DDoS Attacks in Cloud Computing: Issues, Taxonomy, and Future Directions
نویسندگان
چکیده
Security issues related to the cloud computing are relevant to various stakeholders for an informed cloud adoption decision. Apart from data breaches, the cyber security research community is revisiting the attack space for cloud-specific solutions as these issues affect budget, resource management, and service quality. Distributed Denial of Service (DDoS) attack is one such serious attack in the cloud space. In this paper, we present developments related to DDoS attack mitigation solutions in the cloud. In particular, we present a comprehensive survey with a detailed insight into the characterization, prevention, detection, and mitigation mechanisms of these attacks. Additionally, we present a comprehensive solution taxonomy to classify DDoS attack solutions. We also provide a comprehensive discussion on important metrics to evaluate various solutions. This survey concludes that there is a strong requirement of solutions, which are designed keeping utility computing models in mind. Accurate auto-scaling decisions, multi-layer mitigation, and defense using profound resources in the cloud, are some of the key requirements of the desired solutions. In the end, we provide a definite guideline on effective solution building and detailed solution requirements to help the cyber security research community in designing defense mechanisms. To the best of our knowledge, this work is a novel attempt to identify the need of DDoS mitigation solutions involving multi-level information flow and effective resource management during the
منابع مشابه
RESCUE: Reputation based Service for Cloud User Environment
Exceptional characteristics of Cloud computing has replaced all traditional computing. With reduced resource management and without in-advance investment, it has been victorious in making the IT world to migrate towards it. Microsoft announced its office package as Cloud, which can prevent people moving from Windows to Linux. As this drift is escalating in an exponential rate, the cloud environ...
متن کاملDDoS Attacks, New DDoS Taxonomy and Mitigation Solutions – A Survey
Cloud computing has started to gain acceptance for adoption and implementation among organizations, however, this new technology area has already started to deal with security, performance and availability challenges. Within Cloud Security issues being paramount for the corporates, private enterprises, the denial of service attacks are rated as the highest priority threat to the cloud environme...
متن کاملDDoS Attacks: Tools, Mitigation Approaches, and Probable Impact on Private Cloud Environment
The future of the Internet is predicted to be on the cloud, resulting in more complex and more intensive computing, but possibly also a more insecure digital world. The presence of a large amount of resources organized densely is a key factor in attracting DDoS attacks. Such attacks are arguably more dangerous in private individual clouds with limited resources. This paper discusses several pro...
متن کاملDDoS Attacks, Detection Parameters and Mitigation in Cloud Environment
Cloud computing refers to providing on demand services and computing resources via Internet. The cloud environment has many security challenges among which DDoS attcks have maximum priority. Within Cloud Security issues being dominant for the private enterprises, the denial of service attacks are rated as the highest priority threat. This paper presents a review of DDoS attacks and parameters t...
متن کاملA Prevention of Ddos Attacks in Cloud Using Neif Techniques
In recent years, most of the organizations in the world have increasingly realized the importance of cloud platforms. The cloud computing is one of the developing segmenting of IT industry as well as a promising concept to the end users. However Cloud Computing has more applications but there are many challenges that are facing by a Cloud environment. In recent years, the major attacks in cloud...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- Computer Communications
دوره 107 شماره
صفحات -
تاریخ انتشار 2017