Strategies for Monitoring the Cloud for Distributed Denial of Service Attacks

Authors

  • Vimalkumar Rathod, Anil Prajapati, Rinkalben Prajapati, Mayureeben Rathva

Keywords:

Distributed Denial of Service, Improved-Kernal, Anomaly Detection, Cloud computing, Blockchain, Software Define Network

Abstract

Cloud computing services are developing in various industries in recent years due to their availability, reliability, and adaptability. As a result, the majority of organizations are trusting this emerging technology for rapid production jobs. However, the transformation of local level computing to remote level computing will lead to numerous security issues for cloud customers and providers, from data security and availability. However, Denial of Service (DoS) and Distributed Denial of Service attacks (DDoS) are considered significant types of damage to the cloud environment that tremendously cripple cloud services and resources. Hence, this novel research work provides four contributions for maximization of performance and cloud services' availability to legitimate users and guaranteeing a quick and primitive attack identification rate. Initially, it contributes to proposing a novel method with the combination of prominent methodologies such as SHA256 and Improved-Kernal Online Anomaly Detection, which are proposed and make use to generate distinctive entries’ into the cloud environment to categorize the malicious user and regular users

Downloads

Download data is not yet available.

References

Alqarni, A. A. (2022). Majority Vote-Based Ensemble Approach for Distributed Denial of Service Attack Detection in Cloud Computing. Journal of Cyber Security and Mobility, 5(4) pp. 265-278.

Antonelli, F., Cortellessa, V., Gribaudo, M., Pinciroli, R., Trivedi, K.S. and Trubiani, C., (2020). Analytical modeling of performance indices under epistemic uncertainty applied to cloud computing systems. Future Generation Computer Systems, 102(2), pp.746-761.

Argyraki, K.J. and Cheriton, D.R., 2005, April. Active Internet Traffic Filtering: RealTime Response to Denial-of-Service Attacks. In USENIX annual technical conference, general track. 38(3) pp.46-61.

Asosheh, A. and Ramezani, N., 2008. A comprehensive taxonomy of DDOS attacks and defense mechanism applying in a smart classification. WSEAS Transactions on Computers, 7(4), pp.281-290.

Bawany, N.Z., Shamsi, J.A. and Salah, K., (2017). DDoS attack detection and mitigation using SDN: methods, practices, and solutions. Arabian Journal for Science and Engineering, 42(2), pp.425-441.

Bharot, N., Verma, P., Sharma, S. and Suraparaju, V., 2018. Distributed denial-of-service attack detection and mitigation using feature selection and intensive care request processing unit. Arabian Journal for Science and Engineering, 43(2), pp.959-967.

Bhandari, M., Gutte, V. S., &Mundhe, P. (2022). A Survey Paper on Characteristics and Technique Used for Enhancement of Cloud Computıng and Their Security Issues. In Pervasive Computing and Social Networking (pp. 217-230). Springer, Singapore.

Bhushan, K. and Gupta, B.B., (2019). Network flow analysis for detection and mitigation of Fraudulent Resource Consumption (FRC) attacks in multimedia cloud computing. Multimedia Tools and Applications, 78(4), pp.4267-4298

Chai, X., Wang, Y., Yan, C., Zhao, Y., Chen, W. and Wang, X., 2020, July. DQMOTAG: Deep Reinforcement Learning-based Moving Target Defense Against DDoS Attacks. In 2020 IEEE Fifth International Conference on Data Science in Cyberspace (DSC) IEEE 56(8) pp. 375-379.

Chang, V., Kuo, Y.H. and Ramachandran, M., 2016. Cloud computing adoption framework: A security framework for business clouds. Future Generation Computer Systems, 57(2), pp.24-41.

Kautish, S., Reyana, A., &Vidyarthi, A. (2022). SDMTA: Attack Detection and Mitigation Mechanism for DDoS Vulnerabilities in Hybrid Cloud Environment. IEEE Transactions on Industrial Informatics. 4(3) pp.12-19 Khan, M.A., 2016. A survey of security issues for cloud computing. Journal of network and computer applications, 71(3), pp.11-29.

Khan, N. and Al-Yasiri, A., (2016). Identifying cloud security threats to strengthen cloud computing adoption framework. Procedia Computer Science, 94(2), pp.485-490.

Khan, S., Gani, A., Wahab, A.W.A. and Singh, P.K., 2018. Feature selection of denial-ofservice attacks using entropy and granular computing. Arabian Journal for Science and Engineering, 43(2), pp.499-508

Nissim, N., Lahav, O., Cohen, A., Elovici, Y. and Rokach, L., (2019). Volatile memory analysis using the MinHash method for efficient and secured detection of malware in private cloud. Computers & Security, 87(2), p.101590

K. Ingole and D. Padole, "Design Approaches for Internet of Things Based System Model for Agricultural Applications," 2023 11th International Conference on Emerging Trends in Engineering & Technology - Signal and Information Processing (ICETET - SIP), Nagpur, India, 2023, pp. 1-5, doi: 10.1109/ICETET-SIP58143.2023.10151606.

Tariq, M.I., 2019. Agent Based Information Security Framework for Hybrid Cloud Computing. KSII Transactions on Internet & Information Systems, 13(1). pp.14-19

Tavbulatova, Z. K., K. Zhigalov, S. Yu Kuznetsova, and A. M. Patrusova, (2020). "Types of cloud deployment." In Journal of Physics: Conference Series, 1582(1), p. 012085. IOP Publishing.

Thabit, F., Can, O., Alhomdy, S., Al-Gaphari, G. H., &Jagtap, S. (2022). A Novel Effective Lightweight Homomorphic Cryptographic Algorithm for data security in cloud computing. International Journal of Intelligent Networks 2(5), pp.20-34

Downloads

Published

26.03.2024

How to Cite

Vimalkumar Rathod. (2024). Strategies for Monitoring the Cloud for Distributed Denial of Service Attacks. International Journal of Intelligent Systems and Applications in Engineering, 12(21s), 3581 –. Retrieved from https://ijisae.org/index.php/IJISAE/article/view/6084

Issue

Section

Research Article