A Study on the Impacts of DoS and DDoS Attacks on Cloud and Mitigation Techniques

被引:0
|
作者
Balobaid, Awatef [1 ]
Alawad, Wedad [1 ]
Aljasim, Hanan [1 ]
机构
[1] Oakland Univ, Dept Comp Sci & Engn, Rochester, MI 48309 USA
关键词
Denial of Service (DoS); Distributed Denial of Service (DDoS); OpenStack; cloud computing;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The use of cloud computing has increased significantly in recent years; therefore, many cloud platforms have become in demand such as OpenStack, AWS etc. One of the challenges in cloud computing is providing secure and reliable services. For the last few years, Denial of Service (DoS) and Distributed Denial of Service (DDoS) attacks are the biggest threats in cloud security. DoS and DDoS attacks are initiated by the hacker to make an online service occupied by compromising it with massive traffic from multiple sources. The aim of this paper is to study the impacts of several types DoS/DDoS attacks in the cloud, and the procedures that they use to affect the services' availability. Furthermore, several mitigation techniques are discussed as well. To achieve this study, research and simulation work has been done.
引用
收藏
页码:416 / 421
页数:6
相关论文
共 50 条
  • [31] DoS Attacks Flood Techniques
    Prudente, Lidia T.
    Aguirre, Eleazar A.
    Hdez, Alba F. Moreno
    Garcia, Ruben J. V.
    INTERNATIONAL JOURNAL OF COMBINATORIAL OPTIMIZATION PROBLEMS AND INFORMATICS, 2012, 3 (02): : 3 - 13
  • [32] A SECURED AND ENHANCED MITIGATION FRAMEWORK FOR DDOS ATTACKS
    Shah, Mujahid
    Khattak, ShahbazQadar
    Farooq, Muhammad
    Jan, Sadeeq
    Qureshi, MehtabEjaz
    Jan, Naveed
    Ahmed, Sheeraz
    JOURNAL OF MECHANICS OF CONTINUA AND MATHEMATICAL SCIENCES, 2019, 14 (06): : 985 - 1004
  • [33] Analysis of the Impacts of Flooding-Based DDoS Attacks on SDN-Enabled Cloud
    Chahal, Jasmeen Kaur
    Bhandari, Abhinav
    Behal, Sunny
    ADVANCED NETWORK TECHNOLOGIES AND INTELLIGENT COMPUTING, ANTIC 2023, PT II, 2024, 2091 : 192 - 204
  • [34] DDoS-FOCUS: A Distributed DoS Attacks Mitigation using Deep Learning Approach for a Secure IoT Network
    Al-khafajiy, Mohammed
    Al-Tameemi, Ghaith
    Baker, Thar
    2023 IEEE INTERNATIONAL CONFERENCE ON EDGE COMPUTING AND COMMUNICATIONS, EDGE, 2023, : 393 - 399
  • [35] DoS Attacks on Your Memory in the Cloud
    Zhang, Tianwei
    Zhang, Yinqian
    Lee, Ruby B.
    PROCEEDINGS OF THE 2017 ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (ASIA CCS'17), 2017, : 253 - 265
  • [36] Detection Techniques of DDoS Attacks: A Survey
    Kamboj, Priyanka
    Trivedi, Munesh Chandra
    Yadav, Virendra Kumar
    Singh, Vikash Kumar
    2017 4TH IEEE UTTAR PRADESH SECTION INTERNATIONAL CONFERENCE ON ELECTRICAL, COMPUTER AND ELECTRONICS (UPCON), 2017, : 675 - 679
  • [37] Analysis and Detection of DDoS Attacks on Cloud Computing Environment using Machine Learning Techniques
    Wani, Abdul Raoof
    Rana, Q. P.
    Saxena, U.
    Pandey, Nitin
    PROCEEDINGS 2019 AMITY INTERNATIONAL CONFERENCE ON ARTIFICIAL INTELLIGENCE (AICAI), 2019, : 870 - 875
  • [38] Detecting the Origin of DDoS Attacks in OpenStack Cloud Platform Using Data Mining Techniques
    Borisenko, Konstantin
    Rukavitsyn, Andrey
    Gurtov, Andrei
    Shorov, Andrey
    INTERNET OF THINGS, SMART SPACES, AND NEXT GENERATION NETWORKS AND SYSTEMS, NEW2AN 2016/USMART 2016, 2016, 9870 : 303 - 315
  • [39] Mitigation of DOS attacks through QoS regulation
    Garg, A
    Reddy, ALN
    MICROPROCESSORS AND MICROSYSTEMS, 2004, 28 (10) : 521 - 530
  • [40] Intrusion detection of DoS/DDoS and probing attacks for web services
    Zheng, J
    Hu, MZ
    ADVANCES IN WEB-AGE INFORMATION MANAGEMENT, PROCEEDINGS, 2005, 3739 : 333 - 344