbed.
引用
收藏
页码:60 / 65
页数:6
相关论文
共 50 条
  • [11] Distributed denial of service attacks in cloud: State-of-the-art of scientific and commercial solutions
    Bhardwaj, Aanshi
    Mangat, Veenu
    Vig, Renu
    Halder, Subir
    Conti, Mauro
    COMPUTER SCIENCE REVIEW, 2021, 39
  • [12] Honeypots for distributed Denial of Service Attacks
    Weiler, N
    WET ICE 2002: ELEVENTH IEEE INTERNATIONAL WORKSHOPS ON ENABLING TECHNOLOGIES: INFRASTRUCTURE FOR COLLABORATIVE ENTERPRISES, PROCEEDINGS, 2002, : 109 - 114
  • [13] A Taxonomy of Distributed Denial of Service Attacks
    De Donno, Michele
    Giaretta, Alberto
    Dragoni, Nicola
    Spognardi, Angelo
    2017 INTERNATIONAL CONFERENCE ON INFORMATION SOCIETY (I-SOCIETY 2017), 2017, : 100 - 107
  • [14] Detection of Distributed Denial of Service (DDoS) Attacks Using Artificial Intelligence on Cloud
    Alzahrani, Saba
    Hong, Liang
    2018 IEEE WORLD CONGRESS ON SERVICES (IEEE SERVICES 2018), 2018, : 35 - 36
  • [15] Intrusion Prevention Against Distributed Denial-of-Service(DDoS) on the cloud
    Vanitha, R.
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2016, 16 (04): : 90 - 96
  • [16] Effective mitigation against IoTs using super materials for distributed denial of service attacks in cloud computing
    Bhardwaj, Aanshi
    Mangat, Veenu
    Vig, Renu
    MATERIALS TODAY-PROCEEDINGS, 2020, 28 : 1359 - 1362
  • [17] Distributed denial of service attacks detection in cloud computing using extreme learning machine
    Kushwah, Gopal Singh
    Ali, Syed Taqi
    INTERNATIONAL JOURNAL OF COMMUNICATION NETWORKS AND DISTRIBUTED SYSTEMS, 2019, 23 (03) : 328 - 351
  • [18] Evaluation of Experiments on Detecting Distributed Denial of Service (DDoS) Attacks in Eucalyptus Private Cloud
    Lonea, Alina Madalina
    Popescu, Daniela Elena
    Prostean, Octavian
    Tianfield, Huaglory
    SOFT COMPUTING APPLICATIONS, 2013, 195 : 367 - 379
  • [19] Bandwidth Distributed Denial of Service: Attacks and Defenses
    Geva, Moti
    Herzberg, Amir
    Gev, Yehoshua
    IEEE SECURITY & PRIVACY, 2014, 12 (01) : 54 - 61
  • [20] Characterization of defense mechanisms against distributed denial of service attacks
    Chen, LC
    Longstaff, TA
    Carley, KM
    COMPUTERS & SECURITY, 2004, 23 (08) : 665 - 678