Taxonomy of DoS and DDoS attacks and desirable defense mechanism in a Cloud computing environment

被引:131
作者
Gupta, B. B. [1 ]
Badve, Omkar P. [1 ]
机构
[1] Natl Inst Technol Kurukshetra, Kurukshetra, Haryana, India
关键词
DoS; DDoS attacks; Cloud computing; Nonlinear time series model; GARCH model; Artificial neural network; SECURITY ISSUES; SERVICE; DESIGN;
D O I
10.1007/s00521-016-2317-5
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
As Cloud computing is reforming the infrastructure of IT industries, it has become one of the critical security concerns of the defensive mechanisms applied to secure Cloud environment. Even if there are tremendous advancements in defense systems regarding the confidentiality, authentication and access control, there is still a challenge to provide security against availability of associated resources. Denial-of-service (DoS) attack and distributed denial-of-service (DDoS) attack can primarily compromise availability of the system services and can be easily started by using various tools, leading to financial damage or affecting the reputation. These attacks are very difficult to detect and filter, since packets that cause the attack are very much similar to legitimate traffic. DoS attack is considered as the biggest threat to IT industry, and intensity, size and frequency of the attack are observed to be increasing every year. Therefore, there is a need for stronger and universal method to impede these attacks. In this paper, we present an overview of DoS attack and distributed DoS attack that can be carried out in Cloud environment and possible defensive mechanisms, tools and devices. In addition, we discuss many open issues and challenges in defending Cloud environment against DoS attack. This provides better understanding of the DDoS attack problem in Cloud computing environment, current solution space, and future research scope to deal with such attacks efficiently.
引用
收藏
页码:3655 / 3682
页数:28
相关论文
共 84 条
[1]   An efficient filter for denial-of-service bandwidth attacks [J].
Abdelsayed, S ;
Glimsholt, D ;
Leckie, C ;
Ryan, S ;
Shami, S .
GLOBECOM'03: IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE, VOLS 1-7, 2003, :1353-1357
[2]  
Abliz M, 2011, P NEW SEC PAR WORKSH
[3]  
Alomari E, 2014, INT CONF ADV COMMUN, P1265, DOI 10.1109/ICACT.2014.6779162
[4]  
Amazon VPC, AM VPC
[5]  
[Anonymous], IBM CLOUD COMP
[6]  
[Anonymous], 2014, FIR LOG RUL AN SEC A
[7]  
[Anonymous], COMM SOFTW NETW ICCS
[8]  
[Anonymous], 2014, HACK BREAK SERV OB W
[9]  
[Anonymous], 2013, International Journal of Trust Management in Computing and Communications
[10]  
[Anonymous], GOOGL APP ENG