ANALYSIS OF DDOS ATTACK DETECTION AND PREVENTION IN CLOUD ENVIRONMENT: A REVIEW
Main Article Content
Abstract
The cloud environment is a large scale dynamic distributed emerging technology and popularized with the communication, networking, storage theorizes and power. Human being share digital information to new demands which are growing rapidly with respect to time. Cloud is very challenging internet-based computing infrastructure. DDoS (Distributed Denial of Services) is one of the main attack occurred in cloud environment. This leads to financial harms or influences the reputation. Survey statics shows that DDoS attack is rapidly growing attack that targets two major components. In this paper we surveyed different scenarios of DDoS attack. We have focused on different methods classification, detection and defense of DDoS attack, and compared different learning approaches for DDoS. The machine learning is efficiently used for DDoS attack defense.
Â
Downloads
Article Details
COPYRIGHT
Submission of a manuscript implies: that the work described has not been published before, that it is not under consideration for publication elsewhere; that if and when the manuscript is accepted for publication, the authors agree to automatic transfer of the copyright to the publisher.
Authors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgment of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work
- The journal allows the author(s) to retain publishing rights without restrictions.
- The journal allows the author(s) to hold the copyright without restrictions.
References
P. K. Rai and R. K. Bunkar, “Study of security risk and vulnerabilities of cloud computing,†Int. J. Comput. Sci. Mobile Comput, vol. 3, pp. 490–496, 2014.
P. Mell and T. Grance, “ The NIST definition of cloud computing,†2011.
C. Belbergui, N. Elkamoun and R. Hilal, “Cloud Computing: Overview and Risk Identification Based on Classification by Type,†Cloud Computing Technologies and Applications (CloudTech), 3rd International Conference of IEEE Rabat, Morocco, 2017.
B. Khadka, C. Withana, A. Alsadoon, A. Elchouemi “Distributed Denial of Service attack on Cloud: Detection and Prevention,†International Conference and Workshop on Computing and Communication (IEMCON), 2015.
B. Prabadevi, N. Jeyanthi ,â€Distributed Denial of service Attacks and its effects on Cloud Environment- a Survey,†The International Symposium on Networks, Computers and Communications, 2014.
Arbor Networks, Inc. (2013). Top Daily DDoS attack worldwide. Retrieved 2018, from Digital Attack Maphttps://www.digitalattackmap.com/understanding-ddos/
Z. Xiao and Y. Xiao, “ Security and privacy in cloud computing,†IEEE Commun. Surveys & Tutorials, vol. 15, no. 2, pp. 843–859, Second Quarter 2013.
D. Linthicum, “As cloud use grows, so will rate of DDoS attacks,†Tech. Rep., Feb. 2013. [Online]. Available: http://www.infoworld.com/d/cloud-computing/cloud-use-growsso-will-rate-of-ddos-attacks-211876
S. Specht and R. Lee, “ Taxonomies of distributed denial of service networks, attacks, tools and countermeasures,†Technical Report CE-L200303, Princeton University, http://www.princeton. edu/˜ rblee/ELE572 F04Readings. html, Tech. Rep., 2003.
Rashmi V. Deshmukha, Kailas K. Devadkarb “Understanding DDoS Attack & Its Effect In Cloud Environment†e 4th International Conference on Advances in Computing, Communication and Control (ICAC3’15), 2015.
G. Somani, M. S. Gaur, D. Sanghi, M. Conti, R. K. Buyya “DDoS Attacks in Cloud Computing: Issues, Taxonomy, and Future Directions†ACM Computing Surveys, Vol. 1, No. 1, Article 1, December 2015.
Radware, https://security.radware.com/ddos-knowledg e-center/ddos-chronicles/ddos-attacks-history/
TechTargetsearchsecurity,http://searchsecurity.techtarget.com/definition/denial-of-service
Gary C. Kessler “Defenses Against Distributed Denial of Service Attacks,†4th edition of the Computer Security Handbook, November 2000
B. Prabadevi, N.Jeyanthi, “Distributed Denial of service Attacks and its effects on Cloud Environment- a Survey,†International Symposium on Networks, Computers and Communications, July 2014
Digital Trends https://www.digitaltrends.com/ computing/ddos-attacks-hit-record-numbers-in-q2-2015/
S. Weagle, “New Report Points to Alarming DDoS Attack Statistics and Projections,†corero June 27, 2016
Javapipe “JavaPipe > DDoS Protection > Blog > 35 Types of DDoS Attacks Explained,†https://javapipe.com/ddos/blog/ddos-types/
Securelist ,Alexander Khalimonenko, Oleg Kupreev “DDOS attacks in Q1 2017,†May 2017
B. Casey, M. Park, Calif. Cyber security ventures 2017â€https://cybersecurityventures.com/ddos-attack-report-2017/â€
NETSCOUT “Arbor’s 13th Annual Worldwide Infrastructure Security Report†2017
. S. T. Zargar, J. Joshi, and D. Tipper, “A survey of defense mechanisms against distributed denial of service (DDoS) flooding attacks,†IEEE Commun. Surveys & Tutorials, vol. 15, no. 4, pp. 2046–2069, Fourth Quarter 2013.
“Riorey taxonomy of DDoS attacks, riorey taxonomy rev 2.3 2012,†RioRey Inc., Tech. Rep., 2012. [Online]. Available: http://www.riorey.
J. Mirkovic, P. Reiher “A Taxonomy of DDoS Attack and DDoS Defense Mechanisms†2004
S. Farahmandian, M. Zamani, A. Akbarabadi, J. M. Zadeh, S. M. Mirhosseini, and S. Farahmandian, “ A survey on methods to defend against DDoS attack in cloud computing,†in Proc. Recent Advances in Knowledge Engineering and System Science, Feb. 2013.
R. Braga, E. Mota, and A. Passito, “Lightweight DDoS flooding attack detection using nox/openflow,†in Proc. 35th IEEE Conf. Local Computer Networks (LCN), 2010, pp. 408–415.
S. Yadav, S. K. Subramanian, “Detection of Application Layer DDoS Attack by Feature Learning Using Stacked Autoencoder,†International Conference on Computational Techniques in Information and Communication Technologies (ICCTICT), 2016
K. Lee, J. Kim, K. H. Kwon, Y. Han, S. Kim “DDoS attack detection method using cluster analysis†2008 pp 1659-1665.
C. Wang, T. Miu, X. Luo§, and J. Wang, â€SkyShield: A Sketch-based Defense System Against Application Layer DDoS Attacks,†IEEE Transactions on Information Forensics and Security, vol. xx, no. xx, xxxx.
Z.Chen, G. Xu, V. Mahalingam, L. Ge, J. Nguyen, W. Yu, C. Lu, “A Cloud Computing Based Network Monitoring and Threat Detection System for Critical Infrastructures,†Volume 3, April 2016, Pages 10-23
X. Yuan, C. Li, X. Li, “DeepDefense: Identifying DDoS Attack via Deep Learningâ€, IEEE International Conference on Smart Computing (SMARTCOMP), 2017.
H. Luo, Z. Chen, J. Li, and Athanasios V. Vasilakos, “Preventing Distributed Denial-of-Service Flooding Attacks With Dynamic Path Identiï¬ers†IEEE Transactions on Information Forensics and Security, VOL. 12, NO. August 2017
Bi Meng, Wang Andi , Xu Jian, Zhou Fucai, “DDOS Attack Detection System based on Analysis of Users’ Behaviors for Application Layer,†IEEE International Conference on Computational Science and Engineering (CSE) and IEEE International Conference on Embedded and Ubiquitous Computing (EUC), 2017.
BahmanRashidi, Carol Fung, and Elisa Bertino, “A Collaborative DDoS Defence Framework Using Network Function Virtualizationâ€, IEEE Transactions on Information Forensics and Security, VOL. 12, NO., October 2017.
F. Luo, Patrick PK Chan, Z. Lin, Z. He, “Improving Robustness of Stacked Auto-Encoder Against Evasion Attack based on Weight Evenness,†Procceding of the International Conference on Wavelet Analysis and Pattern Recognition, Ningbo, China (ICWAPR), 2017.
Vincenzo Matta, Mario Di Mauro, and Maurizio Longo , “DDoS Attacks With Randomized Trafï¬c Innovation: Botnet Identiï¬cation Challenges and Strategiesâ€, IEEE Transactions on Information Forensics and Security, VOL. 12, NO. August 2017.
Y. Xu and Y. Liu, “ DDoS Attack Detection under SDN Context,†IEEE INFOCOM - The 35th Annual IEEE International Conference on Computer Communications, 2016.
P. K. Bediako, “Long Short-Term Memory Recurrent Neural Network for detecting DDoS flooding attacks within TensorFlow Implementation framework,†2017.
M. E. Ahmed and H. Kim, “DDoS Attack Mitigation in Internet of Things Using Software Defined Networking,†IEEE Third International Conference on Big Data Computing Service and Applications, 2017.
L. Yang, T. Zhang, J. Song, J. S. Wang, P. Chen ,“Defense of DDoS Attack for Cloud Computing,†IEEE International Conference onComputer Science and Automation Engineering (CSAE), 2012.