DDoS attacks and impacts on various cloud computing components

作者: Ahmet Efe

DOI:

关键词:

摘要: Cloud computing is the subject of era and current keen domain interest organizations. Therefore, future outlook this technology optimisticly considered to be widely adapted in domain. On other hand, moving cloud paradigm, new security mechanism defense frameworks are being developed against all threats malicious network attacks that threaten service availability for continuity public private services. Considering increasing usage services by government bodies poses an emerging threat e-government e-governance structures national local bodies. IoT, industry 4.0, smart cities novel artificial intelligence applications require devices connected ever present platforms, provide wide range potential zombie armies used Distributed Denial Service (DDoS) which omongst most critical under environment. In survey, we have introduced recent reports trends attack its effects on various components. Furthermore, discuss detail classification DDoS threatening components make analysis assessments infrastructures both advantages risks. We assert considering kinds tools, proactive capabilities, virtual connecting innovative methods attackers very rapidly compromising halting systems, it crucial importance cyber strategies national, central consider pertinent preemptive countermeasures periodically revise their action plans dynamically.

参考文章(51)
Kahina Lazri, Sylvie Laniepce, Haiming Zheng, Jalel Ben-Othman, AMAD: Resource Consumption Profile-Aware Attack Detection in IaaS Cloud ieee acm international conference utility and cloud computing. pp. 379- 386 ,(2014) , 10.1109/UCC.2014.48
Christian Mainka, Juraj Somorovsky, Jorg Schwenk, Penetration Testing Tool for Web Services Security world congress on services. pp. 163- 170 ,(2012) , 10.1109/SERVICES.2012.7
Francesco Palmieri, Sergio Ricciardi, Ugo Fiore, Massimo Ficco, Aniello Castiglione, Energy-oriented denial of service attacks: an emerging menace for large cloud infrastructures The Journal of Supercomputing. ,vol. 71, pp. 1620- 1641 ,(2015) , 10.1007/S11227-014-1242-6
Munwar Ali Zardari, Low Tang Jung, Nordin Zakaria, A quantitative analysis of cloud users' satisfaction and data security in cloud models science and information conference. pp. 42- 47 ,(2014) , 10.1109/SAI.2014.6918170
Andreas Falkenberg, Christian Mainka, Juraj Somorovsky, Jorg Schwenk, A New Approach towards DoS Penetration Testing on Web Services 2013 IEEE 20th International Conference on Web Services. pp. 491- 498 ,(2013) , 10.1109/ICWS.2013.72
Aman Bakshi, Yogesh B. Dujodwala, Securing Cloud from DDOS Attacks Using Intrusion Detection System in Virtual Machine 2010 Second International Conference on Communication Software and Networks. pp. 260- 264 ,(2010) , 10.1109/ICCSN.2010.56
Vinko Zlomislic, Kresimir Fertalj, Vlado Sruk, Denial of service attacks: An overview iberian conference on information systems and technologies. pp. 1- 6 ,(2014) , 10.1109/CISTI.2014.6876979
P. Revathi, Flow and rank correlation based detection against Distributed Reflection Denial of Service attack international conference on recent trends in information technology. pp. 1- 6 ,(2014) , 10.1109/ICRTIT.2014.6996117
Ashley Chonka, Yang Xiang, Wanlei Zhou, Alessio Bonti, Cloud security defence to protect cloud computing against HTTP-DoS and XML-DoS attacks Journal of Network and Computer Applications. ,vol. 34, pp. 1097- 1107 ,(2011) , 10.1016/J.JNCA.2010.06.004