Skip to main content
Top

2020 | OriginalPaper | Chapter

A Survey on the Impact of DDoS Attacks in Cloud Computing: Prevention, Detection and Mitigation Techniques

Authors : Karthik Srinivasan, Azath Mubarakali, Abdulrahman Saad Alqahtani, A. Dinesh Kumar

Published in: Intelligent Communication Technologies and Virtual Mobile Networks

Publisher: Springer International Publishing

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

In recent years, cloud services are emerging popular among the public and business ventures. Most of companies are trusting on cloud computing technology for production tasks. Distributed Denial of Service (DDoS) attack is a major general and critical type of attack on the cloud that proved extremely damaging the services. In current years, several efforts have been taken to identify the numerous types of DDoS attacks. This paper explains the various types of DDoS attack and its consequence in cloud computing. Also, this paper provides the various impacts of DDoS attack on cloud environment. The main goal of this paper is to discuss about prevention, detection and mitigation approaches of DDoS attacks on cloud environment with strengths, challenges and limitations of each approach. So that researchers can gets completely novel intuitive understanding into how to alleviate DDoS attacks in the field of cloud computing.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
5.
go back to reference Mansfield-Devine, S.: The growth and evolution of DDoS. Netw. Secur. 10, 13–20 (2015)CrossRef Mansfield-Devine, S.: The growth and evolution of DDoS. Netw. Secur. 10, 13–20 (2015)CrossRef
8.
10.
go back to reference Deshmukh, R.V., Devadkar, K.K.: Understanding DDoS attack & its effect in a cloud environment. Procedia Comput. Sci. 49, 202–210 (2015)CrossRef Deshmukh, R.V., Devadkar, K.K.: Understanding DDoS attack & its effect in a cloud environment. Procedia Comput. Sci. 49, 202–210 (2015)CrossRef
16.
go back to reference Abliz, M.: Internet Denial of Service Attacks and defence Mechanisms, University of Pittsburgh, Department of Computer Science, Technical report. TR-11-178 (2011) Abliz, M.: Internet Denial of Service Attacks and defence Mechanisms, University of Pittsburgh, Department of Computer Science, Technical report. TR-11-178 (2011)
17.
go back to reference Shin, S., Yegneswaran, V., Porras, P., Gu, G.: AVANT-GUARD: scalable and vigilant switch ow management in software-defined networks. In: Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, pp. 413–424 (2013) Shin, S., Yegneswaran, V., Porras, P., Gu, G.: AVANT-GUARD: scalable and vigilant switch ow management in software-defined networks. In: Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, pp. 413–424 (2013)
19.
go back to reference Shameli-Sendi, A., Ezzati-Jivan, N., Jabbarifar, M., Dagenais, M.: Intrusion response systems: survey and taxonomy. Int. J. Comput. Sci. Netw. Secur. 12(1), 1–14 (2012) Shameli-Sendi, A., Ezzati-Jivan, N., Jabbarifar, M., Dagenais, M.: Intrusion response systems: survey and taxonomy. Int. J. Comput. Sci. Netw. Secur. 12(1), 1–14 (2012)
20.
go back to reference Walfish, M., Vutukuru, M., Balakrishnan, H., Karger, D., Shenker, S.: DDoS defence by offense. ACM Trans. Comput. Syst. (TOCS) 28(1), 1–54 (2010). Article 3CrossRef Walfish, M., Vutukuru, M., Balakrishnan, H., Karger, D., Shenker, S.: DDoS defence by offense. ACM Trans. Comput. Syst. (TOCS) 28(1), 1–54 (2010). Article 3CrossRef
21.
go back to reference Zargar, S.T., Joshi, J., Tipper, D.: A survey of defence mechanisms against Distributed Denial of Service (DDoS) flooding attacks. IEEE Commun. Surv. Tutor. 99, 1–24 (2013) Zargar, S.T., Joshi, J., Tipper, D.: A survey of defence mechanisms against Distributed Denial of Service (DDoS) flooding attacks. IEEE Commun. Surv. Tutor. 99, 1–24 (2013)
23.
go back to reference Khor, S.H., Nakao, A.: sPoW: on-demand cloud-based EDDoS mitigation mechanism. In: HotDep (Fifth Workshop on Hot Topics in System Dependability) (2009) Khor, S.H., Nakao, A.: sPoW: on-demand cloud-based EDDoS mitigation mechanism. In: HotDep (Fifth Workshop on Hot Topics in System Dependability) (2009)
24.
go back to reference Kumar, M.N., Sujatha, P., Kalva, V., Nagori, R., Katukojwala, A.K., Kumar, M.: Mitigating Economic Denial of Sustainability (EDoS) in cloud computing using in-cloud scrubber service. In: Proceedings of the 2012 Fourth International Conference on Computational Intelligence and Communication Networks, CICN 2012, Washington, DC, USA, pp. 535–539. IEEE Computer Society (2012). https://doi.org/10.1109/CICN.2012.149 Kumar, M.N., Sujatha, P., Kalva, V., Nagori, R., Katukojwala, A.K., Kumar, M.: Mitigating Economic Denial of Sustainability (EDoS) in cloud computing using in-cloud scrubber service. In: Proceedings of the 2012 Fourth International Conference on Computational Intelligence and Communication Networks, CICN 2012, Washington, DC, USA, pp. 535–539. IEEE Computer Society (2012). https://​doi.​org/​10.​1109/​CICN.​2012.​149
25.
go back to reference Al-Haidari, F., Sqalli, M.H., Salah, K.: Enhanced EDoS-Shield for mitigating EDoS attacks originating from spoofed IP addresses. In: 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications, pp. 1167–1174. IEEE (2012) Al-Haidari, F., Sqalli, M.H., Salah, K.: Enhanced EDoS-Shield for mitigating EDoS attacks originating from spoofed IP addresses. In: 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications, pp. 1167–1174. IEEE (2012)
26.
go back to reference Sqalli, M.H., Al-Haidari, F., Salah, K.: EDoS-Shield - a two-steps mitigation technique against EDoS attacks in cloud computing. In: 2011 Fourth IEEE International Conference on Utility and Cloud Computing (UCC), pp. 49–56. IEEE (2011) Sqalli, M.H., Al-Haidari, F., Salah, K.: EDoS-Shield - a two-steps mitigation technique against EDoS attacks in cloud computing. In: 2011 Fourth IEEE International Conference on Utility and Cloud Computing (UCC), pp. 49–56. IEEE (2011)
27.
go back to reference Alosaimi, W., Al-Begain, K.: A new method to mitigate the impacts of the economical denial of sustainability attacks against the cloud. In: Proceedings of the 14th Annual Post Graduates Symposium on the Convergence of Telecommunication, Networking and Broadcasting (PGNet), pp. 116–121 (2013) Alosaimi, W., Al-Begain, K.: A new method to mitigate the impacts of the economical denial of sustainability attacks against the cloud. In: Proceedings of the 14th Annual Post Graduates Symposium on the Convergence of Telecommunication, Networking and Broadcasting (PGNet), pp. 116–121 (2013)
28.
go back to reference Wang, H., Jia, Q., Fleck, D., Powell, W., Li, F., Stavrou, A.: A moving target DDoS defense mechanism. Comput. Commun. 46, 10–21 (2014)CrossRef Wang, H., Jia, Q., Fleck, D., Powell, W., Li, F., Stavrou, A.: A moving target DDoS defense mechanism. Comput. Commun. 46, 10–21 (2014)CrossRef
29.
go back to reference Karnwal, T., Sivakumar, T., Aghila, G.: A comber approach to protect cloud computing against XML DDoS and HTTP DDoS attack. In: 2012 IEEE Students’ Conference on Electrical, Electronics and Computer Science (SCEECS), pp. 1–5. IEEE (2012) Karnwal, T., Sivakumar, T., Aghila, G.: A comber approach to protect cloud computing against XML DDoS and HTTP DDoS attack. In: 2012 IEEE Students’ Conference on Electrical, Electronics and Computer Science (SCEECS), pp. 1–5. IEEE (2012)
30.
go back to reference Anderson, T., Roscoe, T., Wetherall, D.: Preventing internet Denial-of-Service with capabilities. ACM SIGCOMM Comput. Commun. Rev. 34(1), 39–44 (2004)CrossRef Anderson, T., Roscoe, T., Wetherall, D.: Preventing internet Denial-of-Service with capabilities. ACM SIGCOMM Comput. Commun. Rev. 34(1), 39–44 (2004)CrossRef
31.
go back to reference Masood, M., Anwar, Z., Raza, S.A., Hur, M.A.: EDoS Armor: a cost effective economic denial of sustainability attack mitigation framework for E-commerce applications in cloud environments. In: 2013 16th International Multi Topic Conference (INMIC), pp. 37–42 (2013). https://doi.org/10.1109/INMIC.2013.6731321 Masood, M., Anwar, Z., Raza, S.A., Hur, M.A.: EDoS Armor: a cost effective economic denial of sustainability attack mitigation framework for E-commerce applications in cloud environments. In: 2013 16th International Multi Topic Conference (INMIC), pp. 37–42 (2013). https://​doi.​org/​10.​1109/​INMIC.​2013.​6731321
32.
go back to reference Jia, Q., Wang, H., Fleck, D., Li, F., Stavrou, A., Powell, W.: Catch Me if You Can: a cloud-enabled DDoS defense. In: 2014 44th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), pp. 264–275. IEEE (2014) Jia, Q., Wang, H., Fleck, D., Li, F., Stavrou, A., Powell, W.: Catch Me if You Can: a cloud-enabled DDoS defense. In: 2014 44th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), pp. 264–275. IEEE (2014)
33.
go back to reference Jeyanthi, N., Mogankumar, P.: A virtual firewall mechanism using army nodes to protect cloud infrastructure from DDoS attacks. Cybern. Inf. Technol. 14(3), 71–85 (2014) Jeyanthi, N., Mogankumar, P.: A virtual firewall mechanism using army nodes to protect cloud infrastructure from DDoS attacks. Cybern. Inf. Technol. 14(3), 71–85 (2014)
34.
go back to reference Baig, Z.A., Binbeshr, F.: Controlled virtual resource access to mitigate Economic Denial of Sustainability (EDoS) attacks against cloud infrastructures. In: Proceedings of the 2013 International Conference on Cloud Computing and Big Data, CLOUDCOM-ASIA 2013, Washington, DC, USA, pp. 346–353. IEEE Computer Society (2013). https://doi.org/10.1109/CLOUDCOM-ASIA.2013.51 Baig, Z.A., Binbeshr, F.: Controlled virtual resource access to mitigate Economic Denial of Sustainability (EDoS) attacks against cloud infrastructures. In: Proceedings of the 2013 International Conference on Cloud Computing and Big Data, CLOUDCOM-ASIA 2013, Washington, DC, USA, pp. 346–353. IEEE Computer Society (2013). https://​doi.​org/​10.​1109/​CLOUDCOM-ASIA.​2013.​51
35.
go back to reference Saini, B., Somani, G.: Index page based EDoS attacks in infrastructure cloud. In: International Conference on Security in Computer Networks and Distributed Systems, pp. 382–395. Springer, Heidelberg (2014) Saini, B., Somani, G.: Index page based EDoS attacks in infrastructure cloud. In: International Conference on Security in Computer Networks and Distributed Systems, pp. 382–395. Springer, Heidelberg (2014)
36.
go back to reference Idziorek, J., Tannian, M., Jacobson, D.: Detecting fraudulent use of cloud resources. In: Proceedings of the 3rd ACM Workshop on Cloud Computing Security, pp. 61–72. ACM (2011) Idziorek, J., Tannian, M., Jacobson, D.: Detecting fraudulent use of cloud resources. In: Proceedings of the 3rd ACM Workshop on Cloud Computing Security, pp. 61–72. ACM (2011)
37.
go back to reference Ismail, M.N., Aborujilah, A., Musa, S., Shahzad, A.: Detecting flooding based DoS attack in cloud computing environment using covariance matrix approach. In: Proceedings of the 7th International Conference on Ubiquitous Information Management and Communication, p. 36. ACM (2013) Ismail, M.N., Aborujilah, A., Musa, S., Shahzad, A.: Detecting flooding based DoS attack in cloud computing environment using covariance matrix approach. In: Proceedings of the 7th International Conference on Ubiquitous Information Management and Communication, p. 36. ACM (2013)
38.
go back to reference Feinstein, L., Schnackenberg, D., Balupari, R., Kindred, D.: Statistical approaches to DDoS attack detection and response. In: Proceedings of the DARPA Information Survivability Conference and Exposition, vol. 1, pp. 303–314. IEEE (2003) Feinstein, L., Schnackenberg, D., Balupari, R., Kindred, D.: Statistical approaches to DDoS attack detection and response. In: Proceedings of the DARPA Information Survivability Conference and Exposition, vol. 1, pp. 303–314. IEEE (2003)
39.
go back to reference Shamsolmoali, P., Zareapoor, M.: Statistical-based filtering system against DDoS attacks in cloud computing. In: 2014 International Conference on Advances in Computing, Communications and Informatics (ICACCI 2014), pp. 1234–1239. IEEE (2014) Shamsolmoali, P., Zareapoor, M.: Statistical-based filtering system against DDoS attacks in cloud computing. In: 2014 International Conference on Advances in Computing, Communications and Informatics (ICACCI 2014), pp. 1234–1239. IEEE (2014)
40.
go back to reference Gómez-Lopera, J.F., Martínez-Aroza, J., Robles-Pérez, A.M., Román-Roldán, R.: An analysis of edge detection by using the Jensen-Shannon divergence. J. Math. Imaging Vis. 13(1), 35–56 (2000)MathSciNetCrossRef Gómez-Lopera, J.F., Martínez-Aroza, J., Robles-Pérez, A.M., Román-Roldán, R.: An analysis of edge detection by using the Jensen-Shannon divergence. J. Math. Imaging Vis. 13(1), 35–56 (2000)MathSciNetCrossRef
41.
go back to reference Templeton, S.J., Levitt, K.E.: Detecting spoofed packets. In: Proceedings of the DARPA Information Survivability Conference and Exposition, vol. 1, pp. 164–175. IEEE (2003) Templeton, S.J., Levitt, K.E.: Detecting spoofed packets. In: Proceedings of the DARPA Information Survivability Conference and Exposition, vol. 1, pp. 164–175. IEEE (2003)
42.
go back to reference Chen, Q., Lin, W., Dou, W., Yu, S.: CBF: a packet filtering method for DDoS attack defense in cloud environment. In: IEEE Ninth International Conference on Dependable, Autonomic and Secure Computing (DASC), pp. 427–434. IEEE (2011) Chen, Q., Lin, W., Dou, W., Yu, S.: CBF: a packet filtering method for DDoS attack defense in cloud environment. In: IEEE Ninth International Conference on Dependable, Autonomic and Secure Computing (DASC), pp. 427–434. IEEE (2011)
43.
go back to reference Jeyanthi, N., Iyengar, N.C.S., Kumar, P.M., Kannammal, A.: An enhanced entropy approach to detect and prevent DDoS in Cloud environment. Int. J. Commun. Netw. Inf. Secur. (IJCNIS) 5(2), 110 (2013) Jeyanthi, N., Iyengar, N.C.S., Kumar, P.M., Kannammal, A.: An enhanced entropy approach to detect and prevent DDoS in Cloud environment. Int. J. Commun. Netw. Inf. Secur. (IJCNIS) 5(2), 110 (2013)
44.
go back to reference Vissers, T., Somasundaram, T.S., Pieters, L., Govindarajan, K., Hellinckx, P.: DDoS defense system for web services in a cloud environment. Future Gener. Comput. Syst. 37, 37–45 (2014)CrossRef Vissers, T., Somasundaram, T.S., Pieters, L., Govindarajan, K., Hellinckx, P.: DDoS defense system for web services in a cloud environment. Future Gener. Comput. Syst. 37, 37–45 (2014)CrossRef
45.
go back to reference Latanicki, J., Massonet, P., Naqvi, S., Rochwerger, B., Villari, M.: Scalable cloud defenses for detection, analysis and mitigation of DDoS attacks. In: Future Internet Assembly, pp. 127–137 (2010) Latanicki, J., Massonet, P., Naqvi, S., Rochwerger, B., Villari, M.: Scalable cloud defenses for detection, analysis and mitigation of DDoS attacks. In: Future Internet Assembly, pp. 127–137 (2010)
46.
go back to reference Li, B., Niu, W., Xu, K., Zhang, C., Zhang, P.: You cant hide: a novel methodology to defend DDoS attack based on but cloud. In: Applications and Techniques in Information Security. Communications in Computer and Information Science, pp. 203–214. Springer, Heidelberg (2015)CrossRef Li, B., Niu, W., Xu, K., Zhang, C., Zhang, P.: You cant hide: a novel methodology to defend DDoS attack based on but cloud. In: Applications and Techniques in Information Security. Communications in Computer and Information Science, pp. 203–214. Springer, Heidelberg (2015)CrossRef
47.
go back to reference Graham, M., Adrian, W., Erika, S.-V.: Botnet detection within cloud service provider networks using flow protocols. In: 2015 IEEE 13th International Conference on Industrial Informatics (INDIN), pp. 1614–1619. IEEE (2015) Graham, M., Adrian, W., Erika, S.-V.: Botnet detection within cloud service provider networks using flow protocols. In: 2015 IEEE 13th International Conference on Industrial Informatics (INDIN), pp. 1614–1619. IEEE (2015)
48.
go back to reference Badis, H., Doyen, G., Khatoun, R.: A collaborative approach for a source-based detection of but clouds. In: 2015 IFIP/IEEE International Symposium on Integrated Network Management (IM), pp. 906–909. IEEE (2015) Badis, H., Doyen, G., Khatoun, R.: A collaborative approach for a source-based detection of but clouds. In: 2015 IFIP/IEEE International Symposium on Integrated Network Management (IM), pp. 906–909. IEEE (2015)
49.
go back to reference Mohammad, R.M., Mauro, C., Ville, L.: EyeCloud: a BotCloud detection system. In: Proceedings of the 5th IEEE International Symposium on Trust and Security in Cloud Computing (IEEE TSCloud 2015), Helsinki, Finland. IEEE (2015) Mohammad, R.M., Mauro, C., Ville, L.: EyeCloud: a BotCloud detection system. In: Proceedings of the 5th IEEE International Symposium on Trust and Security in Cloud Computing (IEEE TSCloud 2015), Helsinki, Finland. IEEE (2015)
50.
go back to reference Yu, S., Tian, Y., Guo, S., Wu, D.O.: Can we beat DDoS attacks in clouds? IEEE Trans. Parallel Distrib. Syst. 25(9), 2245–2254 (2014)CrossRef Yu, S., Tian, Y., Guo, S., Wu, D.O.: Can we beat DDoS attacks in clouds? IEEE Trans. Parallel Distrib. Syst. 25(9), 2245–2254 (2014)CrossRef
51.
go back to reference Yossi, G., Amir, H., Michael, S., Michael, G.: CDN-on-Demand: an affordable DDoS defense via un-trusted clouds. In: Network and Distributed System Security Symposium (NDSS) (2016) Yossi, G., Amir, H., Michael, S., Michael, G.: CDN-on-Demand: an affordable DDoS defense via un-trusted clouds. In: Network and Distributed System Security Symposium (NDSS) (2016)
52.
go back to reference Somani, G., Gaur, M.S., Sanghi, D., Conti, M., Buyya, R.: Service resizing for quick DDoS mitigation in cloud computing environment. Ann. Telecommun. 72(5–6), 237–252 (2016) Somani, G., Gaur, M.S., Sanghi, D., Conti, M., Buyya, R.: Service resizing for quick DDoS mitigation in cloud computing environment. Ann. Telecommun. 72(5–6), 237–252 (2016)
53.
go back to reference Somani, G., Gaur, M.S., Sanghi, D., Conti, M., Rajarajan, M.: DDoS victim service containment to minimize the internal collateral damages in cloud computing. Comput. Electr. Eng. (2016) Somani, G., Gaur, M.S., Sanghi, D., Conti, M., Rajarajan, M.: DDoS victim service containment to minimize the internal collateral damages in cloud computing. Comput. Electr. Eng. (2016)
54.
55.
go back to reference Wang, X., Chen, M., Xing, C.: SDSNM: a software-defined security networking mechanism to defend against DDoS attacks. In: 2015 Ninth International Conference on Frontier of Computer Science and Technology (FCST), pp. 115–121. IEEE (2015) Wang, X., Chen, M., Xing, C.: SDSNM: a software-defined security networking mechanism to defend against DDoS attacks. In: 2015 Ninth International Conference on Frontier of Computer Science and Technology (FCST), pp. 115–121. IEEE (2015)
56.
go back to reference Wang, B., Zheng, Y., Lou, W., Hou, Y.T.: DDoS attack protection in the era of cloud computing and software-defined networking. Comput. Netw. 81, 308–319 (2015)CrossRef Wang, B., Zheng, Y., Lou, W., Hou, Y.T.: DDoS attack protection in the era of cloud computing and software-defined networking. Comput. Netw. 81, 308–319 (2015)CrossRef
57.
go back to reference Yan, Q., Yu, F.: Distributed denial of service attacks in software-defined networking with cloud computing. IEEE Commun. Mag. 53(4), 52–59 (2015)CrossRef Yan, Q., Yu, F.: Distributed denial of service attacks in software-defined networking with cloud computing. IEEE Commun. Mag. 53(4), 52–59 (2015)CrossRef
58.
go back to reference Tsai, S.-C., Liu, I.-H., Lu, C.-T., Chang, C.-H., Li, J.-S.: Defending cloud computing environment against the challenge of DDoS attacks based on software-defined network. In: Advances in Intelligent Information Hiding and Multimedia Signal Processing: Proceeding of the Twelfth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, Kaohsiung, Taiwan, 21–23 November 2016, vol. 1, pp. 285–292. Springer, Cham (2017) Tsai, S.-C., Liu, I.-H., Lu, C.-T., Chang, C.-H., Li, J.-S.: Defending cloud computing environment against the challenge of DDoS attacks based on software-defined network. In: Advances in Intelligent Information Hiding and Multimedia Signal Processing: Proceeding of the Twelfth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, Kaohsiung, Taiwan, 21–23 November 2016, vol. 1, pp. 285–292. Springer, Cham (2017)
59.
go back to reference Stillwell, M., Schanzenbach, D., Vivien, F., Casanova, H.: Resource allocation algorithms for virtualized service hosting platforms. J. Parallel Distrib. Comput. 70(9), 962–974 (2010)CrossRef Stillwell, M., Schanzenbach, D., Vivien, F., Casanova, H.: Resource allocation algorithms for virtualized service hosting platforms. J. Parallel Distrib. Comput. 70(9), 962–974 (2010)CrossRef
60.
go back to reference Somani, G., Gaur, M.S., Sanghi, D., Conti, M., Rajarajan, M., Buyya, R.: Combating DDoS attacks in the cloud: requirements, trends, and future directions. IEEE Cloud Comput. 4, 22–32 (2017)CrossRef Somani, G., Gaur, M.S., Sanghi, D., Conti, M., Rajarajan, M., Buyya, R.: Combating DDoS attacks in the cloud: requirements, trends, and future directions. IEEE Cloud Comput. 4, 22–32 (2017)CrossRef
61.
go back to reference Zhao, S., Chen, K., Zheng, W.: Defend against Denial of Service attack with VMM. In: Eighth International Conference on Grid and Cooperative Computing, GCC 2009, pp. 91–96. IEEE (2009) Zhao, S., Chen, K., Zheng, W.: Defend against Denial of Service attack with VMM. In: Eighth International Conference on Grid and Cooperative Computing, GCC 2009, pp. 91–96. IEEE (2009)
62.
go back to reference Silva, S.S., Silva, R.M., Pinto, R.C., Salles, R.M.: Botnets: a survey. Comput. Netw. 57(2), 378–403 (2013)CrossRef Silva, S.S., Silva, R.M., Pinto, R.C., Salles, R.M.: Botnets: a survey. Comput. Netw. 57(2), 378–403 (2013)CrossRef
64.
go back to reference Singh, A., Chatterjee, K.: Cloud security issues and challenges: a survey. J. Netw. Comput. Appl. 79(1), 88–115 (2017)CrossRef Singh, A., Chatterjee, K.: Cloud security issues and challenges: a survey. J. Netw. Comput. Appl. 79(1), 88–115 (2017)CrossRef
Metadata
Title
A Survey on the Impact of DDoS Attacks in Cloud Computing: Prevention, Detection and Mitigation Techniques
Authors
Karthik Srinivasan
Azath Mubarakali
Abdulrahman Saad Alqahtani
A. Dinesh Kumar
Copyright Year
2020
DOI
https://doi.org/10.1007/978-3-030-28364-3_24