Simulation-Based Study of Distributed Denial of Service Attacks Prevention in the Cloud

被引:4
作者
Alosaimi, Wael [1 ]
Alshamrani, Mazin [1 ]
Al-Begain, Khalid [1 ]
机构
[1] Univ South Wales, Fac Comp Engn & Sci, Pontypridd, M Glam, Wales
来源
2015 9TH INTERNATIONAL CONFERENCE ON NEXT GENERATION MOBILE APPLICATIONS, SERVICES AND TECHNOLOGIES (NGMAST 2015) | 2015年
关键词
cloud computing; Distributed Denial of Service attacks; DDoS; Economical Denial of Sustainability; EDoS; DEFENSE-MECHANISMS;
D O I
10.1109/NGMAST.2015.50
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Distributed Denial of Service (DDoS) attacks can affect the availability of the networks. In the age of cloud computing, these attacks are being more harmful in terms of their common influences and their new effects that harm the cloud sustainability by exploiting its scalability and payment model (pay-as-you-use). Therefore, a new form of DDoS attacks is introduced in the cloud context as an economical version of such attack. This new form is known as Economical Denial of Sustainability (EDoS) attack. To counteract such attacks, traditional network security means are used. Specifically, the firewalls that are working as filters for the incoming packets to the targeted network according to designated rules by the administrators can mitigate the impacts of DDoS and EDoS attacks. In this paper, a new solution called Enhanced DDoS-Mitigation System (Enhanced DDoS-MS) is proposed to encounter these attacks by utilizing the firewall capabilities in controlling a verification process to protect the targeted system. These capabilities are evaluated in a simulation environment. The results proved that the firewall mitigates the DDoS impacts successfully by improving the provided services to the users in terms of the response time and server load under attack. The study also suggests following implementation for the proposed framework with an active testbed.
引用
收藏
页码:60 / 65
页数:6
相关论文
共 50 条
[31]   Information Security and Distributed Denial of Service Attacks: A Survey [J].
Aldaej, Abdulaziz .
2017 INTERNATIONAL CONFERENCE ON ELECTRICAL AND COMPUTING TECHNOLOGIES AND APPLICATIONS (ICECTA), 2017, :685-690
[32]   A Review on Detection Approaches for Distributed Denial of Service Attacks [J].
Chaudhari, Rutika S. ;
Talmale, G. R. .
PROCEEDINGS OF THE 2019 INTERNATIONAL CONFERENCE ON INTELLIGENT SUSTAINABLE SYSTEMS (ICISS 2019), 2019, :323-327
[33]   Research on the Detection of Distributed Denial of Service Attacks Based on the Characteristics of IP Flow [J].
Wang, Dongqi ;
Chang, Guiran ;
Feng, Xiaoshuo ;
Guo, Rui .
NETWORK AND PARALLEL COMPUTING, 2008, 5245 :86-93
[34]   Optimal cloud assistance policy of end-edge-cloud ecosystem for mitigating edge distributed denial of service attacks [J].
Teng Li .
Journal of Cloud Computing, 10
[35]   Optimal cloud assistance policy of end-edge-cloud ecosystem for mitigating edge distributed denial of service attacks [J].
Li, Teng .
JOURNAL OF CLOUD COMPUTING-ADVANCES SYSTEMS AND APPLICATIONS, 2021, 10 (01)
[36]   Economics-Based Risk Management of Distributed Denial of Service Attacks: A Distance Learning Case Study [J].
Keskin, Omer ;
Tatar, Unal ;
Poyraz, Omer ;
Pinto, Ariel ;
Gheorghe, Adrian .
PROCEEDINGS OF THE 13TH INTERNATIONAL CONFERENCE ON CYBER WARFARE AND SECURITY (ICCWS 2018), 2018, :343-352
[37]   Combating Distributed Denial of Service Attacks Using Load Balanced Hadoop Clustering in Cloud Computing Environment [J].
Sekaran, Kaushik ;
Vikram, G. Raja ;
Chowdar, B. V. ;
Raju, U. N. P. Gangadhar .
PROCEEDINGS OF 2018 2ND INTERNATIONAL CONFERENCE ON DIGITAL TECHNOLOGY IN EDUCATION (ICDTE 2018), 2018, :77-81
[38]   Detection of Distributed Denial of Service Attacks Using Snort Rules in Cloud Computing & Remote Control Systems [J].
Hassan, Zohaib ;
Shahzeb ;
Odarchenko, Roman ;
Gnatyuk, Sergiy ;
Zaman, Abnash ;
Shah, Masroor .
2018 IEEE 5TH INTERNATIONAL CONFERENCE ON METHODS AND SYSTEMS OF NAVIGATION AND MOTION CONTROL (MSNMC), 2018, :283-288
[39]   A Distributed Denial of Service Attack Sources Detection Technology for Cloud Computing [J].
Yang, Wenjun ;
Wei, Dan .
2017 4TH INTERNATIONAL CONFERENCE ON SYSTEMS AND INFORMATICS (ICSAI), 2017, :660-664
[40]   Analyzing well-known countermeasures against distributed denial of service attacks [J].
Beitollahi, Hakem ;
Deconinck, Geert .
COMPUTER COMMUNICATIONS, 2012, 35 (11) :1312-1332