Skip to main content
Erschienen in:
Buchtitelbild

2019 | OriginalPaper | Buchkapitel

Experimental Analysis of DDoS Attacks on OpenStack Cloud Platform

verfasst von : Aanshi Bhardwaj, Atul Sharma, Veenu Mangat, Krishan Kumar, Renu Vig

Erschienen in: Proceedings of 2nd International Conference on Communication, Computing and Networking

Verlag: Springer Singapore

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Cloud computing has transformed the IT industry by providing convenient way of accessing resources, services and applications over the Internet. Cloud computing provides infrastructure, platform, software, and other hybrid models as pay-as-you go based services. Customers pay based on usage of particular utility. There are vulnerabilities in the cloud infrastructure which have been easily exploited by the attackers. The well-known Distributed Denial of Service (DDoS) attack is the most eminent attack in this area of computing. DDoS attacks compromise the services of the cloud servers by overwhelming it with huge volume of normal or incomplete traffic making difficult to respond further to the legitimate clients. In cloud computing, virtual machines are created which run through instances. OpenStack is one such cloud platform, which is Open Source and is mostly deployed as Infrastructure as a service (IAAS). This paper presents experimental evaluation of DDoS attack on OpenStack cloud platform. The experimentation was conducted on open source platform of OpenStack as private cloud model. AnonymousDoser, LOIC, and Slowloris were used to launch DDoS attack. These tools flood the cloud with TCP/IP and HTTP packets. Finally, different traffic analysis tools are used to analyze the traffic pattern. The analysis is done on the basis of parameters like resource utilization of CPU, memory and packet drop.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat B.B. Gupta, O.P. Badve, Taxonomy of DoS and DDoS attacks and desirable defense mechanism in a cloud computing environment. J. Neural Comput. Appl. 28, 3655–3682 (2017)CrossRef B.B. Gupta, O.P. Badve, Taxonomy of DoS and DDoS attacks and desirable defense mechanism in a cloud computing environment. J. Neural Comput. Appl. 28, 3655–3682 (2017)CrossRef
2.
Zurück zum Zitat N. Hoque, M.H. Bhuyan, R.C. Baishya et al., Network attacks: Taxonomy, tools and systems. J. Netw. Comput. Appl. 40, 307–324 (2014)CrossRef N. Hoque, M.H. Bhuyan, R.C. Baishya et al., Network attacks: Taxonomy, tools and systems. J. Netw. Comput. Appl. 40, 307–324 (2014)CrossRef
3.
Zurück zum Zitat M. Jensen, J. Schwenk, N. Gruschka et al., in On Technical Security Issues in Cloud Computing. IEEE International Conference on Cloud Computing, Bangalore (2009), pp. 109–116 M. Jensen, J. Schwenk, N. Gruschka et al., in On Technical Security Issues in Cloud Computing. IEEE International Conference on Cloud Computing, Bangalore (2009), pp. 109–116
4.
Zurück zum Zitat O. Osanaiye, K.K.R. Choo, M. Dlodlo, Distributed denial of service (DDoS) resilience in cloud: Review and conceptual cloud DDoS mitigation framework. J. Netw. Comput. Appl. 67, 147–165 (2016)CrossRef O. Osanaiye, K.K.R. Choo, M. Dlodlo, Distributed denial of service (DDoS) resilience in cloud: Review and conceptual cloud DDoS mitigation framework. J. Netw. Comput. Appl. 67, 147–165 (2016)CrossRef
5.
Zurück zum Zitat G. Somani, M. Gaur, D. Sanghi et al., DDoS attacks in cloud computing: Issues, taxonomy, and future directions. J. Comput. Commun. 107, 30–48 (2017)CrossRef G. Somani, M. Gaur, D. Sanghi et al., DDoS attacks in cloud computing: Issues, taxonomy, and future directions. J. Comput. Commun. 107, 30–48 (2017)CrossRef
6.
Zurück zum Zitat I. Voras, B. Mihaljecić, M. Orlić et al., in Evaluating Open-Source Cloud Computing Solutions. MIPRO Proceedings of the 34th International Convention, Croatia (2011), pp. 209–214 I. Voras, B. Mihaljecić, M. Orlić et al., in Evaluating Open-Source Cloud Computing Solutions. MIPRO Proceedings of the 34th International Convention, Croatia (2011), pp. 209–214
Metadaten
Titel
Experimental Analysis of DDoS Attacks on OpenStack Cloud Platform
verfasst von
Aanshi Bhardwaj
Atul Sharma
Veenu Mangat
Krishan Kumar
Renu Vig
Copyright-Jahr
2019
Verlag
Springer Singapore
DOI
https://doi.org/10.1007/978-981-13-1217-5_1

Neuer Inhalt