Study of intrusion detection system for DDoS attacks in cloud computing

The cloud computing has grown as a promising business concept as well as one of the fastest growing segment of IT industry in the last few years. However the popularity of Cloud Computing is increasing day by day but there are some challenges that are faced by it. One of the main challenges of Cloud is security. From past few years, DDoS attacks have been placed first on the list of cloud attacks. DDos can have serious consequences, especially on the companies dependent on the internet for their business. Thus, to reduce an impact of DoS DDoS is one of the alarming issues. This paper focuses on the study of DDoS attacks in cloud and the Intrusion Detection Systems available to cope up with the issue.

[1]  Nur Izura Udzir,et al.  Hierarchical secure virtualization model for cloud , 2012, Proceedings Title: 2012 International Conference on Cyber Security, Cyber Warfare and Digital Forensic (CyberSec).

[2]  Christoph Meinel,et al.  Intrusion Detection in the Cloud , 2009, 2009 Eighth IEEE International Conference on Dependable, Autonomic and Secure Computing.

[3]  Akihiro Nakao,et al.  DDoS defense as a network service , 2010, 2010 IEEE Network Operations and Management Symposium - NOMS 2010.

[4]  Tao Zhang,et al.  Defense of DDoS attack for cloud computing , 2012, 2012 IEEE International Conference on Computer Science and Automation Engineering (CSAE).

[5]  Fabrizio Baiardi,et al.  CIDS: A Framework for Intrusion Detection in Cloud Systems , 2012, 2012 Ninth International Conference on Information Technology - New Generations.

[6]  Martin Roesch,et al.  Snort - Lightweight Intrusion Detection for Networks , 1999 .

[7]  Kotagiri Ramamohanarao,et al.  Survey of network-based defense mechanisms countering the DoS and DDoS problems , 2007, CSUR.

[8]  Nur Izura Udzir,et al.  A Cloud-based Intrusion Detection Service framework , 2012, Proceedings Title: 2012 International Conference on Cyber Security, Cyber Warfare and Digital Forensic (CyberSec).

[9]  R. Chitra,et al.  Securing cloud from ddos attacks using intrusion detection system in virtual machine , 2013 .

[10]  Ahmed Serhrouchni,et al.  A collaborative peer-to-peer architecture to defend against DDoS attacks , 2008, 2008 33rd IEEE Conference on Local Computer Networks (LCN).

[11]  Sugata Sanyal,et al.  Survey on Security Issues in Cloud Computing and Associated Mitigation Techniques , 2012, ArXiv.

[12]  P. Mell,et al.  The NIST Definition of Cloud Computing , 2011 .

[13]  Alina Madalina Lonea,et al.  Detecting DDoS Attacks in Cloud Computing Environment , 2012, Int. J. Comput. Commun. Control.

[14]  Yogita A. More,et al.  Intrusion Detection System for Cloud Computing , 2014 .

[15]  Andreas Blass,et al.  Inadequacy of computable loop invariants , 2001, TOCL.

[16]  Shui Yu,et al.  CBF: A Packet Filtering Method for DDoS Attack Defense in Cloud Environment , 2011, 2011 IEEE Ninth International Conference on Dependable, Autonomic and Secure Computing.

[17]  Ruby B. Lee,et al.  Distributed Denial of Service: Taxonomies of Attacks, Tools, and Countermeasures , 2004, PDCS.