Open Access
Subscription Access
Availability Challenge of Cloud System under DDOS Attack
Cloud computing is a distributed architecture that has shared resources, software, and information is provided to computers and other devices on a scalable platform and demand. Availability of the cloud services is one of the key security issues in it. Distributed Denial of Service (DDoS) is an attack that threats the availability of the cloud services. In this paper, effect of the DDoS attack on the cloud is investigated. Therefore, a model for attack based on the DDoS is designed, and then we simulate a cloud system on the experimental environment. Experiments show that the cloud system is vulnerable to this attack. In order to confronting this attack, several solutions are proposed in this paper. We suggest load balancing and honeypots beside the intrusion detection systems (IDS) is used to defend from the attack.
Keywords
Cloud, DDoS Attack, IDS, Honeypot, Load Balancing
User
Information
- Weiss A (2007) Computing in the Clouds. Networker. 11(4), 16-25.
- Vidyanand Choudhary (2007) Software as a service: Implications for Investment in software development, hicss, pp.209a. 40th Annual Hawaii Int. Conf. Sys. Sci. (HICSS'07).
- Bhaskar Prasad Rimal, Eunmi Choi, Ian Lumb (2009) A Taxonomy and survey of cloud computing sytems. Ncm. 5th Int. Joint Conf. INC, IMS & IDC. pp.44-51
- Ian Foster, Yong Zhao, Ioan Raicu and Shiyong Lu (2008) Cloud computing and grid computing 360- Degree compared, IEEE Grid Comput. Environ. (GCE08) 2008, co-located with IEEE/ACM Supercomputing.
- Luis M Vaquero, Luis Rodero-Merino and Daniel Morán (2011) Locking the sky: a survey on IaaS cloud security. Comput. 91(1), 93-118.
- Amardeep Singh ER and Monika Verma ER (2011) Attacks and security in cloud computing. Int. J. Adv. Eng. & Appl. pp: 300-302.
- Mihai Christodorescu, Reiner Sailer, Douglas Lee Schales, Daniele Sgandurra and Diego Zamboni (2009) Cloud security is not (just) virtualization security: a short paper. Proc. 2009 ACM workshop on Cloud Computing Security (CCSW '09). ACM, NY, USA. pp: 97-102.
- Jose Nazario (2008) DDoS attack evolution. Network Security. l7, 7–10.
- Catteddu D and Hogben G (2009) Cloud Computing: benefits, risks and recommendations for information security. Technical Report. Europ. Network & Inforamtion Security Agency. pp: 9-30.
- Victor Chang, David Bacigalupo, Gary Wills, and David De Roure (2010) A Categorisation of Cloud Computing Business Models. Proc. 10th IEEE/ACM Int. Conf. Cluster, Cloud & Grid Comput. (CCGRID '10). IEEE Comput. Soc., Washington, DC, USA. pp: 509-512.
- Basheer Al-Duwairi and Manimaran G (2009) JUSTgoogle: a search engine-based defense against botnet-based DDoS attacks. Proce. IEEE Int. Conf. Commun (ICC'09).
- Christos Douligeris and Aikaterini Mitrokotsa (2003) DDoS attacks and defense mechanisms: classification and state-of-the-art, Elsevier B.V.
- Asayuki Murakami and Nakaji Honda (2007) A study on the modeling ability of the IDS method: A soft coputing technique using pattern-based information processing. Int. J. Approx. Reasoning. 45(3), 470- 487.
- Anh Le, Raouf Boutaba and Ehab Al-Shaer (2008) Correlation-based load balancing for network intrusion detection and prevention systems. Proc. 4th Int. Conf. Security & Privacy in Commun. Networks (SecureComm '08).
- Anjali Sardana and Ramesh Joshi (2009) An autoresponsive honeypot architecture for dynamic resource a location and QoS adaptation in DDoS attacked networks. Comput. Commun. 32, 121384- 1399.
Abstract Views: 547
PDF Views: 163