Affiliation:
1. Data Science Institute University of Galway Galway Ireland
2. Great Lake Bioenergy Research Center Michigan State University East Lansing Michigan USA
3. Department of Information Technology Dr. B.R. Ambedkar National Institute of Technology Jalandhar Jalandhar Punjab India
4. Department of CSE&IT Jaypee Institute of Information Technology Noida Uttar Pradesh India
Abstract
AbstractCloud computing (CC) offers on‐demand computing and resources to users, and organizations, and is also used in many human‐centric intelligent systems. Attacks in cloud networks cause huge damage to service providers and users. Distributed Denial of Service (DDoS) is one of them that greatly impacts the cloud network. The unavailability of resources is the major concern pertaining to cloud service and resources. Apart from the direct targets of a DDoS attack, there are also indirect effects on non‐targets within a cloud network. These effects on the non‐target stakeholders of the cloud are called collateral damages. However, this area of research is not explored much by researchers. Thus, the defense methods pertaining to direct and indirect effects need to be explored. This article aims to describe the consequences of DDoS attacks and the solutions available in the cloud network. The novelty of this article lies in shedding light on the indirect impacts of DDoS in cloud networks and possible solution approaches. The article also provides a comparative analysis of the existing defense solution under different categories and available tools and datasets to evaluate the proposed solutions. The article also mentions the solution considerations and effective solution scenarios. The idea behind this article is to impart guidelines to the researchers, for developing efficient defense solutions against direct target and indirect target DDoS attacks. Moreover, the research shortcomings, pros–cons, and existing challenges are outlined, and directions for future research are mentioned.
Reference101 articles.
1. BrownE.NIST issues cloud computing guidelines for managing security and privacy (Report No. 800‐144). National Institute of Standards and Technology Special Publication; 2012.
2. Availability and reliability analysis of cloud computing under economic denial of sustainability (EDoS) attack: a semi-Markov approach
3. AnsteeD BussiereD SockriderG MoralesC.Arbor's 13th annual worldwide infrastructure security report. Technical Report. Arbor Networks Inc; 2018:9.
4. Netscout.Netscout Arbor's 14th annual worldwide infrastructure security report; 2019.https://www.netscout.com/report
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献