Open Access Open Access  Restricted Access Subscription Access

Availability Challenge of Cloud System under DDOS Attack


Affiliations
1 Department of Computer, Ramsar Branch, Islamic Azad University, Ramsar, Iran, Islamic Republic of
2 Department of Computer, Firuzkooh Branch, Islamic Azad University, Firuzkooh, Iran, Islamic Republic of
 

Cloud computing is a distributed architecture that has shared resources, software, and information is provided to computers and other devices on a scalable platform and demand. Availability of the cloud services is one of the key security issues in it. Distributed Denial of Service (DDoS) is an attack that threats the availability of the cloud services. In this paper, effect of the DDoS attack on the cloud is investigated. Therefore, a model for attack based on the DDoS is designed, and then we simulate a cloud system on the experimental environment. Experiments show that the cloud system is vulnerable to this attack. In order to confronting this attack, several solutions are proposed in this paper. We suggest load balancing and honeypots beside the intrusion detection systems (IDS) is used to defend from the attack.

Keywords

Cloud, DDoS Attack, IDS, Honeypot, Load Balancing
User

  • Weiss A (2007) Computing in the Clouds. Networker. 11(4), 16-25.
  • Vidyanand Choudhary (2007) Software as a service: Implications for Investment in software development, hicss, pp.209a. 40th Annual Hawaii Int. Conf. Sys. Sci. (HICSS'07).
  • Bhaskar Prasad Rimal, Eunmi Choi, Ian Lumb (2009) A Taxonomy and survey of cloud computing sytems. Ncm. 5th Int. Joint Conf. INC, IMS & IDC. pp.44-51
  • Ian Foster, Yong Zhao, Ioan Raicu and Shiyong Lu (2008) Cloud computing and grid computing 360- Degree compared, IEEE Grid Comput. Environ. (GCE08) 2008, co-located with IEEE/ACM Supercomputing.
  • Luis M Vaquero, Luis Rodero-Merino and Daniel Morán (2011) Locking the sky: a survey on IaaS cloud security. Comput. 91(1), 93-118.
  • Amardeep Singh ER and Monika Verma ER (2011) Attacks and security in cloud computing. Int. J. Adv. Eng. & Appl. pp: 300-302.
  • Mihai Christodorescu, Reiner Sailer, Douglas Lee Schales, Daniele Sgandurra and Diego Zamboni (2009) Cloud security is not (just) virtualization security: a short paper. Proc. 2009 ACM workshop on Cloud Computing Security (CCSW '09). ACM, NY, USA. pp: 97-102.
  • Jose Nazario (2008) DDoS attack evolution. Network Security. l7, 7–10.
  • Catteddu D and Hogben G (2009) Cloud Computing: benefits, risks and recommendations for information security. Technical Report. Europ. Network & Inforamtion Security Agency. pp: 9-30.
  • Victor Chang, David Bacigalupo, Gary Wills, and David De Roure (2010) A Categorisation of Cloud Computing Business Models. Proc. 10th IEEE/ACM Int. Conf. Cluster, Cloud & Grid Comput. (CCGRID '10). IEEE Comput. Soc., Washington, DC, USA. pp: 509-512.
  • Basheer Al-Duwairi and Manimaran G (2009) JUSTgoogle: a search engine-based defense against botnet-based DDoS attacks. Proce. IEEE Int. Conf. Commun (ICC'09).
  • Christos Douligeris and Aikaterini Mitrokotsa (2003) DDoS attacks and defense mechanisms: classification and state-of-the-art, Elsevier B.V.
  • Asayuki Murakami and Nakaji Honda (2007) A study on the modeling ability of the IDS method: A soft coputing technique using pattern-based information processing. Int. J. Approx. Reasoning. 45(3), 470- 487.
  • Anh Le, Raouf Boutaba and Ehab Al-Shaer (2008) Correlation-based load balancing for network intrusion detection and prevention systems. Proc. 4th Int. Conf. Security & Privacy in Commun. Networks (SecureComm '08).
  • Anjali Sardana and Ramesh Joshi (2009) An autoresponsive honeypot architecture for dynamic resource a location and QoS adaptation in DDoS attacked networks. Comput. Commun. 32, 121384- 1399.

Abstract Views: 547

PDF Views: 163




  • Availability Challenge of Cloud System under DDOS Attack

Abstract Views: 547  |  PDF Views: 163

Authors

Aboosaleh Mohammad Sharifi
Department of Computer, Ramsar Branch, Islamic Azad University, Ramsar, Iran, Islamic Republic of
Saeed K. Amirgholipour
Department of Computer, Ramsar Branch, Islamic Azad University, Ramsar, Iran, Islamic Republic of
Mehdi Alirezanejad
Department of Computer, Firuzkooh Branch, Islamic Azad University, Firuzkooh, Iran, Islamic Republic of
Baharak Shakeri Aski
Department of Computer, Ramsar Branch, Islamic Azad University, Ramsar, Iran, Islamic Republic of

Abstract


Cloud computing is a distributed architecture that has shared resources, software, and information is provided to computers and other devices on a scalable platform and demand. Availability of the cloud services is one of the key security issues in it. Distributed Denial of Service (DDoS) is an attack that threats the availability of the cloud services. In this paper, effect of the DDoS attack on the cloud is investigated. Therefore, a model for attack based on the DDoS is designed, and then we simulate a cloud system on the experimental environment. Experiments show that the cloud system is vulnerable to this attack. In order to confronting this attack, several solutions are proposed in this paper. We suggest load balancing and honeypots beside the intrusion detection systems (IDS) is used to defend from the attack.

Keywords


Cloud, DDoS Attack, IDS, Honeypot, Load Balancing

References





DOI: https://doi.org/10.17485/ijst%2F2012%2Fv5i6%2F30488