Uncovering collateral damages and advanced defense strategies in cloud environments against DDoS attacks: A comprehensive review

Author:

Verma Priyanka1,Bharot Nitesh1,Breslin John G.1,Sharma Mukta2,Chaurasia Nisha3,Vidyarthi Ankit4ORCID

Affiliation:

1. Data Science Institute University of Galway Galway Ireland

2. Great Lake Bioenergy Research Center Michigan State University East Lansing Michigan USA

3. Department of Information Technology Dr. B.R. Ambedkar National Institute of Technology Jalandhar Jalandhar Punjab India

4. Department of CSE&IT Jaypee Institute of Information Technology Noida Uttar Pradesh India

Abstract

AbstractCloud computing (CC) offers on‐demand computing and resources to users, and organizations, and is also used in many human‐centric intelligent systems. Attacks in cloud networks cause huge damage to service providers and users. Distributed Denial of Service (DDoS) is one of them that greatly impacts the cloud network. The unavailability of resources is the major concern pertaining to cloud service and resources. Apart from the direct targets of a DDoS attack, there are also indirect effects on non‐targets within a cloud network. These effects on the non‐target stakeholders of the cloud are called collateral damages. However, this area of research is not explored much by researchers. Thus, the defense methods pertaining to direct and indirect effects need to be explored. This article aims to describe the consequences of DDoS attacks and the solutions available in the cloud network. The novelty of this article lies in shedding light on the indirect impacts of DDoS in cloud networks and possible solution approaches. The article also provides a comparative analysis of the existing defense solution under different categories and available tools and datasets to evaluate the proposed solutions. The article also mentions the solution considerations and effective solution scenarios. The idea behind this article is to impart guidelines to the researchers, for developing efficient defense solutions against direct target and indirect target DDoS attacks. Moreover, the research shortcomings, pros–cons, and existing challenges are outlined, and directions for future research are mentioned.

Publisher

Wiley

Subject

Electrical and Electronic Engineering

Reference101 articles.

1. BrownE.NIST issues cloud computing guidelines for managing security and privacy (Report No. 800‐144). National Institute of Standards and Technology Special Publication; 2012.

2. Availability and reliability analysis of cloud computing under economic denial of sustainability (EDoS) attack: a semi-Markov approach

3. AnsteeD BussiereD SockriderG MoralesC.Arbor's 13th annual worldwide infrastructure security report. Technical Report. Arbor Networks Inc; 2018:9.

4. Netscout.Netscout Arbor's 14th annual worldwide infrastructure security report; 2019.https://www.netscout.com/report

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3