CFP last date
20 December 2024
Reseach Article

A Review of Techniques to Detect and Prevent Distributed Denial of Service (DDoS) Attack in Cloud Computing Environment

by Iqra Sattar, Muhammad Shahid, Younis Abbas
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 115 - Number 8
Year of Publication: 2015
Authors: Iqra Sattar, Muhammad Shahid, Younis Abbas
10.5120/20173-2370

Iqra Sattar, Muhammad Shahid, Younis Abbas . A Review of Techniques to Detect and Prevent Distributed Denial of Service (DDoS) Attack in Cloud Computing Environment. International Journal of Computer Applications. 115, 8 ( April 2015), 23-27. DOI=10.5120/20173-2370

@article{ 10.5120/20173-2370,
author = { Iqra Sattar, Muhammad Shahid, Younis Abbas },
title = { A Review of Techniques to Detect and Prevent Distributed Denial of Service (DDoS) Attack in Cloud Computing Environment },
journal = { International Journal of Computer Applications },
issue_date = { April 2015 },
volume = { 115 },
number = { 8 },
month = { April },
year = { 2015 },
issn = { 0975-8887 },
pages = { 23-27 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume115/number8/20173-2370/ },
doi = { 10.5120/20173-2370 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:55:47.763530+05:30
%A Iqra Sattar
%A Muhammad Shahid
%A Younis Abbas
%T A Review of Techniques to Detect and Prevent Distributed Denial of Service (DDoS) Attack in Cloud Computing Environment
%J International Journal of Computer Applications
%@ 0975-8887
%V 115
%N 8
%P 23-27
%D 2015
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Cloud computing has become one of the most demanding services over the internet. It has gained remarkable fame for past few years. But it is under the severe threats of internet security. One of the severe threats is Distributed Denial of Service (DDoS). DDoS occurs when a huge amount of packets are sent to a server from various computers. Botnet is one of the major causes that launch DDoS attack. Botnet is actually a network of bots or zombie computers that are under the control of attacker. Several techniques are available in the literature that provides solution to avoid DDoS attack. A survey on DDoS detection and prevention techniques and their comparative analysishave been done in this paper.

References
  1. M. Ahmed, X. Yang, and S. Ali, "Above the Trust and Security in Cloud Computing: A Notion Towards Innovation," in Embedded and Ubiquitous Computing (EUC), IEEE/IFIP 8th International Conference, 2010, pp. 723-730.
  2. I. Gul, A. urRehman, and M. H. Islam, "Cloud computing security auditing," in Next Generation Information Technology (ICNIT), 2011 The 2nd International Conference on, 2011, pp. 143-148.
  3. VikasChouhan&Sateesh Kumar Peddoju "Packet Monitoring Approach to Prevent DDoS Attack in Cloud Computing" International Journal of Computer Science and Electrical Engineering (IJCSEE) ISSN No. 2315-4209, Vol-1 Iss-1, 2012.
  4. P. A. R. Kumar and S. Selvakumar, "Distributed Denial-of-Service (DDoS) Threat in Collaborative Environment - A Survey on DDoS Attack Tools and Traceback Mechanisms," in Advance Computing Conference, 2009. IACC 2009. IEEE International, 2009, pp. 1275-1280.
  5. W. Haining, et al. , "Defense Against Spoofed IP Traffic Using Hop-Count Filtering," Networking, IEEE/ACM Transactions on, vol. 15, pp. 40-53, 2007.
  6. A. S. SyedNavaz, V. Sangeetha, C. Prabhadevi. "Entropy based Anomaly Detection System to Prevent DDoS Attacks in Cloud" International Journal of Computer Applications (0975 – 8887) Volume 62– No. 15, January 2013.
  7. PriyankaNegi, Anupama Mishra and B. B. Gupta. "Enhanced CBF Packet Filtering Method to Detect DDoS Attack in Cloud Computing Environment".
  8. Qi Chen, Wenmin Lin, Wanchun Dou, Shui Yu, "CBF: A Packet Filtering Method for DDoS Attack Defense in Cloud Environment", in Ninth IEEE International Conference on Dependable, Autonomic and Secure Computing, 978-0-7695-4612-4/11, 2011.
  9. A. M. Lonea, D. E. Popescu, H. Tianfield. "Detecting DDoS Attacks in Cloud Computing Environment", INT J COMPUT COMMUN, ISSN 1841-9836 8(1):70-78, February, 2013.
  10. Roschke, S. , Cheng, F. and Meinel, C. , "Intrusion Detection in the Cloud". In Eighth IEEE International Conference on Dependable, Autonomic and Secure Computing, pp. 729-734, 2009.
  11. Dissanayake, A. , "Intrusion Detection Using the Dempster-Shafer Theory". 60-510 Literature Review and Survey, School of Computer Science, University of Windsor, 2008.
  12. J. Mirkovic and P. Reiher; A Taxonomy of DDoS Attack and DDoS Defense Mechanisms; ACM Sigcomm Computer Communications Review; Vol. 34, No. 2, Apr. 2004.
  13. Chen R. , Park J. , and Marchany R. , " A Divide and Conquer Strategy for Thwarting Distributed Denial of Service Attacks," Computer Journal of IEEE Transactions on Parallel and Distributed Systems, vol. 18, no. 5, pp. 577-588,07
  14. I. B. Mopari, et al. , "Detection and defense against DDoS attack with IP spoofing," in Computing, Communication and Networking, 2008. ICCCn 2008. International Conference on, 2008, pp. 1-5.
  15. N. Venkatesu, et al. , "An Effective Defense Against Distributed Denial of Service in GRID," in Emerging Trends in Engineering and Technology, 2008. ICETET '08. First International Conference on, 2008, pp. 373-378.
  16. Qi Chen, Wenmin Lin, Wanchun Dou, Shui Yu, "CBF: A Packet Filtering Method for DDoS Attack Defense in Cloud Environment", in Ninth IEEE International Conference on Dependable, Autonomic and Secure Computing, 978-0-7695-4612-4/11, 2011.
  17. H. Wang, C. Jin, and K. G. Shin, "Defense against Spoofed IP Traffic Using Hop-Count Filtering, inIEEE/ACM Trans. Networking, vol. 15, no. 1, 2007 pp. 40-53.
  18. Chonka, J. Singh, and W. Zhou, "Chaos Theory Based Detection against Network Mimicking DDoS Attacks," in IEEE Comm. Letters, vol. 13, no. 9, 2009, pp. 717 -719.
  19. Y. Kim, W. C. Lau, M. C. Chuah, and H. J. Chao, "PacketScore: A Statistics-Based Packet Filtering Scheme against Distributed Denial of-Service Attacks," in IEEE Trans. Dependable and Secure Computing ,vol. 3, no. 2, 2006, pp. 141-155.
  20. B. B. Gupta, R. C. Joshi, M. Misra, "Defending against Distributed Denial of Service Attacks: Issues and Challenges," Information Security Journal: A Global Perspective, vol. 18, issue 5, Taylor & Francis, UK, pp. 224-247, 2009. DOI: 10. 1080/19393550903317070
  21. Y. Xiang, K. Li, and W. Zhou, "Low-Rate DDoS Attacks Detection and Traceback by Using New Information Metrics," in IEEE Trans. Information Forensicsand Security, vol. 6, no. 2, 2011, pp. 426-437.
  22. B. B. Gupta, M. Misra, R. C. Joshi, "FVBA: A Combined Statistical Approach for Low Rate Degrading and High Bandwidth Disruptive DDoS Attacks Detection in ISP Domain," in the proceedings of 16th IEEE International Conference on Networks (ICON-2008), DOI: 10. 1109/ICON. 2008. 4772654, Dec. 12-14, 2008, New Delhi, India.
  23. B. B. Gupta, R. C. Joshi, ManojMisra, "ANN Based Scheme to Predict Number of Zombies involved in a DDoS Attack," International Journal of Network Security (IJNS), vol. 14, no. 1, ISSN 1816-3548, pp. 36-45, 2012.
  24. P. E. Ayres, H. Sun, H. J. Chao, and W. C. Lau, "ALPi: A DDoS Defense System for High-Speed Networks," in IEEE J. Selected Areas Comm. , vol. 24, no. 10, 2006, pp. 1864 -1876.
  25. EsraaAlomari, SelvakumarManickam, B. B. Gupta, Shankar Karuppayah, RafeefAlfaris, "Botnet-based Distributed Denial of Service (DDoS) Attacks on Web Servers: Classification and Art," in International Journal of Computer Applications, (IJCA), Vol. 49, no. 7, pp. 24-32, 2012.
  26. A. Srivastava, B. B. Gupta, A. Tyagi, A. Sharma, A. Mishra, et. al. , "A Recent Survey on DDoS Attacks and Defense Mechanisms," Book on Advances in Parallel, Distributed Computing, Communications in Computer and Information Science (CCIS), LNCS, Springer-Verlag Berlin Heidelberg, CCIS 203, pp. 570-580, 2011.
Index Terms

Computer Science
Information Sciences

Keywords

DDoS Botnet CBF Cloud Computing TTL DST.