Analysis of DDoS Attacks and an Introduction of a Hybrid Statistical Model to Detect DDoS Attacks on Cloud Computing Environment

被引:30
作者
Girma, Anteneh [1 ]
Garuba, Moses [1 ]
Li, Jiang [1 ]
Liu, Chunmei [1 ]
机构
[1] Howard Univ, Syst & Comp Sci Dept, Washington, DC 20059 USA
来源
2015 12TH INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY - NEW GENERATIONS | 2015年
关键词
Cloud Security; Cloud Service Availability; Co-Variance Matrix; DDoS attacks; Entropy;
D O I
10.1109/ITNG.2015.40
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Cloud service availability has been one of the major concerns of cloud service providers (CSP), while hosting different cloud based information technology services by managing different resources on the internet. The vulnerability of internet, the distribute nature of cloud computing, various security issues related to cloud computing service models, and cloud's main attributes contribute to its susceptibility of security threats associated with cloud service availability. One of the major sophisticated threats that happen to be very difficult and challenging to counter due to its distributed nature and resulted in cloud service disruption is Distributed Denial of Service (DDoS) attacks. Even though there are number of intrusion detection solutions proposed by different research groups, and cloud service providers (CSP) are currently using different detection solutions by promising that their product is well secured, there is no such a perfect solution that prevents the DDoS attack. The characteristics of DDoS attack, i.e., having different appearance with different scenarios, make it difficult to detect. This paper will review and analyze different existing DDoS detecting techniques against different parameters, discusses their advantage and disadvantages, and propose a hybrid statistical model that could significantly mitigate these attacks and be a better alternative solution for current detection problems.
引用
收藏
页码:212 / 217
页数:6
相关论文
共 34 条
  • [1] An efficient filter for denial-of-service bandwidth attacks
    Abdelsayed, S
    Glimsholt, D
    Leckie, C
    Ryan, S
    Shami, S
    [J]. GLOBECOM'03: IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE, VOLS 1-7, 2003, : 1353 - 1357
  • [2] An NTT Communications, 2012, CISC VIS NETW IND GL
  • [3] Ankali Sanjay B., 2011, International Journal of Advanced Networking and Applications, V3, P984
  • [4] [Anonymous], 2001, CERT ADV CA 2001 20
  • [5] [Anonymous], 1999, The DoS project's 'trinoo'distributed denial of service attack tool
  • [6] [Anonymous], 2003, F SEC VIR DESCR
  • [7] Bhuyan M.H., 2012, DETECTING DISTRIBUTE
  • [8] CERT Coordination Center Carnegie Mellon Software Engineering Institute, 2001, IN200113 CERT COORD
  • [9] DIETRICH S, 2000, P 14 SYST ADM C LISA
  • [10] Dittrich D., 2000, MSTREAM DISTRIBUTED