Skip to main content

Compromising Cloud Security and Privacy by DoS, DDoS, and Botnet and Their Countermeasures

  • 1408 Accesses

Part of the Lecture Notes in Computational Vision and Biomechanics book series (LNCVB,volume 30)

Abstract

Today, every firm either academic or private or government sectors are using the cloud as a platform to store and communicate information over the internet. Lots of data are being exchanged using various applications software and services. Services are integrated and reused the information over WWW. To effectively deal with all information, people are moving on cloud computing platform because of improving the cost of hardware and software, only pay what you use and setting up infrastructure easily and available for 24 × 7. Even though lots of advantages of sharing data on a cloud platform, their obvious question arise is that are those data secure and maintain its privacy by the service provider? Data privacy and security is an essential thing in today’s world. And to provide security and privacy over cloud computing is often challenging part for many organizations. In this paper, we represent some security challenges for cloud platform as services. We state with two security attack using DDoS and Botnet, and also show some countermeasure.

Keywords

  • DoS
  • DDoS
  • Botnet
  • Cloud security

This is a preview of subscription content, access via your institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • DOI: 10.1007/978-3-030-00665-5_17
  • Chapter length: 11 pages
  • Instant PDF download
  • Readable on all devices
  • Own it forever
  • Exclusive offer for individuals only
  • Tax calculation will be finalised during checkout
eBook
USD   44.99
Price excludes VAT (USA)
  • ISBN: 978-3-030-00665-5
  • Instant PDF download
  • Readable on all devices
  • Own it forever
  • Exclusive offer for individuals only
  • Tax calculation will be finalised during checkout
Hardcover Book
USD   59.99
Price excludes VAT (USA)
Fig. 1

References

  1. Deshmukha RV, Devadkar KK Understanding DDoS attack & its effect in cloud environment. In: 4th international conference on advances in computing, communication and control (ICAC3’15)

    Google Scholar 

  2. Rai A, Challa RK (2016) Survey on recent DDoS mitigation techniques and comparative analysis. In: Second international conference on computational intelligence & communication technology. IEEE, New York

    Google Scholar 

  3. Wang B, Zheng Y, Lou W, Hou YT (2015) DDoS attack protection in the era of cloud computing and software-defined networking. www.elsevier.com/locate/comnet (Elsevier)

  4. Somani G, Gaur MS, Sanghi D, Conti M, Buyya R (2017) DDoS attacks in cloud computing: issues, taxonomy, and future directions. www.elsevier.com/locate/comcom (Elsevier)

  5. Zissis D, Lekkas D (2012) Addressing cloud computing security issues. Future Gen Comput Syst 28(3):583–592. https://doi.org/10.1016/j.future.2010.12.006

    CrossRef  Google Scholar 

  6. Balobaid A, Alawad W, Aljasim H (2016) A study on the impacts of DoS and DDoS attacks on cloud and mitigation techniques. In: 2016 international conference on computing, analytics and security trends (CAST) College of Engineering Pune, India. Dec 19–21, 2016

    Google Scholar 

  7. Alosaimi W, Zak M, Al-Begain K (2015) Denial of service attacks mitigation in the cloud. In: 9th international conference on next generation mobile applications, services and technologies

    Google Scholar 

  8. Incapsula. https://www.incapsula.com/ddos/denial-of-service.html

  9. Yan Q, Yu FR (2015) Distributed denial of service attacks in software-defined networking with cloud computing. In: Security and privacy in emerging networks. IEEE, New York

    Google Scholar 

  10. Liu X, Yang X, Lu Y (2008) To filter or to authorize: network-layer DoS defense against multimillion-node botnets. In: ACM SIGCOMM computer communication review. ACM, New York

    Google Scholar 

  11. Bhardwaj A, Subrahmanyam GVB, Avasthi V, Sastry H, Goundar S (2016) DDoS attacks, new DDoS taxonomy and mitigation solutions—a survey. In: International conference on signal processing, communication, power and embedded system (SCOPES). IEEE, New York

    Google Scholar 

  12. Khor SH, Nakao A (2011) DaaS: DDoS mitigation-as-a-service. In: IPSJ international symposium on applications and the internet. IEEE, New York

    Google Scholar 

  13. Bawany NZ, Shamsi JA, Salah K (2017) DDoS attack detection and mitigation using SDN: methods, practices, and solutions. In: Review article—computer engineering and computer science. Springer, Berlin

    Google Scholar 

  14. Wong F, Tan CX (2014) A survey of trends in massive DDoS attacks and cloud-based mitigations. Int J Netw Secur Appl (IJNSA) 6(3):57–71

    Google Scholar 

  15. Farahmandian S et al (2013) A survey on methods to defend against DDoS attack in cloud computing. Proc Recent Adv Knowl Eng Syst Sci 6:185–190

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Martin K. Parmar .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and Permissions

Copyright information

© 2019 Springer Nature Switzerland AG

About this paper

Verify currency and authenticity via CrossMark

Cite this paper

Parmar, M.K., Rahevar, M.L. (2019). Compromising Cloud Security and Privacy by DoS, DDoS, and Botnet and Their Countermeasures. In: Pandian, D., Fernando, X., Baig, Z., Shi, F. (eds) Proceedings of the International Conference on ISMAC in Computational Vision and Bio-Engineering 2018 (ISMAC-CVB). ISMAC 2018. Lecture Notes in Computational Vision and Biomechanics, vol 30. Springer, Cham. https://doi.org/10.1007/978-3-030-00665-5_17

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-00665-5_17

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-00664-8

  • Online ISBN: 978-3-030-00665-5

  • eBook Packages: EngineeringEngineering (R0)