Skip to main content

Taxonomy of Recent DDoS Attack Prevention, Detection, and Response Schemes in Cloud Environment

  • Conference paper
  • First Online:
Proceedings of the International Conference on Recent Cognizance in Wireless Communication & Image Processing

Abstract

In recent years the need for using cloud environment has increased abundantly. Threats to cloud computing are also rising with its usage. Among various threats to cloud, distributed denial-of-service (DDoS) attack is a main threat today. DDoS attack compromises the availability of the services and risks everything including financial loss, losing reputation, and loss of confidence of cloud users over the organization. To avoid this we need more profound and elegant way to secure cloud structure from DDoS attack. In this paper, we discuss recent development and protection mechanisms (i.e., prevention, detection, and response) against DDoS attack in cloud environment. These methods include preventive measures that are applied before the attack, detection method that can be applied while the attack is live, and responsive methods that are applied after the attack. This paper discusses about DDoS attack problem, currently proposed solutions, and research scope possible in future to deal with such attacks efficiently.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 259.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 329.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 329.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Amazon Elastic Compute cloud (Amazon EC2), Amazon. http://aws.amazon.com/ec2/. Accessed Sept 2014

  2. IBM cloud Computing, IBM. http://www.ibm.com/cloud-computing/in/en/. Accessed Sept 2014

  3. Azure: Microsoft’s cloud Platform, Microsoft Corporation. http://azure.microsoft.com/en-us/. Accessed Sept 2014

  4. Prince, M.: The DDoS That Knocked Spamhaus Offline (And How We Mitigated It). cloudFlare Blog (2013). http://blog.cloudflare.com/the-ddos-that-knocked-spamhaus-offline-and-ho/. Accessed Sept 2014

  5. Srivastava, A., Gupta, B.B., Tyagi, A., Sharma, A., Mishra, A.: A recent survey on DDoS attacks and defense mechanisms. In: Book on Advances in Parallel Distributed Computing, pp. 570–580. Springer (2011)

    Google Scholar 

  6. Ko, R., Lee, S.S.G.: cloud Computing Vulnerability Incidents: A Statistical Overview (2013). https://downloads.cloudsecurityalliance.org/initiatives/cvwg/CSA_Whitepaper_cloud_Computing_Vulnerability_Incidents.zip. Accessed Sept 2014

  7. Arbor Networks, Inc.: Worldwide Infrastructure Security Report Volume IX (2014). http://pages.arbornetworks.com/rs/arbor/images/WISR2014.pdf. Accessed Sept 2014

  8. Yu, S., Tian, Y., Guo, S., Wu, D.O.: Can we beat DDoS attacks in clouds? IEEE Trans. Parallel Distrib. Syst. 25(9), 2245–2254 (2014)

    Google Scholar 

  9. Chapade, S.S., Pandey, K.U., Bhade, D.S.: Securing cloud servers against flooding based DDoS attacks. In: 2013 International Conference on Communication Systems and Network Technologies (CSNT), 6–8 Apr 2013, pp. 524, 528

    Google Scholar 

  10. Liu, H.: A new form of DOS attack in a cloud and its avoidance mechanism. In: Proceedings of the 2010 ACM Workshop on cloud Computing Security Workshop. ACM (2010)

    Google Scholar 

  11. Chen, Q., Lin, W., Dou, W., Yu, S.: CBF: a packet filtering method for DDoS attack defense in cloud environment. In: 2011 IEEE Ninth International Conference on Dependable, Autonomic and Secure Computing (DASC), pp. 427–434 (2011)

    Google Scholar 

  12. Varalakshmi, P., Murrali, M.: Simplified clock drift management to avoid Denial of Service attacks in cloud. In: 2013 Fifth International Conference on Advanced Computing (ICoAC), pp. 331–336 (2013)

    Google Scholar 

  13. Vissers, T., Somasundaram, T.S., Pieters, L., Govindarajan, K., Hellinckx, P.: DDoS defense system for web services in a cloud environment. Future Gener. Comput. Syst. 37, 37–45 (2014)

    Google Scholar 

  14. Tan, Z., Jamdagni, A., He, X., Nanda, P., Liu, R.P.: A system for denial-of-service attack detection based on multivariate correlation analysis. IEEE Trans. Parallel Distrib. Syst. 25(2), 447–456 (2014)

    Google Scholar 

  15. Chonka, A., et al.: cloud security defence to protect cloud computing against HTTP-DoS and XML-DoS attacks. J. Netw. Comput. Appl. 34(4), 1097–1107 (2011)

    Google Scholar 

  16. Yang, L., Zhang, T., Song, J., Wang, J.S., Chen, P.: Defense of DDoS attack for cloud computing. In: 2012 IEEE International Conference on Computer Science and Automation Engineering (CSAE), vol. 2, pp. 626–629. IEEE (2012)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to B. B. Gupta .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Springer India

About this paper

Cite this paper

Badve, O.P., Gupta, B.B. (2016). Taxonomy of Recent DDoS Attack Prevention, Detection, and Response Schemes in Cloud Environment. In: Afzalpulkar, N., Srivastava, V., Singh, G., Bhatnagar, D. (eds) Proceedings of the International Conference on Recent Cognizance in Wireless Communication & Image Processing. Springer, New Delhi. https://doi.org/10.1007/978-81-322-2638-3_76

Download citation

  • DOI: https://doi.org/10.1007/978-81-322-2638-3_76

  • Published:

  • Publisher Name: Springer, New Delhi

  • Print ISBN: 978-81-322-2636-9

  • Online ISBN: 978-81-322-2638-3

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics