You are on page 1of 5

3/28/2018 Taxonomy of Recent DDoS Attack Prevention, Detection, and Response Schemes in Cloud Environment | SpringerLink

Taxonomy of Recent DDoS Attack


Prevention, Detection, and Response
Schemes in Cloud Environment
Proceedings of the International Conference on Recent Cognizance in Wireless
Communication & Image Processing pp 683-693 | Cite as

Omkar P. Badve (1)


B. B. Gupta (1) Email author (gupta.brij@gmail.com)

1. National Institute of Technology, Kurukshetra, India

Conference paper
First Online: 29 April 2016

2 Citations
2 Readers
322 Downloads

Abstract

In recent years the need for using cloud environment has increased abundantly. Threats
to cloud computing are also rising with its usage. Among various threats to cloud,
distributed denial-of-service (DDoS) attack is a main threat today. DDoS attack
compromises the availability of the services and risks everything including financial loss,
losing reputation, and loss of confidence of cloud users over the organization. To avoid
this we need more profound and elegant way to secure cloud structure from DDoS attack.
In this paper, we discuss recent development and protection mechanisms (i.e.,
prevention, detection, and response) against DDoS attack in cloud environment. These
methods include preventive measures that are applied before the attack, detection
method that can be applied while the attack is live, and responsive methods that are
applied after the attack. This paper discusses about DDoS attack problem, currently
proposed solutions, and research scope possible in future to deal with such attacks
efficiently.

Keywords
Cloud computing DDoS attack DDoS attack detection and filtering of DDoS attack
This is a preview of subscription content, log in to check access

https://link.springer.com/chapter/10.1007/978-81-322-2638-3_76 1/5
3/28/2018 Taxonomy of Recent DDoS Attack Prevention, Detection, and Response Schemes in Cloud Environment | SpringerLink

References
1. Amazon Elastic Compute cloud (Amazon EC2), Amazon.
http://aws.amazon.com/ec2/ (http://aws.amazon.com/ec2/). Accessed Sept
2014
2. IBM cloud Computing, IBM. http://www.ibm.com/cloud-computing/in/en/
(http://www.ibm.com/cloud-computing/in/en/). Accessed Sept 2014
3. Azure: Microsoft’s cloud Platform, Microsoft Corporation.
http://azure.microsoft.com/en-us/ (http://azure.microsoft.com/en-us/).
Accessed Sept 2014
4. Prince, M.: The DDoS That Knocked Spamhaus Offline (And How We Mitigated
It). cloudFlare Blog (2013). http://blog.cloudflare.com/the-ddos-that-knocked-
spamhaus-offline-and-ho/ (http://blog.cloudflare.com/the-ddos-that-knocked-
spamhaus-offline-and-ho/). Accessed Sept 2014
5. Srivastava, A., Gupta, B.B., Tyagi, A., Sharma, A., Mishra, A.: A recent survey on
DDoS attacks and defense mechanisms. In: Book on Advances in Parallel
Distributed Computing, pp. 570–580. Springer (2011)
Google Scholar (https://scholar.google.com/scholar?
q=Srivastava%2C%20A.%2C%20Gupta%2C%20B.B.%2C%20Tyagi%2C%20A.%2
C%20Sharma%2C%20A.%2C%20Mishra%2C%20A.%3A%20A%20recent%20sur
vey%20on%20DDoS%20attacks%20and%20defense%20mechanisms.%20In%3A
%20Book%20on%20Advances%20in%20Parallel%20Distributed%20Computing
%2C%20pp.%20570%E2%80%93580.%20Springer%20%282011%29)
6. Ko, R., Lee, S.S.G.: cloud Computing Vulnerability Incidents: A Statistical
Overview (2013).
https://downloads.cloudsecurityalliance.org/initiatives/cvwg/CSA_Whitepaper_c
(https://downloads.cloudsecurityalliance.org/initiatives/cvwg/CSA_Whitepaper
_cloud_Computing_Vulnerability_Incidents.zip). Accessed Sept 2014
7. Arbor Networks, Inc.: Worldwide Infrastructure Security Report Volume IX
(2014). http://pages.arbornetworks.com/rs/arbor/images/WISR2014.pdf
(http://pages.arbornetworks.com/rs/arbor/images/WISR2014.pdf). Accessed
Sept 2014
8. Yu, S., Tian, Y., Guo, S., Wu, D.O.: Can we beat DDoS attacks in clouds? IEEE
Trans. Parallel Distrib. Syst. 25(9), 2245–2254 (2014)
Google Scholar (https://scholar.google.com/scholar?
q=Yu%2C%20S.%2C%20Tian%2C%20Y.%2C%20Guo%2C%20S.%2C%20Wu%2
C%20D.O.%3A%20Can%20we%20beat%20DDoS%20attacks%20in%20clouds%3
F%20IEEE%20Trans.%20Parallel%20Distrib.%20Syst.%2025%289%29%2C%20
2245%E2%80%932254%20%282014%29)
9. Chapade, S.S., Pandey, K.U., Bhade, D.S.: Securing cloud servers against flooding
based DDoS attacks. In: 2013 International Conference on Communication
Systems and Network Technologies (CSNT), 6–8 Apr 2013, pp. 524, 528
Google Scholar (https://scholar.google.com/scholar?
q=Chapade%2C%20S.S.%2C%20Pandey%2C%20K.U.%2C%20Bhade%2C%20D.S
.%3A%20Securing%20cloud%20servers%20against%20flooding%20based%20D

https://link.springer.com/chapter/10.1007/978-81-322-2638-3_76 2/5
3/28/2018 Taxonomy of Recent DDoS Attack Prevention, Detection, and Response Schemes in Cloud Environment | SpringerLink

DoS%20attacks.%20In%3A%202013%20International%20Conference%20on%20
Communication%20Systems%20and%20Network%20Technologies%20%28CSN
T%29%2C%206%E2%80%938%20Apr%202013%2C%20pp.%20524%2C%20528
)
10. Liu, H.: A new form of DOS attack in a cloud and its avoidance mechanism. In:
Proceedings of the 2010 ACM Workshop on cloud Computing Security Workshop.
ACM (2010)
Google Scholar (https://scholar.google.com/scholar?
q=Liu%2C%20H.%3A%20A%20new%20form%20of%20DOS%20attack%20in%2
0a%20cloud%20and%20its%20avoidance%20mechanism.%20In%3A%20Procee
dings%20of%20the%202010%20ACM%20Workshop%20on%20cloud%20Comp
uting%20Security%20Workshop.%20ACM%20%282010%29)
11. Chen, Q., Lin, W., Dou, W., Yu, S.: CBF: a packet filtering method for DDoS attack
defense in cloud environment. In: 2011 IEEE Ninth International Conference on
Dependable, Autonomic and Secure Computing (DASC), pp. 427–434 (2011)
Google Scholar (https://scholar.google.com/scholar?
q=Chen%2C%20Q.%2C%20Lin%2C%20W.%2C%20Dou%2C%20W.%2C%20Yu
%2C%20S.%3A%20CBF%3A%20a%20packet%20filtering%20method%20for%20
DDoS%20attack%20defense%20in%20cloud%20environment.%20In%3A%2020
11%20IEEE%20Ninth%20International%20Conference%20on%20Dependable%2
C%20Autonomic%20and%20Secure%20Computing%20%28DASC%29%2C%20p
p.%20427%E2%80%93434%20%282011%29)
12. Varalakshmi, P., Murrali, M.: Simplified clock drift management to avoid Denial
of Service attacks in cloud. In: 2013 Fifth International Conference on Advanced
Computing (ICoAC), pp. 331–336 (2013)
Google Scholar (https://scholar.google.com/scholar?
q=Varalakshmi%2C%20P.%2C%20Murrali%2C%20M.%3A%20Simplified%20clo
ck%20drift%20management%20to%20avoid%20Denial%20of%20Service%20att
acks%20in%20cloud.%20In%3A%202013%20Fifth%20International%20Confere
nce%20on%20Advanced%20Computing%20%28ICoAC%29%2C%20pp.%20331
%E2%80%93336%20%282013%29)
13. Vissers, T., Somasundaram, T.S., Pieters, L., Govindarajan, K., Hellinckx, P.:
DDoS defense system for web services in a cloud environment. Future Gener.
Comput. Syst. 37, 37–45 (2014)
Google Scholar (https://scholar.google.com/scholar?
q=Vissers%2C%20T.%2C%20Somasundaram%2C%20T.S.%2C%20Pieters%2C%
20L.%2C%20Govindarajan%2C%20K.%2C%20Hellinckx%2C%20P.%3A%20DDo
S%20defense%20system%20for%20web%20services%20in%20a%20cloud%20en
vironment.%20Future%20Gener.%20Comput.%20Syst.%2037%2C%2037%E2%8
0%9345%20%282014%29)
14. Tan, Z., Jamdagni, A., He, X., Nanda, P., Liu, R.P.: A system for denial-of-service
attack detection based on multivariate correlation analysis. IEEE Trans. Parallel
Distrib. Syst. 25(2), 447–456 (2014)
Google Scholar (https://scholar.google.com/scholar?
q=Tan%2C%20Z.%2C%20Jamdagni%2C%20A.%2C%20He%2C%20X.%2C%20N
anda%2C%20P.%2C%20Liu%2C%20R.P.%3A%20A%20system%20for%20denial
-of-
service%20attack%20detection%20based%20on%20multivariate%20correlation

https://link.springer.com/chapter/10.1007/978-81-322-2638-3_76 3/5
3/28/2018 Taxonomy of Recent DDoS Attack Prevention, Detection, and Response Schemes in Cloud Environment | SpringerLink

%20analysis.%20IEEE%20Trans.%20Parallel%20Distrib.%20Syst.%2025%282%
29%2C%20447%E2%80%93456%20%282014%29)
15. Chonka, A., et al.: cloud security defence to protect cloud computing against
HTTP-DoS and XML-DoS attacks. J. Netw. Comput. Appl. 34(4), 1097–1107
(2011)
Google Scholar (https://scholar.google.com/scholar?
q=Chonka%2C%20A.%2C%20et%20al.%3A%20cloud%20security%20defence%2
0to%20protect%20cloud%20computing%20against%20HTTP-
DoS%20and%20XML-
DoS%20attacks.%20J.%20Netw.%20Comput.%20Appl.%2034%284%29%2C%20
1097%E2%80%931107%20%282011%29)
16. Yang, L., Zhang, T., Song, J., Wang, J.S., Chen, P.: Defense of DDoS attack for
cloud computing. In: 2012 IEEE International Conference on Computer Science
and Automation Engineering (CSAE), vol. 2, pp. 626–629. IEEE (2012)
Google Scholar (https://scholar.google.com/scholar?
q=Yang%2C%20L.%2C%20Zhang%2C%20T.%2C%20Song%2C%20J.%2C%20W
ang%2C%20J.S.%2C%20Chen%2C%20P.%3A%20Defense%20of%20DDoS%20at
tack%20for%20cloud%20computing.%20In%3A%202012%20IEEE%20Internati
onal%20Conference%20on%20Computer%20Science%20and%20Automation%2
0Engineering%20%28CSAE%29%2C%20vol.%202%2C%20pp.%20626%E2%80
%93629.%20IEEE%20%282012%29)

Copyright information
© Springer India 2016

About this paper


Cite this paper as:
Badve O.P., Gupta B.B. (2016) Taxonomy of Recent DDoS Attack Prevention, Detection, and Response Schemes
in Cloud Environment. In: Afzalpulkar N., Srivastava V., Singh G., Bhatnagar D. (eds) Proceedings of the
International Conference on Recent Cognizance in Wireless Communication & Image Processing. Springer, New
Delhi

DOI (Digital Object Identifier) https://doi.org/10.1007/978-81-322-2638-3_76


Publisher Name Springer, New Delhi
Print ISBN 978-81-322-2636-9
Online ISBN 978-81-322-2638-3
eBook Packages Engineering

About this book


Reprints and Permissions

Personalised recommendations

https://link.springer.com/chapter/10.1007/978-81-322-2638-3_76 4/5
3/28/2018 Taxonomy of Recent DDoS Attack Prevention, Detection, and Response Schemes in Cloud Environment | SpringerLink

© 2017 Springer International Publishing AG. Part of Springer Nature.

Not logged in Not affiliated 49.184.147.163

https://link.springer.com/chapter/10.1007/978-81-322-2638-3_76 5/5

You might also like