Skip to main content
Top

2020 | OriginalPaper | Chapter

20. A Comprehensive Review of Distributed Denial of Service (DDoS) Attacks in Fog Computing Environment

Authors : Bhumika Paharia, Kriti Bhushan

Published in: Handbook of Computer Networks and Cyber Security

Publisher: Springer International Publishing

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Cloud computing performs several functionalities, and one of the most important functionalities is the storage and processing of data or information. With day-by-day enhancement of technology, cloud has been overburdened, and to address this issue, the concept of fog computing has been introduced. Fog computing is an extension of the properties of cloud computing to the network’s edge and additionally overcomes its limitations. Despite the growing fame of fog services, assuring the security and privacy of data is still a big challenge. Distributed denial of service (DDoS) attack is a well-known threat among the security concerns and an important research challenge when talking particularly about security of data in fog computing environment. Therefore, this chapter presents a survey which encompasses the various concepts of fog computing, DDoS attacks and some DDoS mitigation techniques, thus providing a comprehensive review. In addition, it beholds the future work in this domain. This chapter will attract new researchers and also strengthen the concept of fog computing.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
2.
go back to reference Xiao, Z., & Yang, X. (2013). Security and privacy in cloud computing. IEEE Communications Surveys & Tutorials, 15(2), 843–859.MathSciNetCrossRef Xiao, Z., & Yang, X. (2013). Security and privacy in cloud computing. IEEE Communications Surveys & Tutorials, 15(2), 843–859.MathSciNetCrossRef
3.
go back to reference Davey, R. P., Grossman, D., Rasztovitswiech, M., Payne, D. B., Nesset, D., Kelly, A. E., Rafel, A., Appathurai, S., & Yang, S. H. (2009). Long-reach passive optical networks. Journal of Lightwave Technology, 27(3), 273–291.CrossRef Davey, R. P., Grossman, D., Rasztovitswiech, M., Payne, D. B., Nesset, D., Kelly, A. E., Rafel, A., Appathurai, S., & Yang, S. H. (2009). Long-reach passive optical networks. Journal of Lightwave Technology, 27(3), 273–291.CrossRef
4.
go back to reference Zhang, W., Lin, B., Yin, Q., & Zhao, T. (2017). Infrastructure deployment and optimization of fog network based on microDC and LRPON integration. Peer-to-Peer Networking and Applications, 10(3), 579–591.CrossRef Zhang, W., Lin, B., Yin, Q., & Zhao, T. (2017). Infrastructure deployment and optimization of fog network based on microDC and LRPON integration. Peer-to-Peer Networking and Applications, 10(3), 579–591.CrossRef
5.
go back to reference Bastug, E., Bennis, M., & Debbah, M. (2014). Living on the edge: The role of proactive caching in 5G wireless network. IEEE Communications Magazine, 52(8), 82–89.CrossRef Bastug, E., Bennis, M., & Debbah, M. (2014). Living on the edge: The role of proactive caching in 5G wireless network. IEEE Communications Magazine, 52(8), 82–89.CrossRef
6.
go back to reference Hassan, M. A., Xiao, M., Wei, Q., & Chen, S. (2015). Help your mobile applications with fog computing. In Proceedings of the IEEE international conference on sensing, communication, and networking – workshop (pp. 1–6). IEEE. Hassan, M. A., Xiao, M., Wei, Q., & Chen, S. (2015). Help your mobile applications with fog computing. In Proceedings of the IEEE international conference on sensing, communication, and networking – workshop (pp. 1–6). IEEE.
8.
11.
go back to reference Hua, P., Dhelima, S., Ninga, H., & Qiu, T. (2017). Survey on fog computing: Architecture, key technologies, applications and open issues. Journal of Network and Computer Applications, 98, 27–42.CrossRef Hua, P., Dhelima, S., Ninga, H., & Qiu, T. (2017). Survey on fog computing: Architecture, key technologies, applications and open issues. Journal of Network and Computer Applications, 98, 27–42.CrossRef
12.
go back to reference Sarkar, S., & Misra, S. (2016). Theoretical modelling of fog computing: A green computing paradigm to support IoT applications. IET Networks, 5(2), 23–29.CrossRef Sarkar, S., & Misra, S. (2016). Theoretical modelling of fog computing: A green computing paradigm to support IoT applications. IET Networks, 5(2), 23–29.CrossRef
13.
go back to reference More, P. (2015). Review of implementing fog computing. IJRET: International Journal of Research in Engineering and Technology, 04(06), 335–338.CrossRef More, P. (2015). Review of implementing fog computing. IJRET: International Journal of Research in Engineering and Technology, 04(06), 335–338.CrossRef
14.
go back to reference Oueis, J., Strinati, E.C., Sardellitti, S., & Barbarossa, S.. (2015). Small cell clustering for efficient distributed fog computing: A multi-user case, In Proceedings of the IEEE 82nd vehicular technology conference (VTC Fall) (pp. 1–5). Oueis, J., Strinati, E.C., Sardellitti, S., & Barbarossa, S.. (2015). Small cell clustering for efficient distributed fog computing: A multi-user case, In Proceedings of the IEEE 82nd vehicular technology conference (VTC Fall) (pp. 1–5).
15.
go back to reference Zeng, D., Gu, L., Guo, S., Cheng, Z., & Yu, S. (2016). Joint optimization of task scheduling and image placement in fog computing supported software-defined embedded system. IEEE Transactions on Computers, 65(12), 3702–3712.MathSciNetMATHCrossRef Zeng, D., Gu, L., Guo, S., Cheng, Z., & Yu, S. (2016). Joint optimization of task scheduling and image placement in fog computing supported software-defined embedded system. IEEE Transactions on Computers, 65(12), 3702–3712.MathSciNetMATHCrossRef
16.
go back to reference Kang, K., Wang, C., & Luo, T. (2016). Fog computing for vehicular ad-hoc networks: Paradigms, scenarios, and issues. The Journal of China Universities of Posts and Telecommunications, 23(2), 56–96.CrossRef Kang, K., Wang, C., & Luo, T. (2016). Fog computing for vehicular ad-hoc networks: Paradigms, scenarios, and issues. The Journal of China Universities of Posts and Telecommunications, 23(2), 56–96.CrossRef
17.
go back to reference Aazam, M., & Huh, E. N. (2016). Fog computing: The cloud-IoT/IoE middleware paradigm. IEEE Potentials, 35(3), 40–44.CrossRef Aazam, M., & Huh, E. N. (2016). Fog computing: The cloud-IoT/IoE middleware paradigm. IEEE Potentials, 35(3), 40–44.CrossRef
18.
go back to reference Bonomi, F., Milito, R., Natarajan, P., & Zhu, J. (2014). Fog computing: A platform for internet of things and analytics. In N. Bessis & C. Dobre (Eds.), Big data and internet of things: A roadmap for smart environments. Studies in computational intelligence (Vol. 546, pp. 169–186). Cham: Springer. Bonomi, F., Milito, R., Natarajan, P., & Zhu, J. (2014). Fog computing: A platform for internet of things and analytics. In N. Bessis & C. Dobre (Eds.), Big data and internet of things: A roadmap for smart environments. Studies in computational intelligence (Vol. 546, pp. 169–186). Cham: Springer.
19.
go back to reference Milito, R., Natarajan, P., & Zhu, J. (2014). Fog computing: A platform for internet of things and analytics, in big data and internet of things: A roadmap for smart environments (pp. 169–186). Cham: Springer. Milito, R., Natarajan, P., & Zhu, J. (2014). Fog computing: A platform for internet of things and analytics, in big data and internet of things: A roadmap for smart environments (pp. 169–186). Cham: Springer.
20.
go back to reference Hu, P., Ning, H., Qiu, T., Zhang, Y., & Luo, X. (2017). Fog computing-based face identification and resolution scheme in internet of things. IEEE Transactions on Industrial Informatics, 13(4), 1910–1920.CrossRef Hu, P., Ning, H., Qiu, T., Zhang, Y., & Luo, X. (2017). Fog computing-based face identification and resolution scheme in internet of things. IEEE Transactions on Industrial Informatics, 13(4), 1910–1920.CrossRef
21.
go back to reference Zhang, Y., Niyato, D., Wang, P., & Dong, I. K. (2016). Optimal energy management policy of mobile energy gateway. IEEE Transactions on Vehicular Technology, 65(5), 3685–3699.CrossRef Zhang, Y., Niyato, D., Wang, P., & Dong, I. K. (2016). Optimal energy management policy of mobile energy gateway. IEEE Transactions on Vehicular Technology, 65(5), 3685–3699.CrossRef
22.
go back to reference Jalali, F., Hinton, K., Ayre, R., & Alpcan, T. (2016). Fog computing may help to save energy in cloud computing. IEEE Journal on Selected Areas in Communications, 34(5), 1728–1739.CrossRef Jalali, F., Hinton, K., Ayre, R., & Alpcan, T. (2016). Fog computing may help to save energy in cloud computing. IEEE Journal on Selected Areas in Communications, 34(5), 1728–1739.CrossRef
23.
go back to reference Natal, A. R., Jakab, L., Portols, M., Ermagan, V., Natarajan, P., Maino, F., Meyer, D., & Aparicio, A. C. (2013). LISP-MN: Mobile networking through LISP. Wireless Personal Communications, 70(1), 253–266.CrossRef Natal, A. R., Jakab, L., Portols, M., Ermagan, V., Natarajan, P., Maino, F., Meyer, D., & Aparicio, A. C. (2013). LISP-MN: Mobile networking through LISP. Wireless Personal Communications, 70(1), 253–266.CrossRef
24.
go back to reference Natraj, A. (2016). Fog computing focusing on users at the edge of internet of things. International Journal of Engineering Research, 5(5), 1004–1008. Natraj, A. (2016). Fog computing focusing on users at the edge of internet of things. International Journal of Engineering Research, 5(5), 1004–1008.
25.
go back to reference Varshney, P., & Simmhan, Y. (2017). Demystifying fog computing: Characterizing architectures, applications and abstractions. In 2017 IEEE 1st International Conference on Fog and Edge Computing (ICFEC). IEEE. Varshney, P., & Simmhan, Y. (2017). Demystifying fog computing: Characterizing architectures, applications and abstractions. In 2017 IEEE 1st International Conference on Fog and Edge Computing (ICFEC). IEEE.
26.
go back to reference Luan, T. H., Gao, L., Li, Z., Xiang, Y., Wei, G., & Sun, L. (2016). Fog computing: focusing on mobile users at the edge. arXiv:1502.01815v3. Luan, T. H., Gao, L., Li, Z., Xiang, Y., Wei, G., & Sun, L. (2016). Fog computing: focusing on mobile users at the edge. arXiv:1502.01815v3.
27.
go back to reference Hossain, M. S., & Atiquzzaman, M. (2013). Cost analysis of mobility protocols. Telecommunication Systems, 52(4), 2271–2285.CrossRef Hossain, M. S., & Atiquzzaman, M. (2013). Cost analysis of mobility protocols. Telecommunication Systems, 52(4), 2271–2285.CrossRef
28.
go back to reference Gao, W. (2014). Opportunistic peer-to-peer mobile cloud computing at the tactical edge. In Proceedings of the IEEE military communications conference (pp. 1614–1620). Piscataway: IEEE. Gao, W. (2014). Opportunistic peer-to-peer mobile cloud computing at the tactical edge. In Proceedings of the IEEE military communications conference (pp. 1614–1620). Piscataway: IEEE.
29.
go back to reference Chen, X., Jiao, L., Li, W., & Fu, X. (2015). Efficient multi-user computation offloading for mobile-edge cloud computing. IEEE/ACM Transactions on Networking, 24(4), 974–983. Chen, X., Jiao, L., Li, W., & Fu, X. (2015). Efficient multi-user computation offloading for mobile-edge cloud computing. IEEE/ACM Transactions on Networking, 24(4), 974–983.
30.
go back to reference Wei, C., Fadlullah, Z., Kato, N., & Stojmenovic, I. (2014). On optimally reducing power loss in micro-grids with power storage devices. IEEE Journal of Selected Areas in Communications, 32(7), 1361–1370.CrossRef Wei, C., Fadlullah, Z., Kato, N., & Stojmenovic, I. (2014). On optimally reducing power loss in micro-grids with power storage devices. IEEE Journal of Selected Areas in Communications, 32(7), 1361–1370.CrossRef
31.
go back to reference Bonomi, F., Milito, R., Zhu, J., & Addepalli, S. (2012). Fog computing and its role in the internet of things. In Proceedings of the first edition of the MCC workshop on mobile cloud computing, ser. MCC’12 (pp. 13–16). New York: ACM.CrossRef Bonomi, F., Milito, R., Zhu, J., & Addepalli, S. (2012). Fog computing and its role in the internet of things. In Proceedings of the first edition of the MCC workshop on mobile cloud computing, ser. MCC’12 (pp. 13–16). New York: ACM.CrossRef
33.
go back to reference Atzori, L., Iera, A., & Morabito, G. (2010). The internet of things: A survey. Computer Networks, 54(15), 2787–2805.MATHCrossRef Atzori, L., Iera, A., & Morabito, G. (2010). The internet of things: A survey. Computer Networks, 54(15), 2787–2805.MATHCrossRef
34.
go back to reference Ning, H., Fu, Y., Hu, S., & Liu, H. (2015). Tree-code modeling and addressing for non-id physical objects in the internet of things. Telecommunication Systems, 58(3), 195–204.CrossRef Ning, H., Fu, Y., Hu, S., & Liu, H. (2015). Tree-code modeling and addressing for non-id physical objects in the internet of things. Telecommunication Systems, 58(3), 195–204.CrossRef
35.
go back to reference Liu, K., Ng, J., Lee, V., Son, S., & Stojmenovic, I. (2016). Cooperative data dissemination in hybrid vehicular networks: VANET as a software defined network. IEEE/ACM Transactions on Networking, 24(3), 1759–1773.CrossRef Liu, K., Ng, J., Lee, V., Son, S., & Stojmenovic, I. (2016). Cooperative data dissemination in hybrid vehicular networks: VANET as a software defined network. IEEE/ACM Transactions on Networking, 24(3), 1759–1773.CrossRef
36.
go back to reference Kirkpatrick, K. (2013). Software-defined networking. Communications of the ACM, 56(9), 16–19.CrossRef Kirkpatrick, K. (2013). Software-defined networking. Communications of the ACM, 56(9), 16–19.CrossRef
37.
go back to reference Kim, H., & Feamster, N. (2013). Improving network management with software defined networking. IEEE Communications Magazine, 51(2), 114–119.CrossRef Kim, H., & Feamster, N. (2013). Improving network management with software defined networking. IEEE Communications Magazine, 51(2), 114–119.CrossRef
38.
go back to reference Kreutz, D., Ramos, F. M. V., Esteves Verissimo, P., Esteve Rothenberg, C., Azodolmolky, S., & Uhlig, S. (2014). Software-defined networking: A comprehensive survey. Proceedings of the IEEE, 103(1), 10–13. Kreutz, D., Ramos, F. M. V., Esteves Verissimo, P., Esteve Rothenberg, C., Azodolmolky, S., & Uhlig, S. (2014). Software-defined networking: A comprehensive survey. Proceedings of the IEEE, 103(1), 10–13.
39.
go back to reference Nunes, A., Mendonca, M., Nguyen, X. N., & Obraczka, K. (2014). A survey of software defined networking: Past, present, and future of programmable networks. IEEE Communications Surveys and Tutorials, 16(3), 1617–1634.CrossRef Nunes, A., Mendonca, M., Nguyen, X. N., & Obraczka, K. (2014). A survey of software defined networking: Past, present, and future of programmable networks. IEEE Communications Surveys and Tutorials, 16(3), 1617–1634.CrossRef
40.
go back to reference Bhushan, K., & Gupta, B. B. (2018). Distributed denial of service (DDoS) attack mitigation in software defined network (SDN)-based cloud computing environment. Journal of Ambient Intelligence and Humanized Computing, 10(5), 1985–1997.CrossRef Bhushan, K., & Gupta, B. B. (2018). Distributed denial of service (DDoS) attack mitigation in software defined network (SDN)-based cloud computing environment. Journal of Ambient Intelligence and Humanized Computing, 10(5), 1985–1997.CrossRef
41.
go back to reference Roman, R., Lopez, J., & Mambo, M. (2018). Mobile edge computing, Fog et al.: A survey and analysis of security threats and challenges. Future Generation Computer Systems, 78, 680–698.CrossRef Roman, R., Lopez, J., & Mambo, M. (2018). Mobile edge computing, Fog et al.: A survey and analysis of security threats and challenges. Future Generation Computer Systems, 78, 680–698.CrossRef
42.
go back to reference Bhushan, K., & Gupta, B. B. (2017). Security challenges in cloud computing: State-of-art. International Journal of Big Data Intelligence, 4(2), 81–107.CrossRef Bhushan, K., & Gupta, B. B. (2017). Security challenges in cloud computing: State-of-art. International Journal of Big Data Intelligence, 4(2), 81–107.CrossRef
43.
go back to reference Barbosa, P., Brito, A., Almeida, H., & Claub, S. (2014). Lightweight privacy for smart metering data by adding noise. In Proceedings of the 29th annual ACM symposium on applied computing (SAC’14) (pp. 531–538). New York: ACM. Barbosa, P., Brito, A., Almeida, H., & Claub, S. (2014). Lightweight privacy for smart metering data by adding noise. In Proceedings of the 29th annual ACM symposium on applied computing (SAC’14) (pp. 531–538). New York: ACM.
44.
go back to reference Martignoni, L., Paleari, R., & Bruschi, D. (2009). A framework for behavior-based malware analysis in the cloud. In Proceedings 5th international conference information systems security (ICISS 2009) (pp. 178–192). New York: Springer. Martignoni, L., Paleari, R., & Bruschi, D. (2009). A framework for behavior-based malware analysis in the cloud. In Proceedings 5th international conference information systems security (ICISS 2009) (pp. 178–192). New York: Springer.
45.
go back to reference Diro, A. A., & Chilamkurti, N. (2018). Distributed attack detection scheme using deep learning approach for internet of things. Future Generation Computer Systems, 82, 761–768.CrossRef Diro, A. A., & Chilamkurti, N. (2018). Distributed attack detection scheme using deep learning approach for internet of things. Future Generation Computer Systems, 82, 761–768.CrossRef
46.
go back to reference Chiang, M., Fellow, I. E. E. E., & Zhang, T. (2016). Fog and IoT: An overview of research opportunities. IEEE Internet of Things Journal, 3(6), 854–864.CrossRef Chiang, M., Fellow, I. E. E. E., & Zhang, T. (2016). Fog and IoT: An overview of research opportunities. IEEE Internet of Things Journal, 3(6), 854–864.CrossRef
47.
go back to reference Bhushan, K., & Gupta, B. B. (2018). Hypothesis test for low-rate DDoS attack detection in cloud computing environment. Procedia Computer Science, 132, 947–955.CrossRef Bhushan, K., & Gupta, B. B. (2018). Hypothesis test for low-rate DDoS attack detection in cloud computing environment. Procedia Computer Science, 132, 947–955.CrossRef
48.
go back to reference Liu, W., Nishio, T., Shinkuma, R., & Takahashi, T. (2014). Adaptive resource discovery in mobile cloud computing. Computer Communications, 50(13), 119–129.CrossRef Liu, W., Nishio, T., Shinkuma, R., & Takahashi, T. (2014). Adaptive resource discovery in mobile cloud computing. Computer Communications, 50(13), 119–129.CrossRef
49.
go back to reference Hu, P., Ning, H., Qiu, T., Song, H., Wang, Y., & Yao, X. (2017). Security and privacy preservation scheme of face identification and resolution framework using fog computing in internet of things. IEEE Internet of Things Journal, 4(5), 1143–1155.CrossRef Hu, P., Ning, H., Qiu, T., Song, H., Wang, Y., & Yao, X. (2017). Security and privacy preservation scheme of face identification and resolution framework using fog computing in internet of things. IEEE Internet of Things Journal, 4(5), 1143–1155.CrossRef
50.
go back to reference Paharia, B., & Bhushan, K. (2018). Fog computing as a defensive approach against distributed denial of service (DDoS): A proposed architecture. In 2018 9th international conference on computing, communication and networking technologies (ICCCNT) (pp. 1–7). Piscataway: IEEE. Paharia, B., & Bhushan, K. (2018). Fog computing as a defensive approach against distributed denial of service (DDoS): A proposed architecture. In 2018 9th international conference on computing, communication and networking technologies (ICCCNT) (pp. 1–7). Piscataway: IEEE.
51.
go back to reference Lee, K., Kim, D., Ha, D., & Rajput, U. (2015). On security and privacy issues of fog computing supported internet of things environment. In Proceedings of the international conference on the network of the future (pp. 1–3). IEEE Lee, K., Kim, D., Ha, D., & Rajput, U. (2015). On security and privacy issues of fog computing supported internet of things environment. In Proceedings of the international conference on the network of the future (pp. 1–3). IEEE
52.
go back to reference Lee, K., Kimy, D., Ha, D., Rajput, U., & Oh, H. (2015). On security and privacy issues of fog computing supported internet of things environment. In Proc. 6th international conference on the network of the future (NOF), Montreal, QC, Canada (pp. 1–3). Lee, K., Kimy, D., Ha, D., Rajput, U., & Oh, H. (2015). On security and privacy issues of fog computing supported internet of things environment. In Proc. 6th international conference on the network of the future (NOF), Montreal, QC, Canada (pp. 1–3).
53.
go back to reference Huang, X., Xiang, Y., Bertino, E., Zhou, J., & Xu, L. (2014). Robust multi-factor authentication for fragile communications. IEEE Transactions on Dependable and Secure Computing, 11(6), 568–581.CrossRef Huang, X., Xiang, Y., Bertino, E., Zhou, J., & Xu, L. (2014). Robust multi-factor authentication for fragile communications. IEEE Transactions on Dependable and Secure Computing, 11(6), 568–581.CrossRef
54.
go back to reference Yi, S., Qin, Z., & Li, Q. Security and privacy issues of fog computing: A survey. In K. Xu & H. Zhu (Eds.), Wireless algorithms, systems, and applications. WASA 2015 (Lecture notes in computer science) (Vol. 9204). Cham: Springer. Yi, S., Qin, Z., & Li, Q. Security and privacy issues of fog computing: A survey. In K. Xu & H. Zhu (Eds.), Wireless algorithms, systems, and applications. WASA 2015 (Lecture notes in computer science) (Vol. 9204). Cham: Springer.
55.
go back to reference Dsouza, C., Ahn, G.-J., & Taguinod, M. (2014). Policy-driven security management for fog computing: Preliminary framework and a case study. In Proceedings of the IEEE 15th international conference on information reuse and integration, IRI (pp. 16–23). Piscataway: IEEE. Dsouza, C., Ahn, G.-J., & Taguinod, M. (2014). Policy-driven security management for fog computing: Preliminary framework and a case study. In Proceedings of the IEEE 15th international conference on information reuse and integration, IRI (pp. 16–23). Piscataway: IEEE.
56.
go back to reference Gai, K., Qiu, M., Tao, L., & Zhu, Y. (2016). Intrusion detection techniques for mobile cloud computing in heterogeneous 5G. Security and Communication Networks, 9(16), 3049–3058.CrossRef Gai, K., Qiu, M., Tao, L., & Zhu, Y. (2016). Intrusion detection techniques for mobile cloud computing in heterogeneous 5G. Security and Communication Networks, 9(16), 3049–3058.CrossRef
57.
go back to reference Falliere, N., Murchu, L. O., & Chien, E. (2011). W32.stuxnet Dossier. Symantec Security Response, Ver. 1.4. Mountain View, CA: Symantec. Falliere, N., Murchu, L. O., & Chien, E. (2011). W32.stuxnet Dossier. Symantec Security Response, Ver. 1.4. Mountain View, CA: Symantec.
58.
go back to reference Berger, S., Cáceres, R., Goldman, K. A., Perez, R., Sailer, R., & van Doorn, L. (2006). vTPM: Virtualizing the trusted platform module. In Proceedings of the 15th conference on USENIX security symposium (USENIX-SS’06) (Vol. 15, Article No. 21). Berkeley: USENIX Association. Berger, S., Cáceres, R., Goldman, K. A., Perez, R., Sailer, R., & van Doorn, L. (2006). vTPM: Virtualizing the trusted platform module. In Proceedings of the 15th conference on USENIX security symposium (USENIX-SS’06) (Vol. 15, Article No. 21). Berkeley: USENIX Association.
59.
go back to reference Wang, Y., Uehara, T., & Sasaki, R. (2015). Fog computing: Issues and challenges in security and forensics. In Proceedings of the 39th IEEE annual computer software and applications conference, COMPSAC (Vol. 3, pp. 53–59). Wang, Y., Uehara, T., & Sasaki, R. (2015). Fog computing: Issues and challenges in security and forensics. In Proceedings of the 39th IEEE annual computer software and applications conference, COMPSAC (Vol. 3, pp. 53–59).
60.
go back to reference Zetter, K. (2014). Countdown to zero day: Stuxnet and the launch of the world’s first digital weapon. New York: Crown. Zetter, K. (2014). Countdown to zero day: Stuxnet and the launch of the world’s first digital weapon. New York: Crown.
62.
go back to reference Delgrossi, L., & Zhang, T. (2012). Vehicle safety communications: Protocols, security, and privacy. Hoboken: Wiley.CrossRef Delgrossi, L., & Zhang, T. (2012). Vehicle safety communications: Protocols, security, and privacy. Hoboken: Wiley.CrossRef
63.
go back to reference Zhang, T., Antunes, H., & Aggarwal, S. (2014). Defending connected vehicles against malware: Challenges and a solution framework. IEEE Internet of Things Journal, 1(1), 10–21.CrossRef Zhang, T., Antunes, H., & Aggarwal, S. (2014). Defending connected vehicles against malware: Challenges and a solution framework. IEEE Internet of Things Journal, 1(1), 10–21.CrossRef
64.
go back to reference Zhang, T., Antunes, H., & Aggarwal, S. (2014). Securing connected vehicles end to end. In Proc. SAE World Congr. Exhibit., Detroit, MI, USA, Apr. 2014. Zhang, T., Antunes, H., & Aggarwal, S. (2014). Securing connected vehicles end to end. In Proc. SAE World Congr. Exhibit., Detroit, MI, USA, Apr. 2014.
65.
go back to reference Ibrahim, M. H. (2016). Octopus: An edge-fog mutual authentication scheme. International Journal of Network Security, 18(6), 1089–1101. Ibrahim, M. H. (2016). Octopus: An edge-fog mutual authentication scheme. International Journal of Network Security, 18(6), 1089–1101.
66.
go back to reference Iqbal, S., Kiah, M. L. M., Dhaghighi, B., Hussain, M., Khan, S., Khan, M. K., & Choo, K.-K. R. (2016). On cloud security attacks: A taxonomy and intrusion detection and prevention as a service. Journal of Network and Computer Applications, 74, 98–120.CrossRef Iqbal, S., Kiah, M. L. M., Dhaghighi, B., Hussain, M., Khan, S., Khan, M. K., & Choo, K.-K. R. (2016). On cloud security attacks: A taxonomy and intrusion detection and prevention as a service. Journal of Network and Computer Applications, 74, 98–120.CrossRef
67.
go back to reference Luo, W., Xu, L., Zhan, Z., Zheng, Q., & Xu, S. (2014). Federated cloud security architecture for secure and agile clouds. In K. J. Han, B.-Y. Choi, & S. Song (Eds.), High performance cloud auditing and applications (pp. 169–188). New York: Springer.CrossRef Luo, W., Xu, L., Zhan, Z., Zheng, Q., & Xu, S. (2014). Federated cloud security architecture for secure and agile clouds. In K. J. Han, B.-Y. Choi, & S. Song (Eds.), High performance cloud auditing and applications (pp. 169–188). New York: Springer.CrossRef
68.
go back to reference Lombardi, F., & Di Pietro, R. (2014). Virtualization and cloud security: Benefits, caveats, and future developments. In Cloud computing: Challenges, limitations and R&D solutions (pp. 237–255). Cham: Springer.CrossRef Lombardi, F., & Di Pietro, R. (2014). Virtualization and cloud security: Benefits, caveats, and future developments. In Cloud computing: Challenges, limitations and R&D solutions (pp. 237–255). Cham: Springer.CrossRef
69.
go back to reference Zhang, M., Duan, Y., Yun, H., & Zhao, Z. (2014). Semantics-aware android malware classification using weighted contextual API dependency graphs. In Proceedings of the 2014 ACM SIGSAC conference on computer and communications security (CCS’14) (pp. 1105–1116). New York: ACM. Zhang, M., Duan, Y., Yun, H., & Zhao, Z. (2014). Semantics-aware android malware classification using weighted contextual API dependency graphs. In Proceedings of the 2014 ACM SIGSAC conference on computer and communications security (CCS’14) (pp. 1105–1116). New York: ACM.
70.
go back to reference Simou, S., Kalloniatis, C., Kavakli, E., & Gritzalis, S. Cloud forensics solutions: A review. In L. Iliadis, M. Papazoglou, & K. Pohl (Eds.), Advanced information systems engineering workshops. CAiSE 2014. Lecture notes in business information processing (Vol. 178). Cham: Springer. Simou, S., Kalloniatis, C., Kavakli, E., & Gritzalis, S. Cloud forensics solutions: A review. In L. Iliadis, M. Papazoglou, & K. Pohl (Eds.), Advanced information systems engineering workshops. CAiSE 2014. Lecture notes in business information processing (Vol. 178). Cham: Springer.
71.
go back to reference Kent, K., Chevalier, S., Grance, T., & Dang, H. (2006). Guide to integrating forensic techniques into incident response. NIST Special Publication, 10(14), 800–886. Kent, K., Chevalier, S., Grance, T., & Dang, H. (2006). Guide to integrating forensic techniques into incident response. NIST Special Publication, 10(14), 800–886.
72.
go back to reference Chaudhary, D., & Bhushan, K. (2017). DDoS attack defense framework for cloud using fog computing. In 2017 2nd IEEE international conference on recent trends in electronics, information & communication technology (RTEICT) (pp. 534–538). Piscataway: IEEE. Chaudhary, D., & Bhushan, K. (2017). DDoS attack defense framework for cloud using fog computing. In 2017 2nd IEEE international conference on recent trends in electronics, information & communication technology (RTEICT) (pp. 534–538). Piscataway: IEEE.
73.
go back to reference Bhushan, K., & Gupta, B. B. (2017). Network flow analysis for detection and mitigation of fraudulent resource consumption (FRC) attacks in multimedia cloud computing. Multimedia Tools and Applications, 78(4), 4267–4298.CrossRef Bhushan, K., & Gupta, B. B. (2017). Network flow analysis for detection and mitigation of fraudulent resource consumption (FRC) attacks in multimedia cloud computing. Multimedia Tools and Applications, 78(4), 4267–4298.CrossRef
74.
go back to reference Paharia, B., & Bhushan, K. (2018). DDoS detection and mitigation in cloud via FogFiter: A defence mechanism. In 2018 9th international conference on computing, communication and networking technologies (ICCCNT) (pp. 1–7). Piscataway: IEEE. Paharia, B., & Bhushan, K. (2018). DDoS detection and mitigation in cloud via FogFiter: A defence mechanism. In 2018 9th international conference on computing, communication and networking technologies (ICCCNT) (pp. 1–7). Piscataway: IEEE.
75.
go back to reference Bhushan, K., & Gupta, B. B. (2018). Detecting DDoS attack using software defined network (SDN) in cloud computing environment. In 2018 5th international conference on signal processing and integrated networks (SPIN) (pp. 872–877). Piscataway: IEEE.CrossRef Bhushan, K., & Gupta, B. B. (2018). Detecting DDoS attack using software defined network (SDN) in cloud computing environment. In 2018 5th international conference on signal processing and integrated networks (SPIN) (pp. 872–877). Piscataway: IEEE.CrossRef
76.
go back to reference Paharia, B., & Bhushan, K. (2019). Fog computing: concepts, applications, and countermeasures against security attacks. In Handbook of research on cloud computing and big data applications in IoT (pp. 302–329). Hershey: IGI Global.CrossRef Paharia, B., & Bhushan, K. (2019). Fog computing: concepts, applications, and countermeasures against security attacks. In Handbook of research on cloud computing and big data applications in IoT (pp. 302–329). Hershey: IGI Global.CrossRef
77.
go back to reference Hu, P., Ning, H., Qiu, T., Xu, Y., Luo, X., & Sangaiah, A. K. (2018). A unified face identification and resolution scheme using cloud computing in internet of things. Future Generation Computing Systems, 81, 582–592.CrossRef Hu, P., Ning, H., Qiu, T., Xu, Y., Luo, X., & Sangaiah, A. K. (2018). A unified face identification and resolution scheme using cloud computing in internet of things. Future Generation Computing Systems, 81, 582–592.CrossRef
78.
go back to reference Choo, K.-K. R. (2016). Cloud computing: Challenges and future directions. Trends and Issues in Crime and Criminal Justice, 400, 1–6. Choo, K.-K. R. (2016). Cloud computing: Challenges and future directions. Trends and Issues in Crime and Criminal Justice, 400, 1–6.
79.
go back to reference Landau, S. (2014). Highlights from making sense of Snowden, part II: What’s significant in the NSA revelations. IEEE Security and Privacy, 12(1), 62–64.CrossRef Landau, S. (2014). Highlights from making sense of Snowden, part II: What’s significant in the NSA revelations. IEEE Security and Privacy, 12(1), 62–64.CrossRef
80.
go back to reference Juliadotter, N. V., & Choo, K.-K. R. (2015). Cloud attack and risk assessment taxonomy. IEEE Cloud Computing, 2(1), 14–20.CrossRef Juliadotter, N. V., & Choo, K.-K. R. (2015). Cloud attack and risk assessment taxonomy. IEEE Cloud Computing, 2(1), 14–20.CrossRef
82.
go back to reference Chen, M., Zhang, Y., Li, Y., & Mao, S. (2015). EMC: Emotion-aware mobile cloud computing in 5G. IEEE Network, 29(2), 32–38.CrossRef Chen, M., Zhang, Y., Li, Y., & Mao, S. (2015). EMC: Emotion-aware mobile cloud computing in 5G. IEEE Network, 29(2), 32–38.CrossRef
83.
go back to reference Amendola, D., Cordeschi, N., & Baccarelli, E. (2016). Bandwidth management VMs live migration in wireless fog computing for 5G networks. In Proceedings of the IEEE international conference on cloud networking (pp. 21–26). New York: IEEE. Amendola, D., Cordeschi, N., & Baccarelli, E. (2016). Bandwidth management VMs live migration in wireless fog computing for 5G networks. In Proceedings of the IEEE international conference on cloud networking (pp. 21–26). New York: IEEE.
84.
go back to reference Peng, M., Yan, S., Zhang, K., & Wang, C. (2015). Fog-computing-based radio access networks: Issues and challenges. IEEE Network, 30(4), 46–53.CrossRef Peng, M., Yan, S., Zhang, K., & Wang, C. (2015). Fog-computing-based radio access networks: Issues and challenges. IEEE Network, 30(4), 46–53.CrossRef
85.
go back to reference Papagianni, C., Leivadeas, A., & Papavassiliou, S. (2013). A cloud-oriented content delivery network paradigm: Modeling and assessment. IEEE Transactions on Dependable and Secure Computing, 10(5), 287–300.CrossRef Papagianni, C., Leivadeas, A., & Papavassiliou, S. (2013). A cloud-oriented content delivery network paradigm: Modeling and assessment. IEEE Transactions on Dependable and Secure Computing, 10(5), 287–300.CrossRef
86.
go back to reference Osanaiye, O., Choo, K.-K. R., & Dlodlo, M. (2016). Distributed denial of service (DDoS) resilience in cloud: Review and conceptual cloud DDoS mitigation framework. Journal of Network and Computer Applications, 67, 147–165.CrossRef Osanaiye, O., Choo, K.-K. R., & Dlodlo, M. (2016). Distributed denial of service (DDoS) resilience in cloud: Review and conceptual cloud DDoS mitigation framework. Journal of Network and Computer Applications, 67, 147–165.CrossRef
87.
go back to reference Chaudhary, D., Bhushan, K., & Gupta, B. B. (2018). Survey on DDoS attacks and defense mechanisms in cloud and fog computing. International Journal of E-Services and Mobile Applications (IJESMA), 10(3), 61–83.CrossRef Chaudhary, D., Bhushan, K., & Gupta, B. B. (2018). Survey on DDoS attacks and defense mechanisms in cloud and fog computing. International Journal of E-Services and Mobile Applications (IJESMA), 10(3), 61–83.CrossRef
88.
go back to reference Chaudhary, D., & Bhushan, K. (2017). DDoS attack mitigation and resource provisioning in cloud using fog computing. In 2017 International conference on smart technologies for smart nation (SmartTechCon) (pp. 308–313). Piscataway: IEEE. Chaudhary, D., & Bhushan, K. (2017). DDoS attack mitigation and resource provisioning in cloud using fog computing. In 2017 International conference on smart technologies for smart nation (SmartTechCon) (pp. 308–313). Piscataway: IEEE.
89.
go back to reference Bhushan, K., & Gupta, B. B. (2018). A novel approach to defend multimedia flash crowd in cloud environment. Multimedia Tools and Applications, 77(4), 4609–4639.CrossRef Bhushan, K., & Gupta, B. B. (2018). A novel approach to defend multimedia flash crowd in cloud environment. Multimedia Tools and Applications, 77(4), 4609–4639.CrossRef
90.
go back to reference McKeown, N., Anderson, T., Balakrishnan, H., Parulkar, G., et al. (2008). OpenFlow: Enabling innovation in campus networks. ACM SIGCOMM CCR, 38(2), 69–74.CrossRef McKeown, N., Anderson, T., Balakrishnan, H., Parulkar, G., et al. (2008). OpenFlow: Enabling innovation in campus networks. ACM SIGCOMM CCR, 38(2), 69–74.CrossRef
91.
go back to reference Mininet. An instant virtual network on your laptop (or other PC). Retrieved March, 2017, from mininet.org Mininet. An instant virtual network on your laptop (or other PC). Retrieved March, 2017, from mininet.​org
92.
go back to reference Sekar, A. G. V., Krishnaswamy, R., & Reiter, M. K. (2010). Network-wide deployment of intrusion detection and prevention systems. In Proceedings of 6th international conference ACM Co-NEXT. New York: ACM. Sekar, A. G. V., Krishnaswamy, R., & Reiter, M. K. (2010). Network-wide deployment of intrusion detection and prevention systems. In Proceedings of 6th international conference ACM Co-NEXT. New York: ACM.
93.
go back to reference Klaedtke, F., Karame, G. O., Bifulco, R., & Cui, H. (2015). Towards an access control scheme for accessing flows in SDN. In 2015 1st IEEE Conference on Network Softwarization (NetSoft) (pp. 1–6). IEEE. Klaedtke, F., Karame, G. O., Bifulco, R., & Cui, H. (2015). Towards an access control scheme for accessing flows in SDN. In 2015 1st IEEE Conference on Network Softwarization (NetSoft) (pp. 1–6). IEEE.
94.
go back to reference Yap, K. K., et al. (2011). Separating authentication, access and accounting: A case study with openWiFi. Technical report. Menlo Park: Open Networking Foundation. Yap, K. K., et al. (2011). Separating authentication, access and accounting: A case study with openWiFi. Technical report. Menlo Park: Open Networking Foundation.
Metadata
Title
A Comprehensive Review of Distributed Denial of Service (DDoS) Attacks in Fog Computing Environment
Authors
Bhumika Paharia
Kriti Bhushan
Copyright Year
2020
DOI
https://doi.org/10.1007/978-3-030-22277-2_20

Premium Partner