Skip to main content

A Novel Approach to Protect Cloud Environments Against DDOS Attacks

  • Conference paper
  • First Online:
Big Data Analytics

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 654))

Abstract

Virtualization, which is reflected as the backbone of cloud computing, provides cost-effective resource sharing. Owed to the existence of multiple virtual machines, it passages several challenges. Among the numerous virtualization attacks, the Distributed Denial of Service, widely known as the DDoS attack, is considered to be the momentous. These spells consumes large amount of server resources here after denies access to genuine users. DDoS attacks impact is more in cloud computing as sharing of resources is the innate character of a cloud. At hand are a few kinds of literature dealing with the mitigation of DDoS attacks using single server tactic nonetheless they suffer from poor response time. The proposed model in this paper uses multiple servers to deal with the alleviation of DDoS. An initial test result on the proposed model has provided us with better scalability and protection against further attacks.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Amarnath, J., Payal, S., Rajeev, N., Ravi, P.: Security in multi-tenancy cloud. 2010 IEEE

    Google Scholar 

  2. Bahaa Qasim, M., AL-Musawi.: Mitigating DoS/DDoS attacks using IPtables. Int. J. Eng. Technol. IJET-IJENS 12(03)

    Google Scholar 

  3. Chi, J.: Application and research on weighted bloom filter and bloom filter in web cache. In: Second Pacific-Asia Conference on Web Mining and Web-based Application (WMWA’09), pp. 187–191 (2009). doi:10.1109/WMWA.2009.51

  4. Fu, W., Li, X.: The study on data security in cloud computing based on virtualization, 978-1- 61284-704-7/11/ IEEE 2011

    Google Scholar 

  5. Hsin-Yi, T., Melanie, S., Andre,M., Yu-Lun , H., Ralf, S.: Threat as a service, 1520-9202/12/ IEEE 2012

    Google Scholar 

  6. Myung Keun, Y.: Using white listing to mitigate ddos attacks on critical internet sites, 0163-6804/10/ IEEE 2010

    Google Scholar 

  7. Qi, C., Wenmin,L., Wanchun, D., Shui, Y.: CBF:A packet filtering method for DDoS attack defense in cloud environment. 978-0-7695-4612-4/11, IEEE 2011, doi:10.1109/DASC.2011.86

  8. Ramgovind, S., Eloff, M. M., Smith, E.: The management of security in cloud computing, 978-1-4244-5495-2/10, IEEE 2010

    Google Scholar 

  9. Sarfraz Nawaz ,B., Mervat Adib, B., Muhammad Nawaz, B., Rukshanda, K.: Identifying and analyzing security threats to virtualized cloud computing infrastructures, 978-1-4673-4416-6/12/ IEEE 2012

    Google Scholar 

  10. Shengmei, L., Zhaoji, L., Xiaohua, C., Zhuolin, Y., Jianyong, C.: Virtualization security for cloud computing service, 978-1-4577-1637-9/11/ IEEE 2011

    Google Scholar 

  11. Vinh, P., Erlend, L., Oivind, K., Engelstad, P. E.: Gateway load balancing in future tactical networks. IEEE 1844–1850 (2010)

    Google Scholar 

  12. Yang, J., Ding, J., Li, N., Guo, Y.: FPGA implementation of SHA-224/256 algorithm oriented digital signature. In International Conference on Challenges in Environmental Science and Computer Engineering, 978-0-7695-3972-0/10, 2010 IEEE, doi: 10.1109/CESCE.2010.124

  13. Most Frequently Used Linux IPTables Rules Examples.htm

    Google Scholar 

  14. http://bandwidthco.com/whitepapers/netforensics/crafting/Getting

  15. http://www.cs.utexas.edu/users/lam/386p/slides/Bloom%20Filters.pdf

  16. http://www.haproxy.org/

  17. http://www.monitorix.org/

  18. maxburstein.com/blog/creating-a-simple-bloom-filter/

    Google Scholar 

  19. www.binarytides.com/linux-netstat-command-examples/

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Nagaraju Kilari .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer Nature Singapore Pte Ltd.

About this paper

Cite this paper

Kilari, N., Sridaran, R. (2018). A Novel Approach to Protect Cloud Environments Against DDOS Attacks. In: Aggarwal, V., Bhatnagar, V., Mishra, D. (eds) Big Data Analytics. Advances in Intelligent Systems and Computing, vol 654. Springer, Singapore. https://doi.org/10.1007/978-981-10-6620-7_49

Download citation

  • DOI: https://doi.org/10.1007/978-981-10-6620-7_49

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-10-6619-1

  • Online ISBN: 978-981-10-6620-7

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics