Abstract
Virtualization, which is reflected as the backbone of cloud computing, provides cost-effective resource sharing. Owed to the existence of multiple virtual machines, it passages several challenges. Among the numerous virtualization attacks, the Distributed Denial of Service, widely known as the DDoS attack, is considered to be the momentous. These spells consumes large amount of server resources here after denies access to genuine users. DDoS attacks impact is more in cloud computing as sharing of resources is the innate character of a cloud. At hand are a few kinds of literature dealing with the mitigation of DDoS attacks using single server tactic nonetheless they suffer from poor response time. The proposed model in this paper uses multiple servers to deal with the alleviation of DDoS. An initial test result on the proposed model has provided us with better scalability and protection against further attacks.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Amarnath, J., Payal, S., Rajeev, N., Ravi, P.: Security in multi-tenancy cloud. 2010 IEEE
Bahaa Qasim, M., AL-Musawi.: Mitigating DoS/DDoS attacks using IPtables. Int. J. Eng. Technol. IJET-IJENS 12(03)
Chi, J.: Application and research on weighted bloom filter and bloom filter in web cache. In: Second Pacific-Asia Conference on Web Mining and Web-based Application (WMWA’09), pp. 187–191 (2009). doi:10.1109/WMWA.2009.51
Fu, W., Li, X.: The study on data security in cloud computing based on virtualization, 978-1- 61284-704-7/11/ IEEE 2011
Hsin-Yi, T., Melanie, S., Andre,M., Yu-Lun , H., Ralf, S.: Threat as a service, 1520-9202/12/ IEEE 2012
Myung Keun, Y.: Using white listing to mitigate ddos attacks on critical internet sites, 0163-6804/10/ IEEE 2010
Qi, C., Wenmin,L., Wanchun, D., Shui, Y.: CBF:A packet filtering method for DDoS attack defense in cloud environment. 978-0-7695-4612-4/11, IEEE 2011, doi:10.1109/DASC.2011.86
Ramgovind, S., Eloff, M. M., Smith, E.: The management of security in cloud computing, 978-1-4244-5495-2/10, IEEE 2010
Sarfraz Nawaz ,B., Mervat Adib, B., Muhammad Nawaz, B., Rukshanda, K.: Identifying and analyzing security threats to virtualized cloud computing infrastructures, 978-1-4673-4416-6/12/ IEEE 2012
Shengmei, L., Zhaoji, L., Xiaohua, C., Zhuolin, Y., Jianyong, C.: Virtualization security for cloud computing service, 978-1-4577-1637-9/11/ IEEE 2011
Vinh, P., Erlend, L., Oivind, K., Engelstad, P. E.: Gateway load balancing in future tactical networks. IEEE 1844–1850 (2010)
Yang, J., Ding, J., Li, N., Guo, Y.: FPGA implementation of SHA-224/256 algorithm oriented digital signature. In International Conference on Challenges in Environmental Science and Computer Engineering, 978-0-7695-3972-0/10, 2010 IEEE, doi: 10.1109/CESCE.2010.124
Most Frequently Used Linux IPTables Rules Examples.htm
http://bandwidthco.com/whitepapers/netforensics/crafting/Getting
http://www.cs.utexas.edu/users/lam/386p/slides/Bloom%20Filters.pdf
maxburstein.com/blog/creating-a-simple-bloom-filter/
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Kilari, N., Sridaran, R. (2018). A Novel Approach to Protect Cloud Environments Against DDOS Attacks. In: Aggarwal, V., Bhatnagar, V., Mishra, D. (eds) Big Data Analytics. Advances in Intelligent Systems and Computing, vol 654. Springer, Singapore. https://doi.org/10.1007/978-981-10-6620-7_49
Download citation
DOI: https://doi.org/10.1007/978-981-10-6620-7_49
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-10-6619-1
Online ISBN: 978-981-10-6620-7
eBook Packages: EngineeringEngineering (R0)