Abstract
Today, every firm either academic or private or government sectors are using the cloud as a platform to store and communicate information over the internet. Lots of data are being exchanged using various applications software and services. Services are integrated and reused the information over WWW. To effectively deal with all information, people are moving on cloud computing platform because of improving the cost of hardware and software, only pay what you use and setting up infrastructure easily and available for 24 × 7. Even though lots of advantages of sharing data on a cloud platform, their obvious question arise is that are those data secure and maintain its privacy by the service provider? Data privacy and security is an essential thing in today’s world. And to provide security and privacy over cloud computing is often challenging part for many organizations. In this paper, we represent some security challenges for cloud platform as services. We state with two security attack using DDoS and Botnet, and also show some countermeasure.
Keywords
- DoS
- DDoS
- Botnet
- Cloud security
This is a preview of subscription content, access via your institution.
Buying options

References
Deshmukha RV, Devadkar KK Understanding DDoS attack & its effect in cloud environment. In: 4th international conference on advances in computing, communication and control (ICAC3’15)
Rai A, Challa RK (2016) Survey on recent DDoS mitigation techniques and comparative analysis. In: Second international conference on computational intelligence & communication technology. IEEE, New York
Wang B, Zheng Y, Lou W, Hou YT (2015) DDoS attack protection in the era of cloud computing and software-defined networking. www.elsevier.com/locate/comnet (Elsevier)
Somani G, Gaur MS, Sanghi D, Conti M, Buyya R (2017) DDoS attacks in cloud computing: issues, taxonomy, and future directions. www.elsevier.com/locate/comcom (Elsevier)
Zissis D, Lekkas D (2012) Addressing cloud computing security issues. Future Gen Comput Syst 28(3):583–592. https://doi.org/10.1016/j.future.2010.12.006
Balobaid A, Alawad W, Aljasim H (2016) A study on the impacts of DoS and DDoS attacks on cloud and mitigation techniques. In: 2016 international conference on computing, analytics and security trends (CAST) College of Engineering Pune, India. Dec 19–21, 2016
Alosaimi W, Zak M, Al-Begain K (2015) Denial of service attacks mitigation in the cloud. In: 9th international conference on next generation mobile applications, services and technologies
Incapsula. https://www.incapsula.com/ddos/denial-of-service.html
Yan Q, Yu FR (2015) Distributed denial of service attacks in software-defined networking with cloud computing. In: Security and privacy in emerging networks. IEEE, New York
Liu X, Yang X, Lu Y (2008) To filter or to authorize: network-layer DoS defense against multimillion-node botnets. In: ACM SIGCOMM computer communication review. ACM, New York
Bhardwaj A, Subrahmanyam GVB, Avasthi V, Sastry H, Goundar S (2016) DDoS attacks, new DDoS taxonomy and mitigation solutions—a survey. In: International conference on signal processing, communication, power and embedded system (SCOPES). IEEE, New York
Khor SH, Nakao A (2011) DaaS: DDoS mitigation-as-a-service. In: IPSJ international symposium on applications and the internet. IEEE, New York
Bawany NZ, Shamsi JA, Salah K (2017) DDoS attack detection and mitigation using SDN: methods, practices, and solutions. In: Review article—computer engineering and computer science. Springer, Berlin
Wong F, Tan CX (2014) A survey of trends in massive DDoS attacks and cloud-based mitigations. Int J Netw Secur Appl (IJNSA) 6(3):57–71
Farahmandian S et al (2013) A survey on methods to defend against DDoS attack in cloud computing. Proc Recent Adv Knowl Eng Syst Sci 6:185–190
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Switzerland AG
About this paper
Cite this paper
Parmar, M.K., Rahevar, M.L. (2019). Compromising Cloud Security and Privacy by DoS, DDoS, and Botnet and Their Countermeasures. In: Pandian, D., Fernando, X., Baig, Z., Shi, F. (eds) Proceedings of the International Conference on ISMAC in Computational Vision and Bio-Engineering 2018 (ISMAC-CVB). ISMAC 2018. Lecture Notes in Computational Vision and Biomechanics, vol 30. Springer, Cham. https://doi.org/10.1007/978-3-030-00665-5_17
Download citation
DOI: https://doi.org/10.1007/978-3-030-00665-5_17
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-00664-8
Online ISBN: 978-3-030-00665-5
eBook Packages: EngineeringEngineering (R0)