{"title":"Detection of DDOS Attacks in Cloud Computing Environment","authors":"Farhaan Noor Hamdani, Farheen Siddiqui","doi":"10.1109/ICCS45141.2019.9065429","DOIUrl":null,"url":null,"abstract":"In today’s world everyone uses cloud technology, which provides various features like data-storage, service-oriented sophisticated models which are hosted remotely to provide software services, infrastructure services, platform services, for users to deploy and develop applications, anywhere accessible data, QoS, cost effective solutions for business setups, no hardware and software maintenance problem for the user etc. While the cloud services are mainly carried over the internet, it is prone to various attacks which may lead the exposure of sensitive data to adversaries. Many attacks pose an active threat to the cloud environment. Amongst these attacks, DDOS is one of the cheap online attacks which disrupts the services that are available for the legitimate users. Separating legitimate and malicious traffic is not an easy task. The main idea of the DDOS attack is to affect numerous user machines, infecting them with a certain malware. The infected machines also known as zombies or botnets are then controlled by the attacker to launch the flooding attacks on a particular network or a server. The infected machines carry out the main attack by increasing the traffic flow to a victim machine. Due to which the victim machine loses all its computing and communication resources. The purpose of this paper is to analyze the various detection techniques used and implemented in various cloud environments to counter these types of attacks.","PeriodicalId":433980,"journal":{"name":"2019 International Conference on Intelligent Computing and Control Systems (ICCS)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2019-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2019 International Conference on Intelligent Computing and Control Systems (ICCS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICCS45141.2019.9065429","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 2
Abstract
In today’s world everyone uses cloud technology, which provides various features like data-storage, service-oriented sophisticated models which are hosted remotely to provide software services, infrastructure services, platform services, for users to deploy and develop applications, anywhere accessible data, QoS, cost effective solutions for business setups, no hardware and software maintenance problem for the user etc. While the cloud services are mainly carried over the internet, it is prone to various attacks which may lead the exposure of sensitive data to adversaries. Many attacks pose an active threat to the cloud environment. Amongst these attacks, DDOS is one of the cheap online attacks which disrupts the services that are available for the legitimate users. Separating legitimate and malicious traffic is not an easy task. The main idea of the DDOS attack is to affect numerous user machines, infecting them with a certain malware. The infected machines also known as zombies or botnets are then controlled by the attacker to launch the flooding attacks on a particular network or a server. The infected machines carry out the main attack by increasing the traffic flow to a victim machine. Due to which the victim machine loses all its computing and communication resources. The purpose of this paper is to analyze the various detection techniques used and implemented in various cloud environments to counter these types of attacks.