Article Preview
Top1. Introduction
Data is now kept in vast data centres all over the globe, thanks to the new technology that transforms desktop computing into utility computing. The facilities provided by cloud service providers is becoming more popular than traditional deployments. Cloud computing's advantages include self-service, quick adaptability, resource pooling, and metered service. Many options are available when it comes to a customer's specific demands when it comes to using software as a service (Somani, Gaur, Sanghi, Conti and Buyya, 2017). There are a number of security concerns that technology must address. These include cryptographic keys, authenticity, security systems, proof-of-ownership, confidentiality, uptime and tracking. Attackers want to weaken the current cloud infrastructure by finding and exploiting flaws. As paper (Wang et al., 2015) points out, cloud computing poses significant security risks. As a result of this, the author divided the attacks into four categories: those that target the cloud infrastructure as a whole (networks, virtual machines (VMs), storage, and applications). In light of these concerns, cloud users are reluctant to save critical information. For the purposes of cloud computing, which is to have resources accessible around the clock, security and availability of cloud resources must be ensured.
Availability is the most important factor in cloud computing security for most academics. DoS attacks are attempts to prevent the use of system resources from being used by other users. It is characterised as a DDoS attack because it is carried out in a dispersed and coordinated way against a large-scale cloud computing network. Data, services, resources, and applications are all being disrupted by DDoS attacks, which are a major security concern for today's Internet (Deshmukh and Devadkar, 2015). As summarised by Osanaiye et al., the DDoS attack and the many types of protection it offers (Karnwal, Sivakumar and Aghila, 2012). One more DDoS study has been published that explains how DDoS works, what triggers DDoS attacks, and how to defend against them. All types of DDoS attacks are included in this poll, which makes it unique. Based on the work of Osanaiye and colleagues, Figure 1 depicts a DDoS attackparticipated by almost all kinds of network devices. The attack characteristics, attack traffic rate, attack launch, and implementation technique all play a role in the variety of DDoS attacks that may be launched against cloud computing systems. DDoS attacks may come in many forms, and this graphic provides a detailed look at all of them.
Figure 1.
A DDoS attack originated from various targeted bots
Using cloud computing in corporate operations has resulted in an increased emphasis on business growth and product development, rather than on storage or the need to maintain a 24-hour server to assure optimum throughput. Consequently, enterprises will be compelled in the not-too-distant future to embrace cloud computing. It's up to cloud providers like Amazon (Somani, Gaur, Sanghi, Conti and Buyya, 2017), IBM (Wang et al., 2015) and Microsoft (Deshmukh and Devadkar, 2015) to provide pay as you go, high-scalability services. With all its benefits, cloud computing still faces several hurdles to widespread adoption because, what are the repercussions, if any, of an adversary breaching the network security of the cloud and stealing all of your data, or if the cloud services you use fails at an inconvenient time? Disruptive overload attacks make advantage of recently revealed flaws. It's possible that a few tweaks to current security mechanisms won't be enough (Karnwal, Sivakumar and Aghila, 2012). However, predicting the target of a DoS attack is very difficult, and this must be taken into account while protecting data privacy. DDoS attacks make use of attack packets that are very similar to those used in regular, legal cybercrimes. Most intrusions are discovered after the system has been taken down because to the difficulty in recognising packets.