Distributed Denial of service attacks and its effects on Cloud environment- a survey

Security in this world of digital computing plays a typical role, since all the operations are automated and large volumes of data are being maintained in the servers. Cloud computing is one of the evolving technologies where a huge volume of storage is made on-line, data and services are also distributed. Because of its distributed nature, they have become easy targets for the intruders to exploit the information. The well known Distributed Denial of Service (DDoS) attack is the most prominent attacks in this area of computing. DDoS is the single largest threat to internet and internet of things. This paper provides a wide survey on various DDoS attacks, their vulnerabilities and countermeasures proposed against them. Also this paper provides an in-depth analysis on effects of DDoS attacks in the Cloud environment. Through the analysis done it will be useful for designing a secured cloud infrastructure which will abide the DDoS attacks.

[1]  Ruby B. Lee,et al.  Distributed Denial of Service: Taxonomies of Attacks, Tools, and Countermeasures , 2004, PDCS.

[2]  Vijay Varadharajan,et al.  A Practical Method to Counteract Denial of Service Attacks , 2003, ACSC.

[3]  Peter Mell,et al.  "The NIST Definition of Cloud Computing," Version 15 , 2009 .

[4]  Andrew B. Whinston,et al.  Defeating distributed denial of service attacks , 2000 .

[5]  Anindita Saha,et al.  A Detailed Analysis of the Issues and Solutions for Securing Data in Cloud , 2012 .

[6]  Puneet Zaroo,et al.  A Survey of DDoS attacks and some DDoS defense mechanisms , 2022 .

[7]  Gary C. Kessler,et al.  Defenses Against Distributed Denial of Service Attacks , 2001 .

[8]  Sandeep Mehmi,et al.  A Dual Mechanism for defeating DDoS Attacks in Cloud Computing Model , 2013 .

[9]  Anil Somayaji,et al.  Cloud Security : Attacks and Current Defenses , .

[10]  Geoffrey G. Xie,et al.  A Feedback Mechanism for Mitigating Denial of Service Attacks against Differentiated Services Clients , 2002 .

[11]  Jelena Mirkovic,et al.  Attacking DDoS at the source , 2002, 10th IEEE International Conference on Network Protocols, 2002. Proceedings..

[12]  Vamsi Popuri Intrusion detection for grid and cloud computing , 2011 .

[13]  N. Jeyanthi,et al.  An Enhanced Entropy Approach to Detect and Prevent DDoS in Cloud Environment , 2013, Int. J. Commun. Networks Inf. Secur..

[14]  Aikaterini Mitrokotsa,et al.  DDoS attacks and defense mechanisms: classification and state-of-the-art , 2004, Comput. Networks.

[15]  Bill Cheswick,et al.  Tracing Anonymous Packets to Their Approximate Source , 2000, LISA.

[16]  N. Jeyanthi,et al.  Packet Resonance Strategy: A Spoof Attack Detection and Prevention Mechanism in Cloud Computing Environment , 2012, Int. J. Commun. Networks Inf. Secur..

[17]  Sugata Sanyal,et al.  Survey on Security Issues in Cloud Computing and Associated Mitigation Techniques , 2012, ArXiv.

[18]  Muhammad Zakarya,et al.  Cloud QoS, High Availability & Service Security Issues with Solutions , 2011 .

[19]  Carla Merkle Westphall,et al.  Intrusion Detection for Grid and Cloud Computing , 2010, IT Professional.

[20]  Thomer M. Gil,et al.  MULTOPS: A Data-Structure for Bandwidth Attack Detection , 2001, USENIX Security Symposium.