DDoS attack mitigation and Resource provisioning in Cloud using Fog Computing

被引:0
作者
Deepali [1 ]
Bhushan, Kriti [1 ]
机构
[1] Natl Inst Technol Kurukshetra, Kurukshetra, Haryana, India
来源
PROCEEDINGS OF THE 2017 INTERNATIONAL CONFERENCE ON SMART TECHNOLOGIES FOR SMART NATION (SMARTTECHCON) | 2017年
关键词
DDoS attack; Fog Computing; Cloud Computing; Resource Provisioning; EDoS attack;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Security and reliability are essential in cloud computing environment. Researchers are exploring all features of cloud from scheduling policies, cloud network architecture, virtualization, I/O efficiency, hypervisor performance scalability, data confidentiality and data integrity of data oriented applications. Therefore, the need to secure cloud has become inevitable. Nowadays, one of the biggest challenges faced by cloud users and cloud service providers is DDoS attack. Distributed denial-of-service attack [3] compromises the availability of the system services. In the cloud. DDoS attacks target the services offered by the cloud, reducing their ability to provide optimal use of the network resources. Furthermore, this resource exhaustion by illegitimate traffic results in large billing for customers for the services they never used also known as EDoS ( Economic Denial of Sustainability) attack. Fog computing [6] is an intermediate layer between cloud and users. It is similar to the cloud and can provide services like computation, data, networking, and storage between end users and cloud servers and hence fog can provide defense against DDoS even before it reaches the cloud. Therefore, saving cloud resources and providing faster response time. This paper proposes a framework for DDoS attack detection and efficient resource provisioning in a cloud environment with the help of Fog computing by using an efficient algorithm to service cloud request effectively by intermediate fog servers. Hence, provide quick response time and efficient utilization of resources.
引用
收藏
页码:308 / 313
页数:6
相关论文
共 15 条
[1]  
Agarwal Swati, 2016, International Journal of Information Engineering and Electronic Business, V8, P48, DOI 10.5815/ijieeb.2016.01.06
[2]  
[Anonymous], CLOUD ATTACK EC DENI
[3]  
[Anonymous], 2 IEEE INT C REC TRE
[4]  
[Anonymous], 2014, INT J COMPUT SCI TRE
[5]  
[Anonymous], 2014, Big Data Internet of Things: A Roadmap Smart Environments
[6]  
Bhushan K., 2017, INT J BIG DATA INTEL, V4, P81
[7]  
Bonomi F, 2012, P 1 ED MCC WORKSH MO, P13, DOI [DOI 10.1145/2342509.2342513, 10.1145/2342509.2342513]
[8]  
Douligeris C, 2003, PROCEEDINGS OF THE 3RD IEEE INTERNATIONAL SYMPOSIUM ON SIGNAL PROCESSING AND INFORMATION TECHNOLOGY, P190
[9]  
Fayaz SK, 2015, PROCEEDINGS OF THE 24TH USENIX SECURITY SYMPOSIUM, P817
[10]   Taxonomy of DoS and DDoS attacks and desirable defense mechanism in a Cloud computing environment [J].
Gupta, B. B. ;
Badve, Omkar P. .
NEURAL COMPUTING & APPLICATIONS, 2017, 28 (12) :3655-3682