1. bookVolume 17 (2017): Issue 4 (November 2017)
Journal Details
First Published
13 Mar 2012
Publication timeframe
4 times per year
Open Access

Mitigation of Distributed Denial of Service Attacks in the Cloud

Published Online: 30 Nov 2017
Volume & Issue: Volume 17 (2017) - Issue 4 (November 2017)
Page range: 32 - 51
Journal Details
First Published
13 Mar 2012
Publication timeframe
4 times per year

1. Ablett, E., D. Bellizzi, J. Byers, S. Cove, M. Dobrusin, A. Frey, J. Hanke. Encryption Advantages and Disadvantages. 2014. http://networking116.wikispaces.com/Encryption+Advantages+and+DisadvantagesSearch in Google Scholar

2. Al-Haidari, F., M. Sqalli, K. Salah. Enhanced EDo S-Shield for Mitigating EDo S Attacks Originating from Spoofed IP Addresses. - In: Proc. of 11th Int. Conf. Trust Secur. Priv. Comput. Commun., IEEE, 2012 [Cited 16 December 2016], pp. 1167-1174. http://ieeexplore.ieee.org/lpdocs/epic03/wrapper.htm?arnumber=629610910.1109/TrustCom.2012.146Search in Google Scholar

3. Alosaimi, W., K. Al-Begain. A New Method to Mitigate the Impacts of Economical Denial of Sustainability Attacks Against the Cloud. - In: Proc. of 14th Annu. Post. Grad. Symp. Converg. Telecommun. Netw. Broadcating. Liverpool John Moores University, Liverpool, UK, 2013, pp. 116-121.Search in Google Scholar

4. Aslan, T. Cloud Physical Security Considerations. IBM Cloud, 2012 [Cited 15 February 2017]. http://thoughtsoncloud.com/index.php/2012/02/cloud-physical-security-considerations/Search in Google Scholar

5. Beitollahi, H., G. Deconinc k. FOSe L: Filtering by Helping an Overlay Security Layer to Mitigate Do S Attacks. - In: Proc. of 7th IEEE Int. Symp. Netw. Comput. Appl., IEEE, July 2008 [Cited 16 December 2016], pp. 19-28. http://ieeexplore.ieee.org/lpdocs/epic03/wrapper.htm?arnumber=4579635Search in Google Scholar

6. Beitollahi, H., G. Deconinc k. Analyzing Well-Known Countermeasures Against Distributed Denial of Service Attacks. - Comput. Commun., Elsevier B. V., Vol. 35, Jun 2012, No 11 [Cited 8 October 2016], pp. 1312-1332. http://linkinghub.elsevier.com/retrieve/pii/S014036641200121110.1016/j.comcom.2012.04.008Search in Google Scholar

7. Chen, E. Y. Detecting TCP-Based DDo S Attacks by Linear Regression Analysis. Signal Process Inf. Technol. - In: Proc. of 5th IEEE Int. Symp., Athens, IEEE, 2005, pp. 381-386.Search in Google Scholar

8. Choi, Y., J. Oh, J. Jang, J. Ryou. Integrated DDo S Attack Defense Infrastructure for Effective Attack Prevention. - In: Proc. of 2nd IEEE Int. Conf. Inf. Technol. Converg. Serv., IEEE, 2010, pp. 1-6.10.1109/ITCS.2010.5581263Search in Google Scholar

9. Chopade, S. S., K. U. Pandey, D. S. Bhade. Securing Cloud Servers Against Flooding Based DDOS Attacks. - In: Proc. of Int. Conf. Commun. Syst. Netw. Technol., IEEE, 2013 [Cited 8 October 2016], pp. 524-528. http://ieeexplore.ieee.org/lpdocs/epic03/wrapper.htm?arnumber=652445110.1109/CSNT.2013.114Search in Google Scholar

10. Du, P., A. Nakao. DDo S Defense asa Network Service. - In: Proc. of IEEE Netw. Oper. Manag. Symp. (NOMS’10), IEEE, 2010, 894-897. http://ieeexplore.ieee.org/lpdocs/epic03/wrapper.htm?arnumber=5488345Search in Google Scholar

11. ENISA. Cloud Computing Risk Assessment. Eur. Netw. Inf. Secur. Agency, 2009, pp. 9-10. http://www.enisa.europa.eu/act/rm/files/deliverables/cloud-computing-risk-assessmentSearch in Google Scholar

12. Fortinet, C. Network and Physical Security in the Cloud. - In: Proc. of Asia Cloud Forum, 2011 [Cited 14 August 2016]. http://www.asiacloudforum.com/content/network-and-physical-security-cloud10.1016/S1353-4858(11)70040-XSearch in Google Scholar

13. Foster, I., Y. Zhao, I. Raicu, S. Lu. Cloud Computing and Grid Computing 360. - In: Proc. of Grid Comput. Environ. Work (GCE’08), IEEE, 2008, pp. 1-10.10.1109/GCE.2008.4738445Search in Google Scholar

14. Heng, C. Security Issues in Writing PHP Scripts-And How PHP 4.1.0/4.2.0+ Will Change Your Scripts. 2011. http://www.thesitewizard.com/archive/phpsecurity.shtmlSearch in Google Scholar

15. Hoff, C. Cloud Computing Security: From DDo S (Distributed Denial of Service) to EDo S (Economic Denial of Sustainability). - Ration. Surviv., 2008 [Cited 27 September 2016]. http://rationalsecurity.typepad.com/blog/2008/11/cloud-computing-security-from-ddosdistributed-denial-of-service-to-edos-economic-denial-of-sustaina.htmlSearch in Google Scholar

16. Hoff, C. A Couple of Follow-Ups on The EDo S (Economic Denial of Sustainability) Concept. - Ration. Surviv., 2009 [Cited 26 January 2013]. http://www.rationalsurvivability.com/blog/2009/01/a-couple-of-follow-ups-on-the-edoseconomic-denial-of-sustainability-concept/Search in Google Scholar

17. Intel. What’s Holding Back the Cloud?, 2012 [Cited 26 September 2016]. http://www.intel.com/content/www/us/en/cloud-computing/whats-holding-back-thecloud-peer-research-report.htmlSearch in Google Scholar

18. Jemec, M. Ethernet Packet Generator. 2014. http://sourceforge.net/projects/packeth/files/Search in Google Scholar

19. Jin, X., E. Keller, J. Rexfor d. Virtual Switching withouta Hypervisor fora More Secure Cloud. - In: Proc. of 2nd USENIX Work Hot Top Manag. Internet, Cloud, Enterp. Networks Serv. Hot-ICE’12, 2012, pp. 1-6.Search in Google Scholar

20. Kandula, S., D. Katabi, M. Jacob, A. Berger. Botz-4-Sale: Surviving Organized DDo S Attacks that Mimic Flash Crowds. - In: Proc. of 2nd Symp. Networked Syst. Des. Implement, 2005, pp. 287-300. http://dl.acm.org/citation.cfm?id=1251224Search in Google Scholar

21. Kaur, K., S. Vashisht. Data Separation Issues in Cloud Computing. - Int. J. Adv. Res. Eng. Technol., Vol. 1, 2013, No X, pp. 26-29.Search in Google Scholar

22. Keromytis, A., V. Misra, D. Rubenstein. SOS: Secure Overlay Services. - In: Proc. of SIGCOMM, ACM, 2002, pp. 61-72.Search in Google Scholar

23. Khan, A., N. Fisal, S. Hussai n. Man-in-the-Middle Attack and Possible Solutions on Wimax 802. - In: Proc. of 16j. Int. Conf. Recent Emerg. Adv. Technol. Eng. (i CREATE’09), 2009.Search in Google Scholar

24. Khor, S., A. Nakao. Daa S: DDo S Mitigation-as-a-Service. - In: Proc. of IEEE/IPSJ Int. Symp. Appl. Internet, IEEE, 2011 [Cited 6 November 2012], pp. 160-171. http://ieeexplore.ieee.org/lpdocs/epic03/wrapper.htm?arnumber=600414710.1109/SAINT.2011.30Search in Google Scholar

25. Kumar, M., P. Sujatha, V. Kalva, R. Nagori, A. Katukojwal a. Mitigating Economic Denial of Sustainability (EDo S) in Cloud Computing Using In-Cloud Scrubber Service. - In: Proc. of 4th Int. Conf. Comput. Intell. Commun. Networks., IEEE, 2012 [Cited 25 January 2017], pp. 535-539. http://ieeexplore.ieee.org/lpdocs/epic03/wrapper.htm?arnumber=6375171Search in Google Scholar

26. Kuyoro, S., F. Ibikunle, O. Awodel e. Cloud Computing Security Issues and Challenges. - Int. J. Comput. Networks, Vol. 3, 2011, No 5, pp. 247-252.Search in Google Scholar

27. Lakshminar ayanan, K., D. Adkins, A. Perrig, I. Stoica. Taming IP Packet Flooding Attacks. - ACM SIGCOMM Comput. Commun. Rev., Vol. 34, 2004, No 1, pp. 45-50.10.1145/972374.972383Search in Google Scholar

28. Lin, C., C. Lee, J. Liu, C. Chen. A Detection Scheme for Flooding Attack on Application Layer Based on Semantic Concept. - IEEE, 2010, pp. 385-389.10.1109/COMPSYM.2010.5685483Search in Google Scholar

29. Lin, C.-H., J.-C. Liu, C.-C. Lien. Detection Method Based on Reverse Proxy Against Web Flooding Attacks. - In: Proc. of 8th Int. Conf. Intell. Syst. Des. Appl., IEEE, November 2008 [Cited 29 Jun 2016], pp. 281-284. http://ieeexplore.ieee.org/lpdocs/epic03/wrapper.htm?arnumber=4696475Search in Google Scholar

30. Liu, W. Research on Do S Attack and Detection Programming. - In: Proc. of Third Int. Symp. Intell. Inf. Technol. Appl., IEEE, 2009 [Cited 29 March 2017], pp. 207-210. http://ieeexplore.ieee.org/lpdocs/epic03/wrapper.htm?arnumber=5368799Search in Google Scholar

31. Mallikarjuna, B., P. Venkata Krishn a. OLB: A Nature Inspired Approach for Load Balancing in Cloud Computing. - Cybernetics and Information Technologies, Vol. 15, 2015, No 4, pp. 138-148.10.1515/cait-2015-0060Search in Google Scholar

32. Meier, J., A. Mackman, M. Dunner, S. Vasireddy, R. Escamilla, M. A. Improving Web Application Security Threats and Countermeasures. - MSDN, 2003. http://msdn.microsoft.com/en-us/library/ff649874.aspxSearch in Google Scholar

33. Mell, P., T. Grance. The NIST Definition of Cloud Computing. - National Institute of Standards and Technology, Vol. 53, 2009, No 6, 50 p. http://csrc.nist.gov/groups/SNS/cloud-computing/cloud-def-v15.docSearch in Google Scholar

34. Morein, W., A. Stavrou, D. Cook, A. Keromytis, V. Misra, D. Rubenstein. Using Graphic Turing Tests to Counter Automated DDo S Attacks Against Web Servers. - In: Proc. of 10th ACM Conf. Comput. Commun. Secur. (CCS’03). USA, New York, ACM Press, 2003, p. 8. http://portal.acm.org/citation.cfm?doid=948109.94811410.1145/948109.948114Search in Google Scholar

35. Mukundrao, J., G. Vikram. Enhancing Security in Cloud Computing. - Inf. Knowl. Manag., Vol. 1, 2011, No 1, pp. 40-45. Search in Google Scholar

36. Newman, R. Cybercrime, Identity Theft, and Fraud: Practicing Safe Internet - Network Security Threats and Vulnerabilities. - Int. J. Comput. Appl., ACM, Vol. 9, 2006, No 12, pp. 11-15.10.1145/1231047.1231064Search in Google Scholar

37. Osanaiye, O., K. Choo, M. Dlodlo. Distributed Denial of Service (DDo S) Resilience in Cloud: Review and Conceptual Cloud DDo S Mitigation Framework. - Journal of Network and Computer Applications, pp. 147-165.10.1016/j.jnca.2016.01.001Search in Google Scholar

38. Peng, T., C. Leckie, K. Ramamohanara o. Survey of Network-Based Defense Mechanisms Countering the Do Sand DDo S Problems. - ACM Computing Surveys, Vol. 39, 2007, No 1, pp. 1-42. 10.1145/1216370.1216373Search in Google Scholar

39. Piscitello, D. Anatomy ofa DNS DDo S Amplification Attack. 2011. http://www.watchguard.com/infocenter/editorial/41649.aspSearch in Google Scholar

40. Raja, S., S. Ramaia h. CCDEA: Consumer and Cloud. - DEA Based Trust Assessment Model for the Adoption of Cloud Services, Vol. 16, 2016, No 3, pp. 52-69.10.1515/cait-2016-0034Search in Google Scholar

41. Raju, B., P. Swarna, M. Rao. Privacy and Security Issues of Cloud Computing. - Int. J., Vol. 1, 2011, No 2, pp. 128-136. Search in Google Scholar

42. Ramgovind, S., M. Eloff, E. Smith. The Management of Security in Cloud Computing. - Inf. Secur., South Africa, IEEE, 2010, pp. 1-7. http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=558829010.1109/ISSA.2010.5588290Search in Google Scholar

43. Rittinghouse, J. W., J. F. Ransom e. Cloud Computing: Implementation, Management, and Security. Boca Raton, CRC Press, 2010.Search in Google Scholar

44. Roberts, J., W. Al-Hamdan i. Who Can You Trust in the Cloud? - In: Proc. of Inf. Secur. Curric. Dev. Conf. (Info Sec CD’11), ACM Press, 2011, pp. 15-19. http://dl.acm.org/citation.cfm?id=2047456.204745810.1145/2047456.2047458Search in Google Scholar

45. Rouse, M. Virtualization Sprawl (VM Sprawl), 2004. http://whatis.techtarget.com/definition/virtualization-sprawl-virtual-server-sprawlSearch in Google Scholar

46. Sabahi, F. Virtualization-Level Security in Cloud Computing. - Communication Software Networks, IEEE, 2011, pp. 250-254.10.1109/ICCSN.2011.6014716Search in Google Scholar

47. Sandar, V., S. Shenai. Economic Denial of Sustainability (EDo S) in Cloud Services Using HTTPand XML Based DDo S Attacks. - Int. J. Comput. Appl., Vol. 41, 31 March 2012, No 20, pp. 11-16. http://research.ijcaonline.org/volume41/number20/pxc3878063.pdf10.5120/5807-8063Search in Google Scholar

48. Sangroya, A., S. Kumar, J. Dhok, V. Varma. Towards Analyzing Data Security Risks in Cloud Computing Environments. - ICISTM, 2010, pp. 255-265.10.1007/978-3-642-12035-0_25Search in Google Scholar

49. Schwartz, M. New Virtualization Vulnerability Allows Escape to Hypervisor Attacks. 2012. http://www.darkreading.com/risk-management/new-virtualization-vulnerabilityallows-escape-to-hypervisor-attacks/d/d-id/1104823?Search in Google Scholar

50. Shynu, P., J. Singh. A Comprehensive Survey and Analysis on Access Control Schemes in Cloud Environment. - Cybernetics and Information Technologies, Vol. 16, 2016, No 1, pp. 19-38.10.1515/cait-2016-0002Search in Google Scholar

51. Sitaram, D., G. Manjunat h. Cloud Security Requirements and Best Practices. - Mov. to Cloud Dev. Apps. New World Cloud Comput., USA, Elsevier, 2012, p. 309.10.1016/B978-1-59749-725-1.00007-XSearch in Google Scholar

52. Slack, E. How do You Know That“Delete” Means Delete in Cloud Storage? 2011 [Cited 14 April 2017]. http://www.storageswitzerland.com/Articles/Entries/2011/8/16_How_do_you_know_that_Delete_means_Delete_in_Cloud_Storage.htmlSearch in Google Scholar

53. Somani, J., M. Gaur, D. Sanghi, M. Counti, R. Buyya. DDo S Attacks in Cloud Computing: Issues, Taxonomy, and Future Directions. - DDo S Attacks in Cloud Computing. Vol. 107, pp. 30-48.10.1016/j.comcom.2017.03.010Search in Google Scholar

54. Sqalli, M., F. Al-Haidari, K. Salah. EDo S-Shield - A Two-Steps Mitigation Technique Against EDo S Attacks in Cloud Computing. - In: Proc. of 4th IEEE Int. Conf. Util. Cloud Comput., IEEE, 2011 [Cited 1 November 2016], pp. 49-56. http://ieeexplore.ieee.org/lpdocs/epic03/wrapper.htm?arnumber=612348010.1109/UCC.2011.17Search in Google Scholar

55. Steve, H. Cloud Computing Made Clear. - Bus Week, Vol. 59, 2008, No 1. Search in Google Scholar

56. Trappler, T. When Your Data’s in the Cloud, Is It Still Your Data? Computer World. - Comput. World, 2012. http://www.computerworld.com/s/article/9223479/When_your_data_s_in_the_cloud_is_it_still_your_data_Search in Google Scholar

57. Vaidya, V. Virtualization Vulnerabilities and Threats : A Solution White Paper. - Red Cannon Secur. Inc., 2009 [Cited 13 April 2016], pp. 1-7. http://www.redcannon.com/vDefense/VM_security_wp.pdfSearch in Google Scholar

58. Virtualizationadmin. What is VM Sprawl? 2008. http://www.virtualizationadmin.com/faq/vm-sprawl.htmlSearch in Google Scholar

59. Wang, R., X. Sun, X. Yang, H. Hu. Cloud Computing and Extreme Learning Machine for a Distributed Energy Consumption Forecasting in Equipment-Manufacturing Enterprises. - Cybernetics and Information Technologies, Vol. 16, 2016, No 6, pp. 83-97.10.1515/cait-2016-0079Search in Google Scholar

60. Xie, Y., S. Yu. Monitoring the Application-Layer DDo S Attacks for IEEE. - ACM Trans Netw., Vol. 17, 2009, No 1, pp. 15-25.10.1109/TNET.2008.925628Search in Google Scholar

61. Yatagai, T., T. Isohara, I. Sasase. Detection of HTTP-GET Flood Attack Based on Analysis of Page Access Behavior. - In: Proc. of IEEE Pacific Rim Conf. Communication Computer Signal Process, IEEE, 2007, pp. 232-235.10.1109/PACRIM.2007.4313218Search in Google Scholar

62. Ying, L., B. Dong. The Algebraic Operations and Their Implementation Based ona Two-Layer Cloud Data Model, Vol. 16, 2016, No 6, pp. 5-26.10.1515/cait-2016-0074Search in Google Scholar

63. Zhou, M., R. Zhang, W. Xie, W. Qian, A. Zhou. Security and Privacy in Cloud Computing: A Survey. - In: Proc. of 6th Int. Conf. Semant. Knowl. Grids. IEEE, 2010, pp. 105-112. http://ieeexplore.ieee.org/lpdocs/epic03/wrapper.htm?arnumber=5663489Search in Google Scholar

Recommended articles from Trend MD