Using Features of Cloud Computing to Defend Smart Grid against DDoS Attacks
نویسندگان
چکیده
Smart Grid (SG) poses operational and business challenges for energy suppliers and utility companies that are readily met by Cloud Computing (CC). Given the distributed nature of SG and CC it is inevitable that the two technologies will become integrated. In this paper we discuss the risks and opportunities that CC presents to energy suppliers and utility companies, and consider what inherent attributes of CC may be able to be leveraged to improve Distributed Denial of Service (DDoS) defense for SG. An extended literature review is performed to determine which DDoS defense techniques can be enhanced by CC and utilized to defend the SG. We propose that, when risks are properly mitigated, the deployment of CC can be seen as an overall benefit, where its inherent attributes can be harnessed to make the SG more secure and help mitigate the threat of a crippling DDoS attack. Keywords—Smart Grid, Cloud Computing, DDoS, Cyber Security, DDoS Defense, Critical Infrastructure
منابع مشابه
RESCUE: Reputation based Service for Cloud User Environment
Exceptional characteristics of Cloud computing has replaced all traditional computing. With reduced resource management and without in-advance investment, it has been victorious in making the IT world to migrate towards it. Microsoft announced its office package as Cloud, which can prevent people moving from Windows to Linux. As this drift is escalating in an exponential rate, the cloud environ...
متن کاملSoftware-Defined Networking with DDoS Attacks in Cloud Computing
Although software-defined networking (SDN) brings numerous benefits by decoupling the control plane from the data plane, there is a contradictory relationship between SDN and distributed denial-of-service (DDoS) attacks. On one hand, the capabilities of SDN make it easy to detect and to react to DDoS attacks. On the other hand, the separation of the control plane from the data plane of SDN intr...
متن کاملDifferential Packet Filtering Against DDoS Flood Attacks
We present a new packet filtering scheme, which is traffic-smart to defend against network worms and flood attacks. The scheme prevents malicious hackers from orchestrating DDoS flooding attacks on any IP-based public network. All packets from each IP source are counted and timed during their life cycles. Special IP counters and timers are used to support the filtering process. This new approac...
متن کاملProtection from distributed denial of service attacks using history-based IP filtering
In this paper, we introduce a practical scheme to defend against Distributed Denial of Service (DDoS) attacks based on IP source address filtering. The edge router keeps a history of all the legitimate IP addresses which have previously appeared in the network. When the edge router is overloaded, this history is used to decide whether to admit an incoming IP packet. Unlike other proposals to de...
متن کاملMonitoring and Managing Cloud Computing Security using Denial of Service Bandwidth Allowance
Over the next decade, cloud computing has a good chance of becoming a widely used technology. However, many challenges face the cloud to be overcome before the average user or business team will trust their vital information with a cloud server. Most of these challenges tie into developing sound security measures for the cloud. One of the largest security obstacles is how to defend against a De...
متن کامل