Open Access Open Access  Restricted Access Subscription Access

Mitigating Distributed Denial of Service Attack in Cloud Computing Environment using Threshold based Technique


Affiliations
1 Department of Computer Science and Engineering, Aisect University, Bhopal - 464993, Madhya Pradesh, India
2 Department of Information Technology, ABV-IIITM, Gwalior - 474015, Madhya Pradesh, India
3 Department of Electronics and Communication, Aisect University, Bhopal - 464993, Madhya Pradesh, India
 

Objectives: Cloud is becoming a very assertive computing platform now a days due to the availability of resources in a customized manner. But DDoS attack is a very dangerous as it directly affects the availability of resources. So the objective of the paper is to mitigate DDoS attack in cloud network using threshold based technique. Methods/Statistical Analysis: In the proposed solution a list of faulty IP addresses has been prepared based on their performance during the Turing test and named as black list. If the request is from black list than it is directly rejected else forwarded to next step. At the second stage check whether the number of resources available are greater than the request made and also the request for resources is less than the threshold value of resource m, than the resource are allocated to that request else request is rejected. Findings: Cloud resources can be defended from the DDoS attack by any of the three defense mechanisms, i.e. DDoS attack prevention, DDoS attack detection and DDoS attack mitigation and recovery. But it is found that Attack mitigation is the easiest way to defend against the DDos attack because of easily available resources. The paper presented a technique that will easily detect and mitigate the DDos attack and it is very easy to implement with minimum cost and overhead. Application/Improvements: The proposed work can be implemented in any cloud network to save it from wasting the resources for malicious requests. For further improvement client based protection can also be implemented such that the attacker will not be able to form its army for the purpose of DDoS attack.

Keywords

Attack Mitigation, Attack Detection, Cloud Computing, DDoS Attack.
User

Abstract Views: 200

PDF Views: 0




  • Mitigating Distributed Denial of Service Attack in Cloud Computing Environment using Threshold based Technique

Abstract Views: 200  |  PDF Views: 0

Authors

Nitesh Bharot
Department of Computer Science and Engineering, Aisect University, Bhopal - 464993, Madhya Pradesh, India
Priyanka Verma
Department of Information Technology, ABV-IIITM, Gwalior - 474015, Madhya Pradesh, India
Veenadhari Suraparaju
Department of Computer Science and Engineering, Aisect University, Bhopal - 464993, Madhya Pradesh, India
Sanjeev Gupta
Department of Electronics and Communication, Aisect University, Bhopal - 464993, Madhya Pradesh, India

Abstract


Objectives: Cloud is becoming a very assertive computing platform now a days due to the availability of resources in a customized manner. But DDoS attack is a very dangerous as it directly affects the availability of resources. So the objective of the paper is to mitigate DDoS attack in cloud network using threshold based technique. Methods/Statistical Analysis: In the proposed solution a list of faulty IP addresses has been prepared based on their performance during the Turing test and named as black list. If the request is from black list than it is directly rejected else forwarded to next step. At the second stage check whether the number of resources available are greater than the request made and also the request for resources is less than the threshold value of resource m, than the resource are allocated to that request else request is rejected. Findings: Cloud resources can be defended from the DDoS attack by any of the three defense mechanisms, i.e. DDoS attack prevention, DDoS attack detection and DDoS attack mitigation and recovery. But it is found that Attack mitigation is the easiest way to defend against the DDos attack because of easily available resources. The paper presented a technique that will easily detect and mitigate the DDos attack and it is very easy to implement with minimum cost and overhead. Application/Improvements: The proposed work can be implemented in any cloud network to save it from wasting the resources for malicious requests. For further improvement client based protection can also be implemented such that the attacker will not be able to form its army for the purpose of DDoS attack.

Keywords


Attack Mitigation, Attack Detection, Cloud Computing, DDoS Attack.



DOI: https://doi.org/10.17485/ijst%2F2016%2Fv9i38%2F126697