A Review on Detection and Mitigation Analysis of Distributed Denial of Service Attacks and Their Effects on the Cloud

A Review on Detection and Mitigation Analysis of Distributed Denial of Service Attacks and Their Effects on the Cloud

Savita Devi, Taran Singh Bharti
Copyright: © 2022 |Pages: 21
DOI: 10.4018/IJCAC.311036
OnDemand:
(Individual Articles)
Available
$37.50
No Current Special Offers
TOTAL SAVINGS: $37.50

Abstract

To save money on maintenance and administrative costs, cloud computing aims to move high-end computer equipment to the internet and put it online. Both victims and attackers may reap the advantages of cloud computing. On the other side, attacks on cloud components might lead to massive losses for cloud service providers and users. Numerous cyber-attacks have been launched as a consequence of this readily available resource. One of the most significant hazards to communication networks and applications has long been DoS and DDoS attacks. Operations, availability, and security for companies are becoming a nightmare because of these attacks. Since cloud computing resources are scalable, these resources may be dynamically scaled to recognise the attack components and immediately withstand the attack. For this cyber-attack against cloud computing, fast exploitation of the attack data is necessary. This article addresses the majority of the previously published strategies for DDoS attack avoidance, early identification, and remediation.
Article Preview
Top

1. Introduction

Data is now kept in vast data centres all over the globe, thanks to the new technology that transforms desktop computing into utility computing. The facilities provided by cloud service providers is becoming more popular than traditional deployments. Cloud computing's advantages include self-service, quick adaptability, resource pooling, and metered service. Many options are available when it comes to a customer's specific demands when it comes to using software as a service (Somani, Gaur, Sanghi, Conti and Buyya, 2017). There are a number of security concerns that technology must address. These include cryptographic keys, authenticity, security systems, proof-of-ownership, confidentiality, uptime and tracking. Attackers want to weaken the current cloud infrastructure by finding and exploiting flaws. As paper (Wang et al., 2015) points out, cloud computing poses significant security risks. As a result of this, the author divided the attacks into four categories: those that target the cloud infrastructure as a whole (networks, virtual machines (VMs), storage, and applications). In light of these concerns, cloud users are reluctant to save critical information. For the purposes of cloud computing, which is to have resources accessible around the clock, security and availability of cloud resources must be ensured.

Availability is the most important factor in cloud computing security for most academics. DoS attacks are attempts to prevent the use of system resources from being used by other users. It is characterised as a DDoS attack because it is carried out in a dispersed and coordinated way against a large-scale cloud computing network. Data, services, resources, and applications are all being disrupted by DDoS attacks, which are a major security concern for today's Internet (Deshmukh and Devadkar, 2015). As summarised by Osanaiye et al., the DDoS attack and the many types of protection it offers (Karnwal, Sivakumar and Aghila, 2012). One more DDoS study has been published that explains how DDoS works, what triggers DDoS attacks, and how to defend against them. All types of DDoS attacks are included in this poll, which makes it unique. Based on the work of Osanaiye and colleagues, Figure 1 depicts a DDoS attackparticipated by almost all kinds of network devices. The attack characteristics, attack traffic rate, attack launch, and implementation technique all play a role in the variety of DDoS attacks that may be launched against cloud computing systems. DDoS attacks may come in many forms, and this graphic provides a detailed look at all of them.

Figure 1.

A DDoS attack originated from various targeted bots

IJCAC.311036.f01

Using cloud computing in corporate operations has resulted in an increased emphasis on business growth and product development, rather than on storage or the need to maintain a 24-hour server to assure optimum throughput. Consequently, enterprises will be compelled in the not-too-distant future to embrace cloud computing. It's up to cloud providers like Amazon (Somani, Gaur, Sanghi, Conti and Buyya, 2017), IBM (Wang et al., 2015) and Microsoft (Deshmukh and Devadkar, 2015) to provide pay as you go, high-scalability services. With all its benefits, cloud computing still faces several hurdles to widespread adoption because, what are the repercussions, if any, of an adversary breaching the network security of the cloud and stealing all of your data, or if the cloud services you use fails at an inconvenient time? Disruptive overload attacks make advantage of recently revealed flaws. It's possible that a few tweaks to current security mechanisms won't be enough (Karnwal, Sivakumar and Aghila, 2012). However, predicting the target of a DoS attack is very difficult, and this must be taken into account while protecting data privacy. DDoS attacks make use of attack packets that are very similar to those used in regular, legal cybercrimes. Most intrusions are discovered after the system has been taken down because to the difficulty in recognising packets.

Complete Article List

Search this Journal:
Reset
Volume 14: 1 Issue (2024)
Volume 13: 1 Issue (2023)
Volume 12: 4 Issues (2022): 2 Released, 2 Forthcoming
Volume 11: 4 Issues (2021)
Volume 10: 4 Issues (2020)
Volume 9: 4 Issues (2019)
Volume 8: 4 Issues (2018)
Volume 7: 4 Issues (2017)
Volume 6: 4 Issues (2016)
Volume 5: 4 Issues (2015)
Volume 4: 4 Issues (2014)
Volume 3: 4 Issues (2013)
Volume 2: 4 Issues (2012)
Volume 1: 4 Issues (2011)
View Complete Journal Contents Listing