Network Denial of Service Threat Security on Cloud Computing
A Survey

Authors

  • Elmustafa Sayed Ali Ahmed  Department of Electrical and Electronics Engineering, Red Sea University, Port Sudan, Sudan, Saudi Arabia
  • Rasha Eltayeb Abd Elatif   Department of Electrical and Electronics Engineering, Red Sea University, Port Sudan, Sudan, Saudi Arabia

Keywords:

Cloud computing, Denial of Service, DNS DoS, Network Distributed DoS, availability threats, Security.

Abstract

Cloud computing is one of the most important communication model nowadays since it’s provides a sets of resources and multiple types of services offered through the internet. The services and resources provided by cloud computing are cheaper because of no maintenance cost required in the core of clouds, since all services were offered to the clients based on services availability by providers only and clients are free to manage and maintains the resources machines. People use the cloud computing only when they need it, for this reasons cloud computing may be called a services over internet on demand. Companies also use the clouds to reduce their operation costs by resting virtual machines for digital services from cloud providers. With the growth of data every day which require a more services and resources in cloud computing, a security issues are creates a new demands and opportunities for security models that because cloud computing facing many types of attack threats with increasing of clouds . Network Denial of services is one of the most famous attack threats that make sense in a cloud computing context and may be divided into network distributed denial of services and DNS denial of services knows as availability threats. This paper reviews the types of network denial of services attacks also classify the methods of security defences and then compare between all of them.

References

  1. P. Vijaya Vardhan Reddy* and Dr. Lakshmi Rajamani ," Performance Evaluation of Hypervisors in the Private Cloud based on System Information using SIGAR Framework and for System Workloads using Pass mark", International Journal of Advanced Science and Technology Vol.70 (2014), pp.17-32.
  2. Chao Shen and Weiqin Tong," Review on the Cloud Computing Programming Model", International Journal of Advanced Science and Technology, Vol.70 (2014), pp.11-16.
  3. Farhan Bashir Shaikh and Sajjad Haider," Security Threats in Cloud Computing", 6th International Conference on Internet Technology and Secured Transactions, 11-14 December 2011, Abu Dhabi, United Arab Emirates.
  4. Elmustafa Sayed Ali Ahmed1 and Rashid A. Saeed2; "A Survey of Big Data Cloud Computing Security"; International Journal of Computer Science and Software Engineering , Volume 3, Issue 1, December 2014.
  5. K. Santhi," A Defense Mechanism to Protect Cloud Computing Against Distributed Denial of Service Attacks", International Journal of Advanced Research in Computer Science and Software Engineering ", Volume 3, Issue 5, May 2013.
  6. Stephen M. Specht and Ruby B. Lee," Distributed Denial of Service: Taxonomies of Attacks, Tools, and Countermeasures"; Proceedings of the 17th International Conference on Parallel and Distributed Computing Systems, pp. 543-550, September 2004.
  7. K.Santhi ; "A Defense Mechanism to Protect Cloud Computing Against Distributed Denial of Service Attacks"; International Journal of Advanced Research in Computer Science and Software Engineering Volume 3, Issue 5, May 2013 , pages 1-5.
  8. Georgios Kambourakis, Tassos Moschos, Dimitris Geneiatakis and Stefanos Gritzalis , "A Fair Solution to DNS Amplification Attacks", Laboratory of Information and Communication Systems Security , University of the Aegean, Karlovassi, GR-83200 Samos, Greece 2008 ,pages  1-10.
  9. Jun Xu; Wooyong Lee;  "Sustaining availability of Web services under distributed denial of service attacks"; Computers, IEEE Transactions on , vol.52, no.2, pp. 195- 208, Feb. 2003.
  10. Shui Yu; "Distributed Denial of Service Attack and Defense"; springer October 23, 2013.
  11. Suriadi, S et al ; "Defending Web Services against Denial of Service Attacks Using Client Puzzles , Web Services (ICWS)"; IEEE International Conference 4-9 July 2011.
  12. Joshi, B. ; Vijayan, A.S. ; Joshi, B.K.; "Securing cloud computing environment against DDoS attacks "; Computer Communication and Informatics (ICCCI), International Conference 10-12 Jan. 2012.
  13. T. Siva, E.S. Phalguna Krishna; "Controlling various network based A DoS Attacks in cloud computing environment: By Using Port Hopping Technique"; International Journal of Engineering Trends and Technology (IJETT)-Volume 4 Issue 5-May 2013.
  14. Upma Goyal1, Gayatri Bhatti2and Sandeep Mehmi; "A Dual Mechanism for defeating DDoS Attacks in Cloud Computing Model"; International Journal of Application or Innovation in Engineering & Management , Volume 2, Issue 3, March 2013.
  15. N.Ch.S.N. Iyengar1, Arindam Banerjee2 and Gopinath Ganapathy3; "A Fuzzy Logic based Defense Mechanism against Distributed Denial of Service Attack in Cloud Computing Environment"; International Journal of Communication Networks and Information Security, Vol. 6, No. 3, December 2014.
  16. J.RAMESHBABU,*B.SAMBALAJI,*R.WESLEY DANIEL,**K.MALATH;" PREVENTION OF DD OS A TTACKS IN CLOUD USING NEIF TECHNIQUES"; International Journal of Scientific and Research Publications, Volume 4, Issue 4, April 2014.
  17. Priyanka Negi1, Anupama Mishra2and B. B. Gupta; "Enhanced CBF Packet Filtering Method to Detect DDoS Attack in Cloud Computing Environment";http://arxiv.org/ftp/arxiv/papers /1304/1304. 7073. pdf. Accessed in 18 Aug. 2015].
  18. Chu-Hsing Lin et al ; "A detection scheme for flooding attack on application layer based on semantic concept"; Computer Symposium (ICS), International 16-18 Dec. 2010.
  19. Ashley chonka et al ; "Cloud security defense to protect cloud computing against HTTP-DoS and XML-DoS attacks"; Journal of Network and Computer Application Volume 34 Issue 4, July, 2011.
  20. A.M. Lonea, D.E. Popescu, H. Tianfield; "Detecting DDoS Attacks in Cloud Computing Environment"; INT J COMPUT COMMUN, 8(1):70-78, February, 2013.
  21. A.S.Syed Navaz, V.Sangeetha, C.Prabhadevi; "Entropy based Anomaly Detection System to Prevent DDoS Attacks in Cloud"; International Journal of Computer Applications (0975 –8887) Volume 62–No.15, January 2013.
  22. Mettildha Mary1, P.V.Kavitha2, Priyadharshini; "Vigneshwer S Ramana, Secure Cloud Computing Environment against DDOS and EDOS Attacks" ;International Journal of Computer Science and Information Technologies, Vol. 5 (2) , 2014, 1803-1808.
  23. Bing Wang ; Yao Zheng ; Wenjing Lou ; Hou, Y.T.; "DDoS Attack Protection in the Era of Cloud Computing and Software-Defined Networking"; Network Protocols (ICNP), IEEE 22nd International Conference, 21-24 Oct. 2014.
  24. N. Jeyanthi*, Uttara Barde, M. Sravani and Venu Tiwari; "Detection of distributed denial of service attacks in cloud computing by identifying spoofed IP"; Int. J. Communication Networks and Distributed Systems, Vol. 11, No. 3, 2013.
  25. Sanchika Gupta,1Padam Kumar,1and Ajith Abraham; "A Profile Based Network Intrusion Detection and Prevention System for Securing Cloud Environment" ;Hindawi Publishing Corporation International Journal of Distributed Sensor Networks Volume 2013, Article ID 364575,12pages.
  26. Namrata A. Sable and Prof. Mr. D. S. Datar;"Cloud Computing Based -Collaborative Network Security Management System Using Botnet"; international Journal on Recent and Innovation Trends in Computing and Communication Volume: 2 Issue: 10 October 2014.
  27. Danveer Singh, 2.Basant Kumar Gupta 3.Harshit Gupta, DDOS Attack and Detection for Secured Cloud Computing Resources, International Journal Of Engineering And Computer Science Volume 3 Issue 4 April, 2014 Page No. 5392-5395.
  28. Osanaiye, O.A.; "Short Paper: IP spoofing detection for preventing DDoS attack in Cloud Computing"; Intelligence in Next Generation Networks (ICIN), 17-19 Feb. 2015.

Downloads

Published

2015-10-25

Issue

Section

Research Articles

How to Cite

[1]
Elmustafa Sayed Ali Ahmed, Rasha Eltayeb Abd Elatif , " Network Denial of Service Threat Security on Cloud Computing
A Survey , International Journal of Scientific Research in Science, Engineering and Technology(IJSRSET), Print ISSN : 2395-1990, Online ISSN : 2394-4099, Volume 1, Issue 5, pp.341-350, September-October-2015.