A Detection Algorithm for DoS Attack in the Cloud Environment

Cloud Computing provides an easy access to the end users i.e. users can access the services from wherever they want to without concerning about the storage, management, and cost and so on. With an increase in its number of users per day, threat for protecting the data residing in the Cloud is also increasing. The more information about individuals and companies is placed in the Cloud; more concerns are arising about how secure an environment it is. This paper focuses on security perspective of Cloud Computing. We discuss about the DoS attack in the cloud environment and propose a detection algorithm for the attack.

[1]  Jugal K. Kalita,et al.  Detecting Distributed Denial of Service Attacks: Methods, Tools and Future Directions , 2014, Comput. J..

[2]  Timothy Grance,et al.  Cloud Computing Synopsis and Recommendations: Recommendations of the National Institute of Standards and Technology , 2012 .

[3]  Alex Delis,et al.  An Inline Detection and Prevention Framework for Distributed Denial of Service Attacks , 2007, Comput. J..

[4]  Hong Zhu,et al.  NetBouncer: client-legitimacy-based high-performance DDoS filtering , 2003, Proceedings DARPA Information Survivability Conference and Exposition.

[5]  Shubhashis Sengupta,et al.  Cloud Computing Security--Trends and Research Directions , 2011, 2011 IEEE World Congress on Services.

[6]  Vasilios Katos,et al.  Real time DDoS detection using fuzzy estimators , 2012, Comput. Secur..

[7]  Kotagiri Ramamohanarao,et al.  Proactively Detecting Distributed Denial of Service Attacks Using Source IP Address Monitoring , 2004, NETWORKING.

[8]  Raouf Boutaba,et al.  FireCol: A Collaborative Protection Network for the Detection of Flooding DDoS Attacks , 2012, IEEE/ACM Transactions on Networking.

[9]  Jelena Mirkovic,et al.  Source-end DDoS defense , 2003, Second IEEE International Symposium on Network Computing and Applications, 2003. NCA 2003..

[10]  A. Rungsawang,et al.  Distributed denial of service detection using TCP/IP header and traffic measurement analysis , 2004, IEEE International Symposium on Communications and Information Technology, 2004. ISCIT 2004..

[11]  Kai Hwang,et al.  Collaborative Detection of DDoS Attacks over Multiple Network Domains , 2007, IEEE Transactions on Parallel and Distributed Systems.

[12]  Thomer M. Gil,et al.  MULTOPS: A Data-Structure for Bandwidth Attack Detection , 2001, USENIX Security Symposium.

[13]  Yi Zhang,et al.  A real-time DDoS attack detection and prevention system based on per-IP traffic behavioral analysis , 2010, 2010 3rd International Conference on Computer Science and Information Technology.

[14]  Wanlei Zhou,et al.  Low-Rate DDoS Attacks Detection and Traceback by Using New Information Metrics , 2011, IEEE Transactions on Information Forensics and Security.

[15]  Rasool Jalili,et al.  Detection of Distributed Denial of Service Attacks Using Statistical Pre-processor and Unsupervised Neural Networks , 2005, ISPEC.

[16]  Wuu Yang,et al.  DDoS Detection and Traceback with Decision Tree and Grey Relational Analysis , 2009, 2009 Third International Conference on Multimedia and Ubiquitous Engineering.