A Review of Biologically Inspired Algorithms in a Cloud Environment to Combat DDoS Attacks

Cloud computing offers internet-based services to access various on-demand resources by overcoming the necessity of centralized computing. There are plenty of challenges, like privacy, security, load balancing, resource provisioning, existing in this virtualized environment. Among them, security is one of the major complications. Concerning the security and privacy issues, distributed denial of service (DDoS) attacks can cause great damage to the availability of cloud services and resources. Till now, attack mitigation strategies residues is an on-going research challenge due to the attack tendency to advance in sophistication and ease of implementation. Moreover, cloud service customers, as well as providers, need to be observant in understanding the menaces of DDoS attacks. The crux of such attack mitigation mechanism is to assure early and fast detection of illegitimate entries into the network. To address such monitoring and detecting mechanism, this paper aims to address various nature-inspired algorithms which are having the propensity to resolve malware issues, such as DDoS attacks, naturally by offering an optimized solution.

[1]  Emilio Leonardi,et al.  Self-Chord: A Bio-Inspired P2P Framework for Self-Organizing Distributed Systems , 2010, IEEE/ACM Transactions on Networking.

[2]  Saeed Jalili,et al.  An Ant Colony Optimization Algorithm for Network Vulnerability Analysis , 2006 .

[3]  Angelos D. Keromytis,et al.  MOVE: An End-to-End Solution to Network Denial of Service , 2005, NDSS.

[4]  Nitin Pandey,et al.  Analysis and Countermeasures for Security and Privacy Issues in Cloud Computing , 2018, System Performance and Management Analytics.

[5]  Ehab Al-Shaer,et al.  Agile virtualized infrastructure to proactively defend against cyber attacks , 2015, 2015 IEEE Conference on Computer Communications (INFOCOM).

[6]  L. Javier García-Villalba,et al.  Adaptive artificial immune networks for mitigating DoS flooding attacks , 2018, Swarm Evol. Comput..

[7]  Ehab Al-Shaer,et al.  Openflow random host mutation: transparent moving target defense using software defined networking , 2012, HotSDN '12.

[8]  Fei Li,et al.  A moving target DDoS defense mechanism , 2014, Comput. Commun..

[9]  Mousa Taghizadeh Manavi Defense mechanisms against Distributed Denial of Service attacks : A survey , 2018, Comput. Electr. Eng..

[10]  Indraneel Sreeram,et al.  HTTP flood attack detection in application layer using machine learning metrics and bio inspired bat algorithm , 2019, Applied Computing and Informatics.

[11]  Andrews Jeyaraj,et al.  Recent security challenges in cloud computing , 2018, Comput. Electr. Eng..