Multi-Aspect DDOS Detection System for Securing Cloud Network

Multi-Aspect DDOS Detection System for Securing Cloud Network

Pourya Shamsolmoali (Advanced Scientific Computing, CMCC, Italy), Masoumeh Zareapoor (Shanghai Jiao Tong University, China) and M.Afshar Alam (Jamia Hamdard University, India)
DOI: 10.4018/978-1-5225-0759-8.ch010
OnDemand PDF Download:
$30.00
List Price: $37.50

Abstract

Distributed Denial of Service (DDoS) attacks have become a serious attack for internet security and Cloud Computing environment. This kind of attacks is the most complex form of DoS (Denial of Service) attacks. This type of attack can simply duplicate its source address, such as spoofing attack, which defending methods do not able to disguises the real location of the attack. Therefore, DDoS attack is the most significant challenge for network. In this chapter we present different aspect of security in Cloud Computing, mostly we concentrated on DDOS Attacks. The Authors illustrated all types of Dos Attacks and discussed the most effective detection methods.
Chapter Preview
Top

Background

The increased incidences of security threats and increased harm by DDoS attacks have motivated the development of multiple types of attack detection mechanisms. These approaches differ depending on the purpose of detection and set of rules required for operation. Most of these methods are based on identifying anomalies in network traffic.

Key Terms in this Chapter

Virtualization: In computing, virtualization refers to the act of creating a virtual (rather than actual) version of something, including virtual computer hardware platforms, operating systems, storage devices, and computer network resources.

Information Divergence: Is a measure of the difference between two probability distributions.

DDoS: A distributed denial-of-service (DDoS) attack occurs when multiple systems flood the bandwidth or resources of a targeted system, usually one or more web servers.

Complete Chapter List

Search this Book:
Reset