Skip to main content

A Review of Biologically Inspired Algorithms in a Cloud Environment to Combat DDoS Attacks

  • Conference paper
  • First Online:
Smart Intelligent Computing and Applications

Part of the book series: Smart Innovation, Systems and Technologies ((SIST,volume 160))

Abstract

Cloud computing offers internet-based services to access various on-demand resources by overcoming the necessity of centralized computing. There are plenty of challenges, like privacy, security, load balancing, resource provisioning, existing in this virtualized environment. Among them, security is one of the major complications. Concerning the security and privacy issues, distributed denial of service (DDoS) attacks can cause great damage to the availability of cloud services and resources. Till now, attack mitigation strategies residues is an on-going research challenge due to the attack tendency to advance in sophistication and ease of implementation. Moreover, cloud service customers, as well as providers, need to be observant in understanding the menaces of DDoS attacks. The crux of such attack mitigation mechanism is to assure early and fast detection of illegitimate entries into the network. To address such monitoring and detecting mechanism, this paper aims to address various nature-inspired algorithms which are having the propensity to resolve malware issues, such as DDoS attacks, naturally by offering an optimized solution.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 219.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Subramanian, N., Jeyaraj, A.: Recent security challenges in cloud computing. Comput. Electr. Eng. 71, 28–42 (2018)

    Article  Google Scholar 

  2. Manavi, M.T.: Defense mechanisms against distributed denial of service attacks: a survey. Comput. Electr. Eng. 72, 26–38 (2018)

    Article  Google Scholar 

  3. Wani, A.R., Rana, Q.P., Pandey, N.: Analysis and countermeasures for security and privacy issues in cloud computing. In: System Performance and Management Analytics, pp. 47–54. Springer, Singapore (2019)

    Google Scholar 

  4. Gillani, F., Al-shaer, E., Lo, S., Duan, Q., Ammar, M., Zegura, E.: Agile virtualized infrastructure to proactively defend against cyber attacks. In: INFOCOM 2015, vol. 1, pp. 270–280 (2015)

    Google Scholar 

  5. Jafarian, J.H., Al-Shaer, E., Duan, Q.: Openflow random host mutation: transparent moving target defense using software defined networking. In: Proceedings of the First Workshop on Hot Topics in Software Defined Networks, pp. 127–132. ACM (2012)

    Google Scholar 

  6. Stavrou, A., Keromytis, A.D., Nieh, J., Misra, V., Rubenstein, D.: Move: an end-to-end solution to network denial of service. In: Proceedings of the ISOC Symposium on Network and Distributed System Security, SanDiego, CA (SNDSS) (2005)

    Google Scholar 

  7. Wang, H., Jia, Q., Fleck, D., Powell, W., Li, F., Stavrou, A.: A moving target DDoS defense mechanism. Comput. Commun. 46, 10–21 (2014)

    Article  Google Scholar 

  8. Abadi, M., Jalili, S.: An ant colony optimization algorithm for network vulnerability analysis. Iran. J. Electr. Electron. Eng. 2(3), 106–120 (2006)

    Google Scholar 

  9. Sreeram, I., Vuppala, V.P.K.: HTTP flood attack detection in application layer using machine learning metrics and bio inspired bat algorithm. Appl. Comput. Inform. (2017)

    Google Scholar 

  10. Forestiero, A., Leonardi, E., Mastroianni, C., Meo, M.: Self-chord: a bio-inspired P2P framework for self-organizing distributed systems. IEEE/ACM Trans. Netw. (TON) 18(5), 1651–1664 (2010)

    Article  Google Scholar 

  11. Vidal, J.M., Orozco, A.L.S., Villalba, L.J.G.: Adaptive artificial immune networks for mitigating DoS flooding attacks. Swarm Evol. Comput. 38, 94–108 (2018)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Damai Jessica Prathyusha .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Prathyusha, D.J., Naseera, S., Anusha, D.J., Alisha, K. (2020). A Review of Biologically Inspired Algorithms in a Cloud Environment to Combat DDoS Attacks. In: Satapathy, S., Bhateja, V., Mohanty, J., Udgata, S. (eds) Smart Intelligent Computing and Applications . Smart Innovation, Systems and Technologies, vol 160. Springer, Singapore. https://doi.org/10.1007/978-981-32-9690-9_7

Download citation

Publish with us

Policies and ethics