Skip to main content

Compromising Cloud Security and Privacy by DoS, DDoS, and Botnet and Their Countermeasures

  • Conference paper
  • First Online:

Part of the book series: Lecture Notes in Computational Vision and Biomechanics ((LNCVB,volume 30))

Abstract

Today, every firm either academic or private or government sectors are using the cloud as a platform to store and communicate information over the internet. Lots of data are being exchanged using various applications software and services. Services are integrated and reused the information over WWW. To effectively deal with all information, people are moving on cloud computing platform because of improving the cost of hardware and software, only pay what you use and setting up infrastructure easily and available for 24 × 7. Even though lots of advantages of sharing data on a cloud platform, their obvious question arise is that are those data secure and maintain its privacy by the service provider? Data privacy and security is an essential thing in today’s world. And to provide security and privacy over cloud computing is often challenging part for many organizations. In this paper, we represent some security challenges for cloud platform as services. We state with two security attack using DDoS and Botnet, and also show some countermeasure.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   44.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
USD   59.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Deshmukha RV, Devadkar KK Understanding DDoS attack & its effect in cloud environment. In: 4th international conference on advances in computing, communication and control (ICAC3’15)

    Google Scholar 

  2. Rai A, Challa RK (2016) Survey on recent DDoS mitigation techniques and comparative analysis. In: Second international conference on computational intelligence & communication technology. IEEE, New York

    Google Scholar 

  3. Wang B, Zheng Y, Lou W, Hou YT (2015) DDoS attack protection in the era of cloud computing and software-defined networking. www.elsevier.com/locate/comnet (Elsevier)

  4. Somani G, Gaur MS, Sanghi D, Conti M, Buyya R (2017) DDoS attacks in cloud computing: issues, taxonomy, and future directions. www.elsevier.com/locate/comcom (Elsevier)

  5. Zissis D, Lekkas D (2012) Addressing cloud computing security issues. Future Gen Comput Syst 28(3):583–592. https://doi.org/10.1016/j.future.2010.12.006

    Article  Google Scholar 

  6. Balobaid A, Alawad W, Aljasim H (2016) A study on the impacts of DoS and DDoS attacks on cloud and mitigation techniques. In: 2016 international conference on computing, analytics and security trends (CAST) College of Engineering Pune, India. Dec 19–21, 2016

    Google Scholar 

  7. Alosaimi W, Zak M, Al-Begain K (2015) Denial of service attacks mitigation in the cloud. In: 9th international conference on next generation mobile applications, services and technologies

    Google Scholar 

  8. Incapsula. https://www.incapsula.com/ddos/denial-of-service.html

  9. Yan Q, Yu FR (2015) Distributed denial of service attacks in software-defined networking with cloud computing. In: Security and privacy in emerging networks. IEEE, New York

    Google Scholar 

  10. Liu X, Yang X, Lu Y (2008) To filter or to authorize: network-layer DoS defense against multimillion-node botnets. In: ACM SIGCOMM computer communication review. ACM, New York

    Google Scholar 

  11. Bhardwaj A, Subrahmanyam GVB, Avasthi V, Sastry H, Goundar S (2016) DDoS attacks, new DDoS taxonomy and mitigation solutions—a survey. In: International conference on signal processing, communication, power and embedded system (SCOPES). IEEE, New York

    Google Scholar 

  12. Khor SH, Nakao A (2011) DaaS: DDoS mitigation-as-a-service. In: IPSJ international symposium on applications and the internet. IEEE, New York

    Google Scholar 

  13. Bawany NZ, Shamsi JA, Salah K (2017) DDoS attack detection and mitigation using SDN: methods, practices, and solutions. In: Review article—computer engineering and computer science. Springer, Berlin

    Google Scholar 

  14. Wong F, Tan CX (2014) A survey of trends in massive DDoS attacks and cloud-based mitigations. Int J Netw Secur Appl (IJNSA) 6(3):57–71

    Google Scholar 

  15. Farahmandian S et al (2013) A survey on methods to defend against DDoS attack in cloud computing. Proc Recent Adv Knowl Eng Syst Sci 6:185–190

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Martin K. Parmar .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Parmar, M.K., Rahevar, M.L. (2019). Compromising Cloud Security and Privacy by DoS, DDoS, and Botnet and Their Countermeasures. In: Pandian, D., Fernando, X., Baig, Z., Shi, F. (eds) Proceedings of the International Conference on ISMAC in Computational Vision and Bio-Engineering 2018 (ISMAC-CVB). ISMAC 2018. Lecture Notes in Computational Vision and Biomechanics, vol 30. Springer, Cham. https://doi.org/10.1007/978-3-030-00665-5_17

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-00665-5_17

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-00664-8

  • Online ISBN: 978-3-030-00665-5

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics