Skip to main content

Cloud Shield: Effective Solution for DDoS in Cloud

  • Conference paper
  • First Online:
Internet and Distributed Computing Systems (IDCS 2015)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 9258))

Included in the following conference series:

Abstract

Distributed Denial of Service (DDoS) attack is a complex security challenge for growth of Cloud Computing. DDoS attack is very easy to apply, difficult to prevent and hard to identify because attacker can spoof the IP address of itself for hiding the identity of himself.

In this paper, we present a Third Party Auditor (TPA) based efficient DDoS detection and prevention technique which has the strong identification factor based on these weaknesses. It has less overhead at the user end. Thus, we target various aspects of prevention of DDoS attack in the Cloud environment.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Saxena, R., Dey, S.: Collaborative approach for data integrity verification in cloud computing. In: Martínez Pérez, G., Thampi, S.M., Ko, R., Shu, L. (eds.) SNDS 2014. CCIS, vol. 420, pp. 1–15. Springer, Heidelberg (2014)

    Chapter  Google Scholar 

  2. Ruj, S., Saxena, R.: Securing cloud data. In: Cloud Computing with e-Science Applications, pp. 41–72. CRC Press (2015). ISBN:978-1-4665-9115-8

    Google Scholar 

  3. Garber, L.: Denial-of-service attacks rip the Internet. IEEE Comput. 33(4), 12–17 (2000)

    Article  Google Scholar 

  4. Yahoo on trail of site hackers (2000). http://www.wired.com/techbiz/media/news/2000/02/34221

  5. Powerful attack cripples Internet (2002). http://www.greenspun.com/bboard/q-and-a-fetch-msg.tclmsgid=00A7G7

  6. Australian computer emergency response team, Australian Computer Crime and Security Survey (2004)

    Google Scholar 

  7. Gordon, L.A., Loeb, M.P., Lucyshyn, W., Richardson, R.: CSI/FBI Computer crime and security survey (2005)

    Google Scholar 

  8. Arbor networks, Worldwide Infrastructure Security Report, vol - IV, October 2008

    Google Scholar 

  9. Siaterlis, C., Maglaris, B., Roris, P.: A novel approach for a distributed denial of service detection engine. National Technical University of Athens, Athens (2003)

    Google Scholar 

  10. Siaterlis, C., Maglaris, B.: One step ahead to multisensor data fusion for DDoS detection. J. Comput. Secur. 13(5), 779–806 (2005)

    Google Scholar 

  11. Guth, M.A.S.: A probabilistic foundation for vagueness and imprecision in fault-tree analysis. IEEE Trans. Reliab. 40(5), 563–569 (1991)

    Article  MATH  Google Scholar 

  12. Cloudera (2014). http://www.cloudera.com/content/cloudera/en/downloads.html

  13. XenServer (2014). http://xenserver.org/open-source-virtualization-download.html

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Rajat Saxena .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer International Publishing Switzerland

About this paper

Cite this paper

Saxena, R., Dey, S. (2015). Cloud Shield: Effective Solution for DDoS in Cloud . In: Di Fatta, G., Fortino, G., Li, W., Pathan, M., Stahl, F., Guerrieri, A. (eds) Internet and Distributed Computing Systems. IDCS 2015. Lecture Notes in Computer Science(), vol 9258. Springer, Cham. https://doi.org/10.1007/978-3-319-23237-9_1

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-23237-9_1

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-23236-2

  • Online ISBN: 978-3-319-23237-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics