Abstract
Cloud computing offers internet-based services to access various on-demand resources by overcoming the necessity of centralized computing. There are plenty of challenges, like privacy, security, load balancing, resource provisioning, existing in this virtualized environment. Among them, security is one of the major complications. Concerning the security and privacy issues, distributed denial of service (DDoS) attacks can cause great damage to the availability of cloud services and resources. Till now, attack mitigation strategies residues is an on-going research challenge due to the attack tendency to advance in sophistication and ease of implementation. Moreover, cloud service customers, as well as providers, need to be observant in understanding the menaces of DDoS attacks. The crux of such attack mitigation mechanism is to assure early and fast detection of illegitimate entries into the network. To address such monitoring and detecting mechanism, this paper aims to address various nature-inspired algorithms which are having the propensity to resolve malware issues, such as DDoS attacks, naturally by offering an optimized solution.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Subramanian, N., Jeyaraj, A.: Recent security challenges in cloud computing. Comput. Electr. Eng. 71, 28–42 (2018)
Manavi, M.T.: Defense mechanisms against distributed denial of service attacks: a survey. Comput. Electr. Eng. 72, 26–38 (2018)
Wani, A.R., Rana, Q.P., Pandey, N.: Analysis and countermeasures for security and privacy issues in cloud computing. In: System Performance and Management Analytics, pp. 47–54. Springer, Singapore (2019)
Gillani, F., Al-shaer, E., Lo, S., Duan, Q., Ammar, M., Zegura, E.: Agile virtualized infrastructure to proactively defend against cyber attacks. In: INFOCOM 2015, vol. 1, pp. 270–280 (2015)
Jafarian, J.H., Al-Shaer, E., Duan, Q.: Openflow random host mutation: transparent moving target defense using software defined networking. In: Proceedings of the First Workshop on Hot Topics in Software Defined Networks, pp. 127–132. ACM (2012)
Stavrou, A., Keromytis, A.D., Nieh, J., Misra, V., Rubenstein, D.: Move: an end-to-end solution to network denial of service. In: Proceedings of the ISOC Symposium on Network and Distributed System Security, SanDiego, CA (SNDSS) (2005)
Wang, H., Jia, Q., Fleck, D., Powell, W., Li, F., Stavrou, A.: A moving target DDoS defense mechanism. Comput. Commun. 46, 10–21 (2014)
Abadi, M., Jalili, S.: An ant colony optimization algorithm for network vulnerability analysis. Iran. J. Electr. Electron. Eng. 2(3), 106–120 (2006)
Sreeram, I., Vuppala, V.P.K.: HTTP flood attack detection in application layer using machine learning metrics and bio inspired bat algorithm. Appl. Comput. Inform. (2017)
Forestiero, A., Leonardi, E., Mastroianni, C., Meo, M.: Self-chord: a bio-inspired P2P framework for self-organizing distributed systems. IEEE/ACM Trans. Netw. (TON) 18(5), 1651–1664 (2010)
Vidal, J.M., Orozco, A.L.S., Villalba, L.J.G.: Adaptive artificial immune networks for mitigating DoS flooding attacks. Swarm Evol. Comput. 38, 94–108 (2018)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Prathyusha, D.J., Naseera, S., Anusha, D.J., Alisha, K. (2020). A Review of Biologically Inspired Algorithms in a Cloud Environment to Combat DDoS Attacks. In: Satapathy, S., Bhateja, V., Mohanty, J., Udgata, S. (eds) Smart Intelligent Computing and Applications . Smart Innovation, Systems and Technologies, vol 160. Springer, Singapore. https://doi.org/10.1007/978-981-32-9690-9_7
Download citation
DOI: https://doi.org/10.1007/978-981-32-9690-9_7
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-32-9689-3
Online ISBN: 978-981-32-9690-9
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)