A Review of Techniques to Detect and Prevent Distributed Denial of Service (DDoS) Attack in Cloud Computing Environment

Cloud computing has become one of the most demanding services over the internet. It has gained remarkable fame for past few years.But it is under the severe threats of internet security. One of the severe threats is Distributed Denial of Service (DDoS). DDoS occurs when a huge amount of packets are sent to a server from various computers. Botnet is one of the major causes that launch DDoS attack. Botnet is actually a network of bots or zombie computers that are under the control of attacker. Several techniques are available in the literature that provides solution to avoid DDoS attack.A survey on DDoS detection and prevention techniques and their comparative analysishave been done in this paper.

[1]  S. Selvakumar,et al.  Distributed Denial-of-Service (DDoS) Threat in Collaborative Environment - A Survey on DDoS Attack Tools and Traceback Mechanisms , 2009, 2009 IEEE International Advance Computing Conference.

[2]  Jung-Min Park,et al.  A Divide-and-Conquer Strategy for Thwarting Distributed Denial-of-Service Attacks , 2007, IEEE Transactions on Parallel and Distributed Systems.

[3]  Brij B. Gupta,et al.  A Recent Survey on DDoS Attacks and Defense Mechanisms , 2011 .

[4]  Christoph Meinel,et al.  Intrusion Detection in the Cloud , 2009, 2009 Eighth IEEE International Conference on Dependable, Autonomic and Secure Computing.

[5]  H. Jonathan Chao,et al.  PacketScore: a statistics-based packet filtering scheme against distributed denial-of-service attacks , 2006, IEEE Transactions on Dependable and Secure Computing.

[6]  V. Sangeetha,et al.  Entropy based Anomaly Detection System to Prevent DDoS Attacks in Cloud , 2013, ArXiv.

[7]  H. Jonathan Chao,et al.  ALPi: A DDoS Defense System for High-Speed Networks , 2006, IEEE Journal on Selected Areas in Communications.

[8]  Shui Yu,et al.  CBF: A Packet Filtering Method for DDoS Attack Defense in Cloud Environment , 2011, 2011 IEEE Ninth International Conference on Dependable, Autonomic and Secure Computing.

[9]  B. B. Gupta,et al.  Defending against Distributed Denial of Service Attacks: Issues and Challenges , 2009, Inf. Secur. J. A Glob. Perspect..

[10]  A. B. M. Shawkat Ali,et al.  Above the Trust and Security in Cloud Computing: A Notion Towards Innovation , 2010, 2010 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing.

[11]  Wanlei Zhou,et al.  Low-Rate DDoS Attacks Detection and Traceback by Using New Information Metrics , 2011, IEEE Transactions on Information Forensics and Security.

[12]  M Hasan Islam,et al.  Cloud computing security auditing , 2011, The 2nd International Conference on Next Generation Information Technology.

[13]  Wanlei Zhou,et al.  Chaos theory based detection against network mimicking DDoS attacks , 2009, IEEE Communications Letters.

[14]  Sateesh K. Peddoju,et al.  Packet Monitoring Approach to Prevent DDoS Attack in Cloud Computing , 2012 .

[15]  B. B. Gupta,et al.  FVBA: A combined statistical approach for low rate degrading and high bandwidth disruptive DDoS attacks detection in ISP domain , 2008, 2008 16th IEEE International Conference on Networks.

[16]  Chen Eric Yi-Hua,et al.  Defending against distributed denial of service attacks , 2005 .

[17]  N. Venkatesu,et al.  An Effective Defense Against Distributed Denial of Service in GRID , 2008, 2008 First International Conference on Emerging Trends in Engineering and Technology.

[18]  S.G. Pukale,et al.  Detection and defense against DDoS attack with IP spoofing , 2008, 2008 International Conference on Computing, Communication and Networking.

[19]  Peter Reiher,et al.  A taxonomy of DDoS attack and DDoS defense mechanisms , 2004, CCRV.

[20]  Esraa Alomari,et al.  Botnet-based Distributed Denial of Service (DDoS) Attacks on Web Servers: Classification and Art , 2012, ArXiv.

[21]  B. B. Gupta,et al.  Enhanced CBF Packet Filtering Method to Detect DDoS Attack in Cloud Computing Environment , 2013, ArXiv.

[22]  Cheng Jin,et al.  Defense Against Spoofed IP Traffic Using Hop-Count Filtering , 2007, IEEE/ACM Transactions on Networking.

[23]  Alina Madalina Lonea,et al.  Detecting DDoS Attacks in Cloud Computing Environment , 2012, Int. J. Comput. Commun. Control.