A Survey on Methods to Defend against DDoS Attack in Cloud Computing

Cloud computing is a revolution in IT technology by providing a shared pool of virtualizes resources for its users to pay as they use. This technology is based on two crucial concepts as virtualization and abstraction, which increased the ability of on demand access through the available resources in the cloud without any investment in new infrastructure. Security is one of the most challenges for both cloud provider and cloud consumer. In recent years DDoS attack is one of the most serious threats against cloud computing. Since cloud built on the fundamental of distributed environment, it is easier for an intruder to launch a DDoS attack against available resources and services of a cloud computing environment. This paper introduces cloud computing, Virtualization and DDoS attack. A review and comparison of the existing methods against DDoS attack on cloud computing is presented as well. Key-Words: Cloud computing, virtualization, DDoS attack, threat, intruder, distributed environment

[1]  Mazdak Zamani,et al.  Improving the security of protected wireless internet access from insider attacks , 2012 .

[2]  Bing Zhang,et al.  Formal Discussion on Relationship between Virtualization and Cloud Computing , 2010, 2010 International Conference on Parallel and Distributed Computing, Applications and Technologies.

[3]  Yongzhao Zhan,et al.  Virtualization and Cloud Computing , 2019, CompTIA® A+® Complete Practice Tests.

[4]  Hossein Rouhani Zeidanloo,et al.  Botnet detection based on traffic monitoring , 2010, 2010 International Conference on Networking and Information Technology.

[5]  JongWon Kim,et al.  Study of Multistage Anomaly Detection for Secured Cloud Computing Resources in Future Internet , 2011, 2011 IEEE Ninth International Conference on Dependable, Autonomic and Secure Computing.

[6]  Pritesh Jain,et al.  A survey and analysis of cloud model-based security for computing secure cloud bursting and aggregation in renal environment , 2011, 2011 World Congress on Information and Communication Technologies.

[7]  Dongming Lu,et al.  Optimal control of DDoS defense with multi-resource max-min fairness , 2008, 2008 IEEE Conference on Cybernetics and Intelligent Systems.

[8]  Weimin Zheng,et al.  Defend Against Denial of Service Attack with VMM , 2009, 2009 Eighth International Conference on Grid and Cooperative Computing.

[9]  Honarbakhsh Shohreh,et al.  Dynamic Monitoring in Ad Hoc Network , 2012 .

[10]  Irfan Gul,et al.  Distributed Cloud Intrusion Detection Model , 2011 .

[11]  Christoph Meinel,et al.  Intrusion Detection in the Cloud , 2009, 2009 Eighth IEEE International Conference on Dependable, Autonomic and Secure Computing.

[12]  M. Janbeglou,et al.  Redirecting network traffic toward a fake DNS server on a LAN , 2010, 2010 3rd International Conference on Computer Science and Information Technology.

[13]  Mojtaba Alizadeh,et al.  A Survey on Attacks in RFID Networks , 2012 .

[14]  Mojtaba Alizadeh,et al.  Implementation and evaluation of lightweight encryption algorithms suitable for RFID , 2013 .

[15]  R. Chitra,et al.  Securing cloud from ddos attacks using intrusion detection system in virtual machine , 2013 .

[16]  Jeongnyeo Kim,et al.  Endpoint Mitigation of DDoS Attacks Based on Dynamic Thresholding , 2012, ICICS.

[17]  Randy H. Katz,et al.  A view of cloud computing , 2010, CACM.

[18]  Ming Li,et al.  An Adaptive Approach for Defending against DDoS Attacks , 2010 .

[19]  Mazdak Zamani,et al.  A survey on security issues of federated identity in the cloud computing , 2012, 4th IEEE International Conference on Cloud Computing Technology and Science Proceedings.

[20]  Hossein Rouhani Zeidanloo,et al.  A taxonomy of Botnet detection techniques , 2010, 2010 3rd International Conference on Computer Science and Information Technology.

[21]  Farzad Sabahi,et al.  Virtualization-level security in cloud computing , 2011, 2011 IEEE 3rd International Conference on Communication Software and Networks.

[22]  Mazdak Zamani,et al.  A confidential RFID model to prevent unauthorized access , 2011, 2011 5th International Conference on Application of Information and Communication Technologies (AICT).

[23]  Gnanasekaran Aghila,et al.  A Filter Tree Approach to Protect Cloud Computing against XML DDoS and HTTP DDoS Attack , 2012, ISI.