Abstract
The worldwide infrastructure facilitator for corporations and home customers today is cloud computing. Cloud infrastructure provides infinite consistency in the computing power, storage, and network bandwidth in order for them to satisfy the demands of operation in an optimal manner. Cloud computing allows technology firms, internet suppliers, and home consumers to consistently minimize investments and implementation expenditures. Increased use of cloud-based technology by multinational businesses located in offices, remote areas, and home users was also motivated by the proximity to fast speed connectivity and internet access.
This chapter focuses on the creation of a detailed and stable networking architecture to minimize the attacks on hybrid clouds by the distributed denial of service. The writers first published an investigation into cybersecurity problems and the effect on cloud environments. The authors analyzed the study of cloud infrastructure, denial of service, and malware identification and mitigation methods released between January 2010 and December 2020. Current strategies to prevent distributed service denial attacks were tested by the authors. The authors then developed and introduced a stable framework for networks that mitigates distributed service denial attacks on hybrid cloud environments. The proposed infrastructures and the findings contrasted with the single data center architectural architecture were carried out at the network- and device-level assaults. This chapter further discusses future study directions.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
A. Anwar, A. Sailor, K. Andrzej, O. Charles, A. Schulz, A. Segal Butt, Cost-aware cloud metering with scalable service management infrastructure, in IEEE 8th International Conference on Cloud Computing (ICCC), (2015), pp. 285–292. https://doi.org/10.1109/CLOUD.2015.46
S. Arukonda, S. Sinha, The innocent perpetrators: Reflectors skampskamp; reflection attacks. Adv. Comput. Sci. 3(13), 94–98 (2015)
M. Bhuyan, K. Bhattacharyya, K. Kalita, An empirical evaluation of information metrics for low rate and high rate DDoS attack detection. Pattern Recognit. Lett. 51, 1–7 (2015). https://doi.org/10.1016/j.patrec.2014.07.019
H. Choi, S. Lim, B. Choi, R. Park, H. Lee, State of the art of network security perspectives in cloud computing, in Springer 1st International Conference on Communications in Computer and Information Science Security-Enriched Urban Computing and Smart Grid, (2010), pp. 629–637. https://doi.org/10.1007/978-3-642-16444-6_79
M. Darwish, A. Ouda, F. Capretz, Cloud-based DDoS attacks and defenses, in IEEE International Conference on Information Society, (2013), pp. 67–71. ISBN: 978-1-908320-13-1
R. Deshmukh, K. Devadkar, Understanding DDoS attack skampskamp; its effect in cloud environment, in Procedia 4th International Conference on Advances in Computing, Communication and Control (ICAC3’15), vol. 49, (2015), pp. 202–210. https://doi.org/10.1016/j.procs.2015.04.245
V. Durcekova, S. Ladislav, N. Shahmehri, Sophisticated denial of service attacks aimed at application layer, in IEEE 9th International Conference 2012 ELEKTRO, (2012). https://doi.org/10.1109/ELEKTRO.2012.6225571
K. Georgios, M. Tassos, D. Geneiatakis, S. Gritzalis, A fair solution to DNS amplification attacks, in IEEE 2nd International Workshop on Digital Forensics and Incident Analysis (WDFIA), (2007), pp. 38–47. https://doi.org/10.1109/WDFIA.2007.4299371
T. Hildmann, K. Odej, Deploying and extending on-premise cloud storage based on own cloud, in IEEE 34th International Conference on Distributed Computing Systems Workshops (ICDCSW), (2014), pp. 87–81. https://doi.org/10.1109/ICDCSW.2014.18
Imperva, 2016 Report. Imperva Global DDoS Threat Landscape Report (2016), https://www.incapsula.com/DDoS-report/DDoS-report-q1-2016.html. Accessed 16 May 2016
B. Joshi, S. Vijayan, J. Kumar, Securing cloud computing environment against DDoS attacks, in IEEE International Conference on Computer Communication and Informatics, (2012), pp. 1–5. https://doi.org/10.1109/ICCCI.2012.6158817
A. Khadke, M. Madankar, M. Motghare, Review on mitigation of distributed denial of service (DDoS) attacks in cloud computing, in IEEE 10th International Conference on Intelligent Systems and Control (ISCO), (2016), pp. 1–5. https://doi.org/10.1109/ISCO.2016.7726917
A. Malik, N. Muhammad, Security framework for cloud computing environment - a review. J. Emerg. Trends Comput. Inform. Sci. 3(3), 390–394 (2012) ISSN 2079-8407
A. Merlo, M. Migliardi, N. Gobbo, F. Palmieri, A. Castiglione, A denial of service attack to UMTS networks using SIM-less devices. IEEE Trans. Depend. Sec. Comput. 11(3), 280–291 (2014). https://doi.org/10.1109/TDSC.2014.2315198
A. Mishra, A. Srivastava, B. Gupta, A. Tyagi, A. Sharma, A recent survey on DDoS attacks and defense mechanisms, in Springer 1st International Conference on Parallel, Distributed Computing Technologies and Applications (PDCTA), (203), (2011), pp. 570–580. https://doi.org/10.1007/978-3-642-24037-9_57
C. Prabhadevi, N. Syed, V. Sangeetha, Entropy-based anomaly detection system to prevent DDoS attacks in cloud. Int. J. Comput. Appl. 62(15), 42–47 (2014)
R. Sridaran, K. Nagaraju, The performance analysis of N-S architecture to mitigate DDoS attack in cloud environment, in IEEE 3rd International Conference on Computing for Sustainable Global Development (INDIACom), (2016), pp. 3460–3463. ISBN: 978-9-3805-4421-2
F. Wong, X. Tan, A survey of trends in massive DDoS attacks and cloud-based mitigations. Int. J. Netw. Secur. Appl. 6(3), 57–71 (2014). https://doi.org/10.5121/ijnsa.2014.6305
T. Zargar, J. Joshi, T. David, A survey of defense mechanisms against distributed denial of service (DDoS) flooding attacks. IEEE Commun. Surv. Tutor. 15(4), 2046–2069 (2013). https://doi.org/10.1109/SURV.2013.031413.00127
P. Zilberman, P. Rami, E. Yuval, On network footprint of traffic inspection and filtering at global scrubbing centers. IEEE Trans. Depend. Sec. Comput. 19, 1–1 (2015). https://doi.org/10.1109/TDSC.2015.2494039
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2021 The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer Nature Switzerland AG
About this chapter
Cite this chapter
Bhardwaj, A., Goundar, S., Sapra, L. (2021). Infrastructure Design to Secure Cloud Environments Against DDoS-Based Attacks. In: Bhardwaj, A., Sapra, V. (eds) Security Incidents & Response Against Cyber Attacks. EAI/Springer Innovations in Communication and Computing. Springer, Cham. https://doi.org/10.1007/978-3-030-69174-5_7
Download citation
DOI: https://doi.org/10.1007/978-3-030-69174-5_7
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-69173-8
Online ISBN: 978-3-030-69174-5
eBook Packages: EngineeringEngineering (R0)