Professional Documents
Culture Documents
NTP amplification attack: Here the attacker exploits the As we have seen the various DDoS attacks. Research has
functionality of Network Timing Protocol (NTP) server with been conducted by adopting various strategies to detect the
amplified amount of UDP traffic and stopping the HTTP attack in a cloud-based environment. The study on
accessibility to regular traffic. It is a reflection-based Multivariate Correlation
volumetric DDoS attack. This attack can be mitigated by Analysis-based detection
Published By:
Retrieval Number: A10021191S19/2019©BEIESP Blue Eyes Intelligence Engineering
DOI: 10.35940/ijitee.A1002.1191S19 & Sciences Publication
6
International Journal of Innovative Technology and Exploring Engineering (IJITEE)
ISSN: 2278-3075, Volume-9 Issue-1S, November 2019
The other form where the attacker may be valid cloud user
and affected VM are present in the different subnetwork,
causing the external flooding attacks. The architecture of the
flooding attacks at the external cloud network is shown.
The scheme has used the DARPA dataset and CAIDA 14. I. Gul and M. Hussain, “Distributed cloud intrusion detection system
(H-NIDS) in cloud computing”, in Proceedings of the IEEE Symposium on
dataset to test the DDoS attack. In this approach, all the Computational Intelligence in Cyber Security (CICS ‟13), pp. 23-30, April
packets of the DARPA dataset are considered authorised 2013.
packets and all the packets of the CAIDA dataset are 15. R. Miao et al., “Nimbus: Cloud-scale attack detection and mitigation,”
Proceedings of the 2014 ACM conference on SIGCOMM, pages 121-122,
considered as attack packets. The appropriate results are ACM, 2014.
yielded and this mechanism recognizes the LDoS attack
flows based on the t-statistic and deals it very efficiently.
AUTHORS PROFILE
REFERENCES
1. Gaurav Somani, et al, “DDoS/EDoS attack in Cloud: Affecting everyone
out there,” SIN ‟15, September 08-10, 2015, Sochi, Russian Federation.
2. Abdulaziz Aborujilah et al, “Cloud-Based DDoS HTTP Attack Detection
Using Covariance Matrix Approach”, Hindawi Journal of Computer
Networks and Communications, Volume 2017, Article ID 7674594,
Available: https://doi.org/10.1155/2017/7674594
3. Gupta et al, “Hypothesis Test for Low-rate DDoS Attack Detection in
Cloud Computing Environment”, Science Direct, Procedia Computer
Science, International Conference on Computational Intelligence and
Data Science (ICCIDS 2018).
4. Fahad Zaman Chowdury et al, “EDoS eye: A game theoretic approach to
mitigate economic denial of sustainability attack in cloud computing”,
Control and System Graduate Research Colloquium (ICSGRC), IEEE 8 th
International Conference, 2017.
5. Shruti Wadhwa et al., “Prevention of DDoS & EDoS using Hybrid
Filtering technique in a Cloud Environment”, International Journal of Pure
and Applied Mathematics, Vol. 114 No. 12 Pages 383-392, 2017.
6. D. S. Yeung et al., “Covariance-matrix modeling and detecting various
flooding attacks,” IEEE Transactions on Systems, Man, and Cybernetics
Part A:Systems and Humans, Vol. 37, No. 2, pp157-169, 2007.
7. https://cloudfare.com/learning/ddos
8. Shikha Vashisht et al., “Study of Cloud Computing Environment EDoS
attack using CloudSim (Modelling and Simulation/Simulator),”
Internationaal Journal of Advanced Research in Computer Science, Vol. 6
No. 5, May-June 2015.
9. Mohammad Masdari, et al., “A survey and taxonomy of DoS attacks in
cloud computing: DoS attacks in cloud computing,” Security and
Communication Networks, DOI: 10.1002/sec.1539, July 2016.
10. K. Labs. Global it security risks survey 2014, A Distributed denial of
service (ddos) attacks. Available: http://media.kaspersky.com/en/
B2B-International-2014-Survey-DDoS-Summary-Report. Pdf, 2014.
11. R. Pandrangi. Verisign‟s q4 2014 ddos trends: Public sector experiences
largest increase in ddos attacks.
http://blogs.verisigninc.com/blog/entry/verisign_s_q4_2014_ddos, 2015.
12. Baig, Z.A., Sait, et al., “Controlled access to cloud resources for mitigating
Economic Denial of Sustainability (EDoS) attacks,” Computer Networks
97: 31-47.
13. S. Alsowail et al., “An experimental evaluation of the EDoS-shield
mitigation technique for securing the cloud,” Arabian Journal for Science
and Engineering, Vol. 41, no. 12, pp. 5037-5047, 2016.
Published By:
Retrieval Number: A10021191S19/2019©BEIESP Blue Eyes Intelligence Engineering
DOI: 10.35940/ijitee.A1002.1191S19 & Sciences Publication
8