Abstract
Distributed Denial of Service (DDoS) attack is a complex security challenge for growth of Cloud Computing. DDoS attack is very easy to apply, difficult to prevent and hard to identify because attacker can spoof the IP address of itself for hiding the identity of himself.
In this paper, we present a Third Party Auditor (TPA) based efficient DDoS detection and prevention technique which has the strong identification factor based on these weaknesses. It has less overhead at the user end. Thus, we target various aspects of prevention of DDoS attack in the Cloud environment.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Saxena, R., Dey, S.: Collaborative approach for data integrity verification in cloud computing. In: MartÃnez Pérez, G., Thampi, S.M., Ko, R., Shu, L. (eds.) SNDS 2014. CCIS, vol. 420, pp. 1–15. Springer, Heidelberg (2014)
Ruj, S., Saxena, R.: Securing cloud data. In: Cloud Computing with e-Science Applications, pp. 41–72. CRC Press (2015). ISBN:978-1-4665-9115-8
Garber, L.: Denial-of-service attacks rip the Internet. IEEE Comput. 33(4), 12–17 (2000)
Yahoo on trail of site hackers (2000). http://www.wired.com/techbiz/media/news/2000/02/34221
Powerful attack cripples Internet (2002). http://www.greenspun.com/bboard/q-and-a-fetch-msg.tclmsgid=00A7G7
Australian computer emergency response team, Australian Computer Crime and Security Survey (2004)
Gordon, L.A., Loeb, M.P., Lucyshyn, W., Richardson, R.: CSI/FBI Computer crime and security survey (2005)
Arbor networks, Worldwide Infrastructure Security Report, vol - IV, October 2008
Siaterlis, C., Maglaris, B., Roris, P.: A novel approach for a distributed denial of service detection engine. National Technical University of Athens, Athens (2003)
Siaterlis, C., Maglaris, B.: One step ahead to multisensor data fusion for DDoS detection. J. Comput. Secur. 13(5), 779–806 (2005)
Guth, M.A.S.: A probabilistic foundation for vagueness and imprecision in fault-tree analysis. IEEE Trans. Reliab. 40(5), 563–569 (1991)
Cloudera (2014). http://www.cloudera.com/content/cloudera/en/downloads.html
XenServer (2014). http://xenserver.org/open-source-virtualization-download.html
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2015 Springer International Publishing Switzerland
About this paper
Cite this paper
Saxena, R., Dey, S. (2015). Cloud Shield: Effective Solution for DDoS in Cloud . In: Di Fatta, G., Fortino, G., Li, W., Pathan, M., Stahl, F., Guerrieri, A. (eds) Internet and Distributed Computing Systems. IDCS 2015. Lecture Notes in Computer Science(), vol 9258. Springer, Cham. https://doi.org/10.1007/978-3-319-23237-9_1
Download citation
DOI: https://doi.org/10.1007/978-3-319-23237-9_1
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-23236-2
Online ISBN: 978-3-319-23237-9
eBook Packages: Computer ScienceComputer Science (R0)