Detection of DDOS Attacks in Cloud Computing Environment

Farhaan Noor Hamdani, Farheen Siddiqui
{"title":"Detection of DDOS Attacks in Cloud Computing Environment","authors":"Farhaan Noor Hamdani, Farheen Siddiqui","doi":"10.1109/ICCS45141.2019.9065429","DOIUrl":null,"url":null,"abstract":"In today’s world everyone uses cloud technology, which provides various features like data-storage, service-oriented sophisticated models which are hosted remotely to provide software services, infrastructure services, platform services, for users to deploy and develop applications, anywhere accessible data, QoS, cost effective solutions for business setups, no hardware and software maintenance problem for the user etc. While the cloud services are mainly carried over the internet, it is prone to various attacks which may lead the exposure of sensitive data to adversaries. Many attacks pose an active threat to the cloud environment. Amongst these attacks, DDOS is one of the cheap online attacks which disrupts the services that are available for the legitimate users. Separating legitimate and malicious traffic is not an easy task. The main idea of the DDOS attack is to affect numerous user machines, infecting them with a certain malware. The infected machines also known as zombies or botnets are then controlled by the attacker to launch the flooding attacks on a particular network or a server. The infected machines carry out the main attack by increasing the traffic flow to a victim machine. Due to which the victim machine loses all its computing and communication resources. The purpose of this paper is to analyze the various detection techniques used and implemented in various cloud environments to counter these types of attacks.","PeriodicalId":433980,"journal":{"name":"2019 International Conference on Intelligent Computing and Control Systems (ICCS)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2019-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2019 International Conference on Intelligent Computing and Control Systems (ICCS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICCS45141.2019.9065429","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 2

Abstract

In today’s world everyone uses cloud technology, which provides various features like data-storage, service-oriented sophisticated models which are hosted remotely to provide software services, infrastructure services, platform services, for users to deploy and develop applications, anywhere accessible data, QoS, cost effective solutions for business setups, no hardware and software maintenance problem for the user etc. While the cloud services are mainly carried over the internet, it is prone to various attacks which may lead the exposure of sensitive data to adversaries. Many attacks pose an active threat to the cloud environment. Amongst these attacks, DDOS is one of the cheap online attacks which disrupts the services that are available for the legitimate users. Separating legitimate and malicious traffic is not an easy task. The main idea of the DDOS attack is to affect numerous user machines, infecting them with a certain malware. The infected machines also known as zombies or botnets are then controlled by the attacker to launch the flooding attacks on a particular network or a server. The infected machines carry out the main attack by increasing the traffic flow to a victim machine. Due to which the victim machine loses all its computing and communication resources. The purpose of this paper is to analyze the various detection techniques used and implemented in various cloud environments to counter these types of attacks.
云计算环境下DDOS攻击检测
在当今世界,每个人都使用云技术,它提供了各种功能,如数据存储、面向服务的复杂模型(远程托管以提供软件服务、基础设施服务、平台服务,供用户部署和开发应用程序)、任何地方可访问的数据、QoS、业务设置的成本效益解决方案、用户没有硬件和软件维护问题等。虽然云服务主要通过互联网进行,但它很容易受到各种攻击,可能导致敏感数据暴露给对手。许多攻击对云环境构成了主动威胁。在这些攻击中,DDOS是一种廉价的在线攻击,它破坏了合法用户可用的服务。区分合法流量和恶意流量并不是一件容易的事。DDOS攻击的主要思想是影响大量的用户机器,用某种恶意软件感染它们。被感染的机器也被称为僵尸或僵尸网络,然后由攻击者控制,对特定的网络或服务器发动洪水攻击。受感染的机器通过增加受害者机器的流量来执行主要攻击。因此,受害机器失去了所有的计算和通信资源。本文的目的是分析在各种云环境中使用和实现的各种检测技术,以对抗这些类型的攻击。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信