Analysis on DDoS Attacks and Solutions in Virtualized Cloud Environment

  IJCTT-book-cover
 
International Journal of Computer Trends and Technology (IJCTT)          
 
© 2018 by IJCTT Journal
Volume-58 Number-2
Year of Publication : 2018
Authors : Dr. Amit Kr. Chaturvedi, Punit Kumar, Dr. Kalpana Sharma
  10.14445/22312803/IJCTT-V58P112

MLA

Dr. Amit Kr. Chaturvedi, Punit Kumar, Dr. Kalpana Sharma "Analysis on DDoS Attacks and Solutions in Virtualized Cloud Environment". International Journal of Computer Trends and Technology (IJCTT) V58(2):76-81, April 2018. ISSN:2231-2803. www.ijcttjournal.org. Published by Seventh Sense Research Group.

Abstract
Cloud computing offers the services at SaaS, PaaS, and IaaS layers on “pay-per-use” basis. There are two major advantages of shifting on cloud computing, one is access of service online from anywhere and anytime and the second is the scalability i.e. users can demand the VMs, Storage, Servers, etc as much as required. The cloud servers will provide the resources as per the requirements of the users. The attackers are using these two qualities i.e. access of service from anywhere , anytime and scalability for attacking on the data saved on the server or the user’s data. In this paper, we have presented a study on the strategies of attack using bot-nets, DDoS attacks, and solutions proposed for the prevention from such attacks. The future of the botclouds is also discussed in this paper.

Reference
[1] R.V. Deshmukh, K.K. Devadkar, ―Understanding DDoS Attack & Its Effect In Cloud Environment‖, Procedia Computer Science 49 ( 2015 ) 202 – 210, 4th International Conference on Advances in Computing, Communication and Control (ICAC3’15).
[2] M. D. Firoozjaei, J. Jeong, Hoon Ko, H. Kim, ―Security challenges with network functions virtualization‖, Future Generation Computer Systems (2016), pp. 1-15.
[3] Jakóbik, A., Palmieri, F., Kołodziej, J., Stackelberg games for modeling defense scenarios against cloud security threats, Journal of Network and Computer Applications (2018), doi: 10.1016/j.jnca.2018.02.015
[4] Kassidy Clark Martijn Warnier Frances M. T. Brazier, BOTCLOUDS : The Future of Cloud-based Botnets?
[5] L. Coppolino, S. D’Antonio ,G.Mazzeo ,L. Romano, ―Cloud security: Emerging threats and current solutions‖ , Computers and Electrical Engineering (2016) pp. 1–15, ISSN :0045-7906, Elsevier
[6] W. Doua, Qi Chena, J. Chenb ―A confidence-based filtering method for DDoS attack defense in cloud environment‖, Future Generation Computer Systems 29 (2013) pp. 1838–1850
[7] N. Khana, A. Al-Yasirib, ―Identifying Cloud Security Threats to Strengthen Cloud Computing Adoption Framework‖, The 2nd International Workshop on Internet of Thing: Networking Applications and Technologies (IoTNAT’ 2016), Elsevier, Procedia Computer Science 94 ( 2016 ) pp. 485 – 490
[8] F. Lombardi, Roberto Di Pietro, ―Secure virtualization for cloud computing‖, Journal of Network and Computer Applications 34 (2011) pp. 1113–1122
[9] S. K. Majhia, S. K. Dhalb, ―Threat Modelling of Virtual Machine Migration Auction‖, International Conference on Information Security & Privacy (ICISP2015), 11-12 December 2015, Nagpur, INDIA, Procedia Computer Science 78 ( 2016 ) pp. 107 – 113
[10] O. Osanaiye, Kim-Kwang R. Choo and M. Dlodlo, ―Distributed Denial of Service (DDoS) Resilience in Cloud: Review and Conceptual Cloud DDoS Mitigation Framework‖, Journal of Network and Computer Applications, 2016
[11] A. Thilakarathne, J. I Wijayanayake, ―Security Challenges Of Cloud Computing‖, INTERNATIONAL JOURNAL OF SCIENTIFIC & TECHNOLOGY RESEARCH VOLUME 3, ISSUE 11, NOVEMBER 2014 ISSN 2277-8616
[12] S. Singh, Young-Sik Jeong and Jong Hyuk park, ―A Survey on Cloud Computing Security: Issues, Threats, and Solutions‖, Journal of Network and Computer Applications, 2016
[13] K. J. Singh, Tanmay De, ―MLP-GA based algorithm to detect application layer DDoS attack‖, Journal of Information Security and Applications 36 (2017) 145–153
[14] G. Somani, M. S. Gaur, D. Sanghi, M. Conti, M. Rajarajan,‖ DDoS victim service containment to minimize the internal collateral damages in cloud computing‖, Computers and Electrical Engineering (2016), pp. 1–15
[15] G. Somani, M. Gaur, D. Sanghi, M. Conti, Rajkumar Buyya, ―DDoS Attacks in Cloud Computing: Issues, Taxonomy, and Future Directions‖, Computer Communications (2017), pp. 1-22
[16] R. Trapero, J. Modic, M. Stopar, A. Tahaa, N. Suri, ―A novel approach to manage cloud security SLA incidents‖, Future Generation Computer Systems 72 (2017), pp. 193–205
[17] B. Wang, Y. Zheng, W. Lou, Y. T. Hou, ―DDoS attack protection in the era of cloud computing and Software-Defined Networking‖, Computer Networks 81 (2015), pp. 308–319
[18] Z. Wang, ―An elastic and resiliency defense against DDoS attacks onthecritical DNS authoritative infrastructure‖, Journal of Computer and System Sciences, 2017.

Keywords
Botnet, Botcloud, cloudcomputing, cybercriminal, virtualization, virtual machine, IaaS, PaaS, SaaS, resource pooling.