Cloud-based DDoS Attacks and Defenses

被引:0
作者
Darwish, Marwan [1 ]
Ouda, Abdelkader [1 ]
Capretz, Luiz Fernando [1 ]
机构
[1] Univ Western Ontario, Dept Elect & Comp Engn, London, ON, Canada
来源
INTERNATIONAL CONFERENCE ON INFORMATION SOCIETY (I-SOCIETY 2013) | 2013年
关键词
cloud computing; network; security; DDoS; vulnerabilities;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Safety and reliability are important in the cloud computing environment. This is especially true today as distributed denial-of-service (DDoS) attacks constitute one of the largest threats faced by Internet users and cloud computing services. DDoS attacks target the resources of these services, lowering their ability to provide optimum usage of the network infrastructure. Due to the nature of cloud computing, the methodologies for preventing or stopping DDoS attacks are quite different compared to those used in traditional networks. In this paper, we investigate the effect of DDoS attacks on cloud resources and recommend practical defense mechanisms against different types of DDoS attacks in the cloud environment.
引用
收藏
页码:67 / 71
页数:5
相关论文
共 13 条
[1]  
[Anonymous], P BSD C 2002
[2]  
[Anonymous], 2010, SIGSOFT SOFTW ENG NO, DOI DOI 10.1145/1734103.1734111
[3]  
Dittrich D., 2004, Internet Denial of Service: Attack and Defense Mechanisms
[4]   BUFFER OVERFLOW EXPLOIT AND DEFENSIVE TECHNIQUES [J].
Fu, Desheng ;
Shi, Feiyue .
2012 FOURTH INTERNATIONAL CONFERENCE ON MULTIMEDIA INFORMATION NETWORKING AND SECURITY (MINES 2012), 2012, :87-90
[5]  
Gonzalez JM, 2011, ANN CONF PRIV SECUR, P63
[6]  
Keshariya A, 2010, LECT NOTES COMPUT SC, V5939, P222
[7]  
Kumar M., 2012, International Journal of Engineering Research and Technology, V1, P1
[8]   DDoS attack evolution [J].
Nazario, Jose .
Network Security, 2008, 2008 (07) :7-10
[9]   Denial-of-service attacks [J].
Neumann, PG .
COMMUNICATIONS OF THE ACM, 2000, 43 (04) :136-136
[10]  
Patel C. M., 2012, International Journal of Engineering Research Technology (IJERT), V1