Can We Beat DDoS Attacks in Clouds?

被引:151
作者
Yu, Shui [1 ]
Tian, Yonghong [2 ]
Guo, Song [3 ]
Wu, Dapeng Oliver [4 ]
机构
[1] Deakin Univ, Sch IT, Waurn Ponds, Vic 3125, Australia
[2] Peking Univ, Sch EECS, Beijing 100871, Peoples R China
[3] Univ Aizu, Sch CSE, Aizu Wakamatsu, Fukushima, Japan
[4] Univ Florida, Dept ECE, Gainesville, FL 32611 USA
关键词
Cloud computing; DDoS attacks; mitigation; system modelling; resource investment; NETWORK;
D O I
10.1109/TPDS.2013.181
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Cloud is becoming a dominant computing platform. Naturally, a question that arises is whether we can beat notorious DDoS attacks in a cloud environment. Researchers have demonstrated that the essential issue of DDoS attack and defense is resource competition between defenders and attackers. A cloud usually possesses profound resources and has full control and dynamic allocation capability of its resources. Therefore, cloud offers us the potential to overcome DDoS attacks. However, individual cloud hosted servers are still vulnerable to DDoS attacks if they still run in the traditional way. In this paper, we propose a dynamic resource allocation strategy to counter DDoS attacks against individual cloud customers. When a DDoS attack occurs, we employ the idle resources of the cloud to clone sufficient intrusion prevention servers for the victim in order to quickly filter out attack packets and guarantee the quality of the service for benign users simultaneously. We establish a mathematical model to approximate the needs of our resource investment based on queueing theory. Through careful system analysis and real-world data set experiments, we conclude that we can defeat DDoS attacks in a cloud environment.
引用
收藏
页码:2245 / 2254
页数:10
相关论文
共 29 条
[1]  
[Anonymous], CORR
[2]  
[Anonymous], 2009, DEP ELECT ENG COMPUT
[3]   Optimal Multiserver Configuration for Profit Maximization in Cloud Computing [J].
Cao, Junwei ;
Hwang, Kai ;
Li, Keqin ;
Zomaya, Albert Y. .
IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2013, 24 (06) :1087-1096
[4]   Optimization of Resource Provisioning Cost in Cloud Computing [J].
Chaisiri, Sivadon ;
Lee, Bu-Sung ;
Niyato, Dusit .
IEEE TRANSACTIONS ON SERVICES COMPUTING, 2012, 5 (02) :164-177
[5]   On-Demand Security Architecture for Cloud Computing [J].
Chen, Jianyong ;
Wang, Yang ;
Wang, Xiaomin .
COMPUTER, 2012, 45 (07) :73-78
[6]   Collaborative detection of DDoS attacks over multiple network domains [J].
Chen, Yu ;
Hwang, Kai ;
Ku, Wei-Shinn .
IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2007, 18 (12) :1649-1662
[7]  
Dagon D., 2006, P 13 NETW DISTR SYST, P1
[8]  
Du P, 2010, IEEE IFIP NETW OPER, P894, DOI 10.1109/NOMS.2010.5488345
[9]   FireCol: A Collaborative Protection Network for the Detection of Flooding DDoS Attacks [J].
Francois, Jerome ;
Aib, Issam ;
Boutaba, Raouf .
IEEE-ACM TRANSACTIONS ON NETWORKING, 2012, 20 (06) :1828-1841
[10]   The Insecurity of Cloud Utility Models [J].
Idziorek, Joseph ;
Tannian, Mark F. ;
Jacobson, Doug .
IT PROFESSIONAL, 2013, 15 (02) :22-27