Advertisement

Compromising Cloud Security and Privacy by DoS, DDoS, and Botnet and Their Countermeasures

  • Martin K. Parmar
  • Mrugendrasinh L. Rahevar
Conference paper
Part of the Lecture Notes in Computational Vision and Biomechanics book series (LNCVB, volume 30)

Abstract

Today, every firm either academic or private or government sectors are using the cloud as a platform to store and communicate information over the internet. Lots of data are being exchanged using various applications software and services. Services are integrated and reused the information over WWW. To effectively deal with all information, people are moving on cloud computing platform because of improving the cost of hardware and software, only pay what you use and setting up infrastructure easily and available for 24 × 7. Even though lots of advantages of sharing data on a cloud platform, their obvious question arise is that are those data secure and maintain its privacy by the service provider? Data privacy and security is an essential thing in today’s world. And to provide security and privacy over cloud computing is often challenging part for many organizations. In this paper, we represent some security challenges for cloud platform as services. We state with two security attack using DDoS and Botnet, and also show some countermeasure.

Keywords

DoS DDoS Botnet Cloud security 

References

  1. 1.
    Deshmukha RV, Devadkar KK Understanding DDoS attack & its effect in cloud environment. In: 4th international conference on advances in computing, communication and control (ICAC3’15)Google Scholar
  2. 2.
    Rai A, Challa RK (2016) Survey on recent DDoS mitigation techniques and comparative analysis. In: Second international conference on computational intelligence & communication technology. IEEE, New YorkGoogle Scholar
  3. 3.
    Wang B, Zheng Y, Lou W, Hou YT (2015) DDoS attack protection in the era of cloud computing and software-defined networking. www.elsevier.com/locate/comnet (Elsevier)CrossRefGoogle Scholar
  4. 4.
    Somani G, Gaur MS, Sanghi D, Conti M, Buyya R (2017) DDoS attacks in cloud computing: issues, taxonomy, and future directions. www.elsevier.com/locate/comcom (Elsevier)CrossRefGoogle Scholar
  5. 5.
    Zissis D, Lekkas D (2012) Addressing cloud computing security issues. Future Gen Comput Syst 28(3):583–592.  https://doi.org/10.1016/j.future.2010.12.006CrossRefGoogle Scholar
  6. 6.
    Balobaid A, Alawad W, Aljasim H (2016) A study on the impacts of DoS and DDoS attacks on cloud and mitigation techniques. In: 2016 international conference on computing, analytics and security trends (CAST) College of Engineering Pune, India. Dec 19–21, 2016Google Scholar
  7. 7.
    Alosaimi W, Zak M, Al-Begain K (2015) Denial of service attacks mitigation in the cloud. In: 9th international conference on next generation mobile applications, services and technologiesGoogle Scholar
  8. 8.
  9. 9.
    Yan Q, Yu FR (2015) Distributed denial of service attacks in software-defined networking with cloud computing. In: Security and privacy in emerging networks. IEEE, New YorkCrossRefGoogle Scholar
  10. 10.
    Liu X, Yang X, Lu Y (2008) To filter or to authorize: network-layer DoS defense against multimillion-node botnets. In: ACM SIGCOMM computer communication review. ACM, New YorkCrossRefGoogle Scholar
  11. 11.
    Bhardwaj A, Subrahmanyam GVB, Avasthi V, Sastry H, Goundar S (2016) DDoS attacks, new DDoS taxonomy and mitigation solutions—a survey. In: International conference on signal processing, communication, power and embedded system (SCOPES). IEEE, New YorkGoogle Scholar
  12. 12.
    Khor SH, Nakao A (2011) DaaS: DDoS mitigation-as-a-service. In: IPSJ international symposium on applications and the internet. IEEE, New YorkGoogle Scholar
  13. 13.
    Bawany NZ, Shamsi JA, Salah K (2017) DDoS attack detection and mitigation using SDN: methods, practices, and solutions. In: Review article—computer engineering and computer science. Springer, BerlinCrossRefGoogle Scholar
  14. 14.
    Wong F, Tan CX (2014) A survey of trends in massive DDoS attacks and cloud-based mitigations. Int J Netw Secur Appl (IJNSA) 6(3):57–71Google Scholar
  15. 15.
    Farahmandian S et al (2013) A survey on methods to defend against DDoS attack in cloud computing. Proc Recent Adv Knowl Eng Syst Sci 6:185–190Google Scholar

Copyright information

© Springer Nature Switzerland AG 2019

Authors and Affiliations

  1. 1.U & P U. Patel Department of Computer EngineeringCSPIT, CHARUSATChangaIndia

Personalised recommendations