Journal of Engineering and Applied Sciences

Year: 2019
Volume: 14
Issue: 21
Page No. 8114 - 8120

A Conceptual Framework for Denial-of-Service Attack Mitigation and Prevention in Cloud Computing

Authors : NancyAwadallah Awad

References

Alani, M.M., 2016. Elements of Cloud Computing: Security a Survey of Key Practicalities. Springer, Berlin, Germany, USA., ISBN:978-3-319-41411-9, Pages: 55.

Ali-Eldin, A., J. Tordsson and E. Elmroth, 2012. An adaptive hybrid elasticity controller for cloud infrastructures. Proceedings of the IEEE Network Operations and Management Symposium, April 16-20, 2012, Maui, HI., pp: 204-212.

Alqahtani, S. and R.F. Gamble, 2015. DDoS attacks in service clouds. Proceedings of the 2015 48th Hawaii International Conference on System Sciences, January 5-8, 2015, IEEE, Kauai, Hawaii, USA., pp: 5331-5340.

Bakshi, A. and Y.B. Dujodwala, 2010. Securing cloud from DDOS attacks using intrusion detection system in virtual machine. Proceedings of the 2nd International Conference on Communication Software and Networks (ICCSN'10), February 26-28, 2010, IEEE, Singapore, ISBN:978-1-4244-5726-7, pp: 260-264.

Beitollahi, H. and G. Deconinck, 2012. Analyzing well-known countermeasures against distributed denial of service attacks. Comput. Commun., 35: 1312-1332.
CrossRef  |  Direct Link  |  

Bhuyan, M.H., H.J. Kashyap, D.K. Bhattacharyya and J.K. Kalita, 2013. Detecting distributed denial of service attacks: Methods, tools and future directions. Comput. J., 57: 537-556.
CrossRef  |  Direct Link  |  

Cha, B. and J. Kim, 2011. Study of multistage anomaly detection for secured cloud computing resources in future internet. Proceedings of the 2011 IEEE 9th International Conference on Dependable, Autonomic and Secure Computing, December 12-14, 2011, IEEE, Sydney, Australia, ISBN:978-1-4673-0006-3, pp: 1046-1050.

Chandola, V., A. Banerjee and V. Kumar, 2009. Anomaly detection: A survey. ACM. Comput. Surv., 41: 1-58.
CrossRef  |  Direct Link  |  

Cheng, J., J. Yin, Y. Liu, Z. Cai and M. Li, 2009. DDoS attack detection algorithm using IP address features. Proceedings of the International Workshop on Frontiers in Algorithmics, June 20-23, 2009, Springer, Berlin, Germany, ISBN:978-3-642-02269-2, pp: 207-215.

Choi, J., C. Choi, B. Ko and P. Kim, 2014. A method of DDoS attack detection using HTTP packet pattern and rule engine in cloud computing environment. Soft Comput., 18: 1697-1703.
CrossRef  |  

Choi, J., C. Choi, B. Ko, D. Choi and P. Kim, 2013. Detecting web based DDoS attack using MaPreduce operations in cloud computing environment. J. Internet Serv. Inf. Secur., 3: 28-37.
Direct Link  |  

De Oca, V.M., D.R. Jeske, Q. Zhang, C. Rendon and M. Marvasti, 2010. A cusum change-point detection algorithm for non-stationary sequences with application to data network surveillance. J. Syst. Software, 83: 1288-1297.
CrossRef  |  Direct Link  |  

Deshmukh, R.V. and K.K. Devadkar, 2015. Understanding ddos attack and its effect in cloud environment. Procedia Comput. Sci., 49: 202-210.
Direct Link  |  

Grobauer, B., T. Walloschek and E. Stocker, 2011. Understanding cloud computing vulnerabilities. IEEE Secur. Privacy, 9: 50-57.
CrossRef  |  Direct Link  |  

Jeyanthi, N., U. Barde, M. Sravani, V. Tiwari and N.C.S.N. Iyengar, 2013. Detection of distributed denial of service attacks in cloud computing by identifying spoofed IP. Intl. J. Commun. Networks Distrib. Syst., 11: 262-279.
CrossRef  |  Direct Link  |  

Karnwal, T., S. Thandapanii and A. Gnanasekaran, 2013. A Filter Tree Approach to Protect Cloud Computing against XML DDOS and HTTP DDOS ATTACK. In: Intelligent Informatics: Advances in Intelligent Systems and Computing, Abraham, A. and S. Thampi (Eds.). Springer, Berlin, Germany, ISBN:978-3-642-32062-0, pp: 459-469.

Karnwal, T., T. Sivakumar and G. Aghila, 2012. A comber approach to protect cloud computing against XML DDoS and HTTP DDoS attack. Proceedings of the 2012 IEEE Student’s International Conference on Electrical, Electronics and Computer Science, March 1-2, 2012, IEEE, Bhopal, India, ISBN:978-1-4673-1516-6, pp: 1-5.

Krishnan, D. and M. Chatterjee, 2012. An adaptive distributed intrusion detection system for cloud computing framework. Proceedings of the International Conference on Security in Computer Networks and Distributed Systems, October 11-12, 2012, Springer, Berlin, Germany, ISBN:978-3-642-34134-2, pp: 466-473.

Kumawat, H. and G. Meena, 2014. Characterization, detection and mitigation of low-rate DoS attack. Proceedings of the 2014 International Conference on Information and Communication Technology for Competitive Strategies, November 14-16, 2014, Udaipur, Rajasthan, India, ISBN:978-1-4503-3216-3, pp: 1-5.

Lonea, A.M., D.E. Popescu, O. Prostean and H. Tianfield, 2013. Evaluation of Experiments on Detecting Distributed Denial of Service (DDoS) Attacks in Eucalyptus Private Cloud. In: Soft Computing Applications: Advances in Intelligent Systems and Computing, Balas, V., J. Fodor, A. Varkonyi-Koczy, J. Dombi and L. Jain (Eds.). Springer, Berlin, Germany, USA., ISBN:978-3-642-33940-0, pp: 367-379.

Modi, C.N., D.R. Patel, A. Patel and R. Muttukrishnan, 2012. Bayesian classifier and snort based network intrusion detection system in cloud computing. Proceedings of the 2012 3rd International Conference on Computing, Communication and Networking Technologies (ICCCNT'12), July 26-28, 2012, IEEE, Coimbatore, India, pp: 1-7.

Osanaiye, O., K.K.R. Choo and M. Dlodlo, 2016. Distributed Denial Of Service (DDoS) resilience in cloud: Review and conceptual cloud DDoS mitigation framework. J. Netw. Comput. Appl., 67: 147-165.
Direct Link  |  

Ozcelik, I., 2015. DoS attack detection and mitigation. Ph.D Thesis, Clemson University, Clemson, South Carolina, USA.

Teng, S., C. Zheng, H. Zhu, D. Liu and W. Zhang, 2014. A cooperative intrusion detection model for cloud computing networks. Intl. J. Secur. Appl., 8: 107-118.
CrossRef  |  Direct Link  |  

Varadharajan, V. and U. Tupakula, 2014. Counteracting security attacks in virtual machines in the cloud using property based attestation. J. Network Comput. Appl., 40: 31-45.
CrossRef  |  Direct Link  |  

Wang, B., Y. Zheng, W. Lou and Y.T. Hou, 2014. DDoS attack protection in the era of cloud computing and software-defined networking. Proceedings of the 2014 IEEE 22nd International Conference on Network Protocols, October 21-24, 2014, IEEE, Raleigh, North Carolina, USA., pp: 624-629.

Wang, B., Y. Zheng, W. Lou and Y.T. Hou, 2015. DDoS attack protection in the era of cloud computing and software-defined networking. Comput. Netw., 81: 308-319.
Direct Link  |  

Wong, F. and C.X. Tan, 2014. A survey of trends in massive DDoS attacks and cloud-based mitigations. Intl. J. Network Secur. Appl., 6: 57-71.
CrossRef  |  Direct Link  |  

Yan, Q., F.R. Yu, Q. Gong and J. Li, 2015. Software-Defined Networking (SDN) and Distributed Denial of Service (DDoS) attacks in cloud computing environments: A survey, some research issues and challenges. IEEE. Commun. Surv. Tutorials, 18: 602-622.
CrossRef  |  Direct Link  |  

Yu, S., Y. Tian, S. Guo and D.O. Wu, 2013. Can we beat DDoS attacks in clouds?. IEEE. Trans. Parallel Distrib. Syst., 25: 2245-2254.
CrossRef  |  Direct Link  |  

Zargar, S.T., J. Joshi and D. Tipper, 2013. A survey of defense mechanisms against Distributed Denial of Service (DDoS) flooding attacks. IEEE. Commun. Surv. Tutorials, 15: 2046-2069.
CrossRef  |  Direct Link  |  

Design and power by Medwell Web Development Team. © Medwell Publishing 2024 All Rights Reserved