메뉴 건너뛰기




Volumn 67, Issue , 2016, Pages 147-165

Distributed denial of service (DDoS) resilience in cloud: Review and conceptual cloud DDoS mitigation framework

Author keywords

Anomaly based; Change point detection; Cloud distributed denial of service (DDoS) attacks; Cloud distributed denial of service (DDoS) survey; Distributed denial of service (DDoS) attack taxonomy; Flooding attacks

Indexed keywords

NETWORK SECURITY; TAXONOMIES; TRANSMISSION CONTROL PROTOCOL;

EID: 84956680241     PISSN: 10848045     EISSN: 10958592     Source Type: Journal    
DOI: 10.1016/j.jnca.2016.01.001     Document Type: Review
Times cited : (280)

References (111)
  • 1
    • 84994193625 scopus 로고    scopus 로고
    • The innocent perpetrators: Reflectors and reflection attacks
    • S. Arukonda, and S. Sinha The innocent perpetrators: reflectors and reflection attacks ACSIJ Adv Comput Sci: Int J 4 1 2015 94 98
    • (2015) ACSIJ Adv Comput Sci: Int J , vol.4 , Issue.1 , pp. 94-98
    • Arukonda, S.1    Sinha, S.2
  • 5
    • 84904303953 scopus 로고    scopus 로고
    • Can a DDoS attack meltdown my data center? A simulation study and defense strategies
    • Z. Anwar, and A. Malik Can a DDoS attack meltdown my data center? A simulation study and defense strategies IEEE Commun Lett 18 7 2014 1175 1178
    • (2014) IEEE Commun Lett , vol.18 , Issue.7 , pp. 1175-1178
    • Anwar, Z.1    Malik, A.2
  • 8
    • 84908131526 scopus 로고    scopus 로고
    • An empirical evaluation of information metrics for low-rate and high-rate DDoS attack detection
    • M.H. Bhuyan, D.K. Bhattacharyya, and J.K. Kalita An empirical evaluation of information metrics for low-rate and high-rate DDoS attack detection Pattern Recogn Lett 51 2015 1 7
    • (2015) Pattern Recogn Lett , vol.51 , pp. 1-7
    • Bhuyan, M.H.1    Bhattacharyya, D.K.2    Kalita, J.K.3
  • 9
    • 84862014620 scopus 로고    scopus 로고
    • Analyzing well-known countermeasures against distributed denial of service attacks
    • H. Beitollahi, and G. Deconinck Analyzing well-known countermeasures against distributed denial of service attacks Comput Commun 35 11 2012 1312 1332
    • (2012) Comput Commun , vol.35 , Issue.11 , pp. 1312-1332
    • Beitollahi, H.1    Deconinck, G.2
  • 10
    • 84900351494 scopus 로고    scopus 로고
    • Detecting distributed denial of service attacks: Methods, tools and future directions
    • M.H. Bhuyan, H.J. Kashyap, D.K. Bhattacharyya, and J.K. Kalita Detecting distributed denial of service attacks: methods, tools and future directions Comput J 2013 bxt031
    • (2013) Comput J , pp. bxt031
    • Bhuyan, M.H.1    Kashyap, H.J.2    Bhattacharyya, D.K.3    Kalita, J.K.4
  • 15
    • 84900803881 scopus 로고    scopus 로고
    • Detecting web based DDoS attack using MapReduce operations in cloud computing environment
    • J. Choi, C. Choi, B. Ko, D. Choi, and P. Kim, P Detecting web based DDoS attack using MapReduce operations in cloud computing environment J Internet Serv Inf Secur 3 3-4 2013 28 37
    • (2013) J Internet Serv Inf Secur , vol.3 , Issue.3-4 , pp. 28-37
    • Choi, J.1    Choi, C.2    Ko, B.3    Choi, D.4    Kim, P.P.5
  • 17
    • 84905744352 scopus 로고    scopus 로고
    • A method of DDoS attack detection using HTTP packet pattern and rule engine in cloud computing environment
    • J. Choi, C. Choi, B. Ko, and P. Kim A method of DDoS attack detection using HTTP packet pattern and rule engine in cloud computing environment Soft Comput 18 9 2014 1697 1703
    • (2014) Soft Comput , vol.18 , Issue.9 , pp. 1697-1703
    • Choi, J.1    Choi, C.2    Ko, B.3    Kim, P.4
  • 21
    • 79956153885 scopus 로고    scopus 로고
    • Cloud security defence to protect cloud computing against HTTP-DoS and XML-DoS attacks
    • A. Chonka, Y. Xiang, W. Zhou, and A. Bonti Cloud security defence to protect cloud computing against HTTP-DoS and XML-DoS attacks J Netw Comput Appl 34 4 2011 1097 1107
    • (2011) J Netw Comput Appl , vol.34 , Issue.4 , pp. 1097-1107
    • Chonka, A.1    Xiang, Y.2    Zhou, W.3    Bonti, A.4
  • 22
    • 84949671050 scopus 로고    scopus 로고
    • A cloud computing based network monitoring and threat detection system for critical infrastructures
    • Z. Chen, G. Xu, V. Mahalingam, L. Ge, J. Nguyen, W. Yu, and C. Lu A cloud computing based network monitoring and threat detection system for critical infrastructures Big Data Res 2015 10.1016/j.bdr.2015.11.002
    • (2015) Big Data Res
    • Chen, Z.1    Xu, G.2    Mahalingam, V.3    Ge, L.4    Nguyen, J.5    Yu, W.6    Lu, C.7
  • 26
    • 84885197342 scopus 로고    scopus 로고
    • A confidence-based filtering method for DDoS attack defense in cloud environment
    • W. Dou, Q. Chen, and J. Chen A confidence-based filtering method for DDoS attack defense in cloud environment Future Gener Comput Syst 29 7 2013 1838 1850
    • (2013) Future Gener Comput Syst , vol.29 , Issue.7 , pp. 1838-1850
    • Dou, W.1    Chen, Q.2    Chen, J.3
  • 27
    • 77953130221 scopus 로고    scopus 로고
    • A cusum change-point detection algorithm for non-stationary sequences with application to data network surveillance
    • V. De Oca, D. Jeske, Q. Zhang, C. Rendon, and M. Mazda A cusum change-point detection algorithm for non-stationary sequences with application to data network surveillance J Syst Softw 83 7 2010 1288 1297
    • (2010) J Syst Softw , vol.83 , Issue.7 , pp. 1288-1297
    • De Oca, V.1    Jeske, D.2    Zhang, Q.3    Rendon, C.4    Mazda, M.5
  • 28
    • 84924706348 scopus 로고    scopus 로고
    • Stealthy denial of service strategy in cloud computing
    • M. Ficco, and M. Rak Stealthy denial of service strategy in cloud computing IEEE Trans Cloud Comput 3 1 2015 80 94
    • (2015) IEEE Trans Cloud Comput , vol.3 , Issue.1 , pp. 80-94
    • Ficco, M.1    Rak, M.2
  • 29
    • 84896384099 scopus 로고    scopus 로고
    • An advanced intrusion detection framework for cloud computing
    • M. Ficco, S. Venticinque, and B. Di Martino An advanced intrusion detection framework for cloud computing Comput Syst Sci Eng 28 6 2013 401 411
    • (2013) Comput Syst Sci Eng , vol.28 , Issue.6 , pp. 401-411
    • Ficco, M.1    Venticinque, S.2    Di Martino, B.3
  • 30
    • 84882403734 scopus 로고    scopus 로고
    • Security event correlation approach for cloud computing
    • M. Ficco Security event correlation approach for cloud computing Int J High Perform Comput Netw 7 3 2013 173 185
    • (2013) Int J High Perform Comput Netw , vol.7 , Issue.3 , pp. 173-185
    • Ficco, M.1
  • 31
    • 85027465865 scopus 로고    scopus 로고
    • Introducing fraudulent energy consumption in cloud infrastructures: A new generation of denial-of-service attacks
    • M. Ficco, and F. Palmieri Introducing fraudulent energy consumption in cloud infrastructures: a new generation of denial-of-service attacks IEEE Syst J 99 2015 1 11
    • (2015) IEEE Syst J , vol.99 , pp. 1-11
    • Ficco, M.1    Palmieri, F.2
  • 32
    • 84926426310 scopus 로고    scopus 로고
    • A quantitative analysis of current security concerns and solutions for cloud computing
    • N. Gonzalez, C. Miers, F. Redigolo, M. Naslund, and M. Pourzandi A quantitative analysis of current security concerns and solutions for cloud computing J Cloud Comput 1 1 2012 1 18
    • (2012) J Cloud Comput , vol.1 , Issue.1 , pp. 1-18
    • Gonzalez, N.1    Miers, C.2    Redigolo, F.3    Naslund, M.4    Pourzandi, M.5
  • 34
    • 84866690559 scopus 로고    scopus 로고
    • Distributed cloud intrusion detection model
    • I. Gul, and M. Hussain Distributed cloud intrusion detection model Int J Adv Sci Technol 34 2011 71 82
    • (2011) Int J Adv Sci Technol , vol.34 , pp. 71-82
    • Gul, I.1    Hussain, M.2
  • 37
    • 84876551376 scopus 로고    scopus 로고
    • A profile based network intrusion detection and prevention system for securing cloud environment
    • S. Gupta, P. Kumar, and A. Abraham A profile based network intrusion detection and prevention system for securing cloud environment Int J Distrib Sensor Netw 2013 1 12
    • (2013) Int J Distrib Sensor Netw , pp. 1-12
    • Gupta, S.1    Kumar, P.2    Abraham, A.3
  • 43
    • 84908240277 scopus 로고    scopus 로고
    • A multilevel thrust filtration defending mechanism against DDoS attacks in cloud computing environment
    • N.C. Iyengar, G. Ganapathy, P.M. Kumar, and A. Abraham A multilevel thrust filtration defending mechanism against DDoS attacks in cloud computing environment Int J Grid Utility Comput 5 4 2014 236 248
    • (2014) Int J Grid Utility Comput , vol.5 , Issue.4 , pp. 236-248
    • Iyengar, N.C.1    Ganapathy, G.2    Kumar, P.M.3    Abraham, A.4
  • 45
    • 84936937008 scopus 로고    scopus 로고
    • Trilateral trust based defense mechanism against DDoS attacks in cloud computing environment
    • N. Iyengar, and G. Ganapathy Trilateral trust based defense mechanism against DDoS attacks in cloud computing environment Cybern Inf Technol 15 2 2015 119 140
    • (2015) Cybern Inf Technol , vol.15 , Issue.2 , pp. 119-140
    • Iyengar, N.1    Ganapathy, G.2
  • 46
    • 84875706647 scopus 로고    scopus 로고
    • The insecurity of cloud utility models
    • J. Idziorek, T. Mark, Tannian, and D. Jacobson The insecurity of cloud utility models IEEE IT Prof 15 2 2013 22 27
    • (2013) IEEE IT Prof , vol.15 , Issue.2 , pp. 22-27
    • Idziorek, J.1    Mark, T.2    Tannian3    Jacobson, D.4
  • 47
    • 84876151483 scopus 로고    scopus 로고
    • Escape-on-sight: An efficient and scalable mechanism for escaping DDoS attacks in cloud computing environment
    • N. Jeyanthi, and N.C. Iyengar Escape-on-sight: an efficient and scalable mechanism for escaping DDoS attacks in cloud computing environment Cybern Inf Technol 13 1 2013 46 60
    • (2013) Cybern Inf Technol , vol.13 , Issue.1 , pp. 46-60
    • Jeyanthi, N.1    Iyengar, N.C.2
  • 49
    • 84894477998 scopus 로고    scopus 로고
    • Detection of distributed denial of service attacks in cloud computing by identifying spoofed IP
    • N. Jeyanthi, U. Barde, M. Sravani, V. Tiwari, and N.C. Iyengar Detection of distributed denial of service attacks in cloud computing by identifying spoofed IP Int J Commun Netw Distrib Syst 11 3 2013 262 279
    • (2013) Int J Commun Netw Distrib Syst , vol.11 , Issue.3 , pp. 262-279
    • Jeyanthi, N.1    Barde, U.2    Sravani, M.3    Tiwari, V.4    Iyengar, N.C.5
  • 53
    • 84858158707 scopus 로고    scopus 로고
    • A survey on gaps, threat remediation challenges and some thoughts for proactive attack detection in cloud computing
    • Md. Tanzim Khorshed, A.B.M. Shawkat Ali, and Saleh A. Wasimi A survey on gaps, threat remediation challenges and some thoughts for proactive attack detection in cloud computing Future Gener Comput Syst 28 6 2012 833 851
    • (2012) Future Gener Comput Syst , vol.28 , Issue.6 , pp. 833-851
    • Khorshed, Md.T.1    Shawkat Ali, A.B.M.2    Wasimi, S.A.3
  • 55
    • 84868283421 scopus 로고    scopus 로고
    • A filter tree approach to protect cloud computing against xml ddos and http DDoS attack
    • T. Karnwal, S. Thandapanii, and A. Gnanasekaran A filter tree approach to protect cloud computing against xml ddos and http DDoS attack Intell Inf 2013 459 469
    • (2013) Intell Inf , pp. 459-469
    • Karnwal, T.1    Thandapanii, S.2    Gnanasekaran, A.3
  • 58
    • 0000582220 scopus 로고    scopus 로고
    • Keeping organizational secrets: Protective institutional mechanisms and their costs
    • J.P. Liebeskind Keeping organizational secrets: protective institutional mechanisms and their costs Ind Corp Change 6 3 2007 623 663
    • (2007) Ind Corp Change , vol.6 , Issue.3 , pp. 623-663
    • Liebeskind, J.P.1
  • 70
    • 84994407167 scopus 로고    scopus 로고
    • Enhanced CBF packet filtering method to detect DDoS attack in cloud computing environment
    • P. Negi, A. Mishra, and B.B. Gupta Enhanced CBF packet filtering method to detect DDoS attack in cloud computing environment Int J Comput Sci Issues 2 4 2013 142 146
    • (2013) Int J Comput Sci Issues , vol.2 , Issue.4 , pp. 142-146
    • Negi, P.1    Mishra, A.2    Gupta, B.B.3
  • 71
    • 62849120844 scopus 로고    scopus 로고
    • A survey of techniques for internet traffic classification using machine learning
    • T. Nguyen, and G. Armitage A survey of techniques for internet traffic classification using machine learning IEEE Commun Surv Tutor 10 4 2008 56 76
    • (2008) IEEE Commun Surv Tutor , vol.10 , Issue.4 , pp. 56-76
    • Nguyen, T.1    Armitage, G.2
  • 72
    • 84994389473 scopus 로고    scopus 로고
    • online
    • [online]
  • 73
    • 84994407162 scopus 로고    scopus 로고
    • online
    • [online]
  • 74
    • 84994420539 scopus 로고    scopus 로고
    • online
    • [online]
  • 75
    • 84994420546 scopus 로고    scopus 로고
    • online
    • [online]
  • 76
    • 84994389482 scopus 로고    scopus 로고
    • online
    • [online]
  • 81
    • 84896297829 scopus 로고    scopus 로고
    • A distributed approach to network anomaly detection based on independent component analysis
    • F. Palmieri, U. Fiore, and A. Castiglione A distributed approach to network anomaly detection based on independent component analysis Concurr Comput: Pract Exp 26 5 2014 1113 1129
    • (2014) Concurr Comput: Pract Exp , vol.26 , Issue.5 , pp. 1113-1129
    • Palmieri, F.1    Fiore, U.2    Castiglione, A.3
  • 82
    • 85028295216 scopus 로고    scopus 로고
    • Energy-oriented denial of service attacks: An emerging menace for large cloud infrastructures
    • F. Palmieri, S. Ricciardi, U. Fiore, M. Ficco, and A. Castiglione Energy-oriented denial of service attacks: an emerging menace for large cloud infrastructures J Supercomput 71 5 2013 1620 1641
    • (2013) J Supercomput , vol.71 , Issue.5 , pp. 1620-1641
    • Palmieri, F.1    Ricciardi, S.2    Fiore, U.3    Ficco, M.4    Castiglione, A.5
  • 83
  • 85
    • 84864433151 scopus 로고    scopus 로고
    • State-of-the-art in sequential change-point detection
    • A. Polunchenko, and A. Tartakovsky State-of-the-art in sequential change-point detection Methodol Comput Appl Probab 14 3 2012 649 684
    • (2012) Methodol Comput Appl Probab , vol.14 , Issue.3 , pp. 649-684
    • Polunchenko, A.1    Tartakovsky, A.2
  • 87
    • 84896319180 scopus 로고    scopus 로고
    • Google drive: Forensic analysis of data remnants
    • D. Quick, and K.-K.R. Choo Google drive: forensic analysis of data remnants J Netw Comput Appl 40 2014 179 193
    • (2014) J Netw Comput Appl , vol.40 , pp. 179-193
    • Quick, D.1    Choo, K.-K.R.2
  • 89
    • 84994445481 scopus 로고    scopus 로고
    • SC Magazine, Website,
    • (2015)
  • 93
    • 21144474527 scopus 로고
    • Comparison of EWMA, CUSUM and Shiryayev-Roberts procedures for detecting a shift in the mean
    • M. Srivastava, and Y. Wu Comparison of EWMA, CUSUM and Shiryayev-Roberts procedures for detecting a shift in the mean Ann Stat 1993 645 670
    • (1993) Ann Stat , pp. 645-670
    • Srivastava, M.1    Wu, Y.2
  • 95
    • 84901765824 scopus 로고    scopus 로고
    • A cooperative intrusion detection model for cloud computing networks
    • S. Teng, C. Zheng, H. Zhu, D. Liu, and W. Zhang A cooperative intrusion detection model for cloud computing networks Int J Secur Appl 8 3 2014 107 118
    • (2014) Int J Secur Appl , vol.8 , Issue.3 , pp. 107-118
    • Teng, S.1    Zheng, C.2    Zhu, H.3    Liu, D.4    Zhang, W.5
  • 99
    • 84896399206 scopus 로고    scopus 로고
    • Counteracting security attacks in virtual machines in the cloud using property based attestation
    • V. Varadharajan, and U. Tupakula Counteracting security attacks in virtual machines in the cloud using property based attestation J Netw Comput Appl 40 2014 31 45
    • (2014) J Netw Comput Appl , vol.40 , pp. 31-45
    • Varadharajan, V.1    Tupakula, U.2
  • 101
    • 84925396031 scopus 로고    scopus 로고
    • DDoS attack protection in the era of cloud computing and software-defined networking
    • B. Wang, Y. Zheng, W. Lou, and Y. Hou DDoS attack protection in the era of cloud computing and software-defined networking Comput Netw 81 2015 308 319
    • (2015) Comput Netw , vol.81 , pp. 308-319
    • Wang, B.1    Zheng, Y.2    Lou, W.3    Hou, Y.4
  • 102
    • 84924935399 scopus 로고    scopus 로고
    • A survey of trends in massive DDoS attacks and cloud-based mitigations
    • F. Wong, and C.X. Tan A survey of trends in massive DDoS attacks and cloud-based mitigations Int J Netw Secur Appl (IJNSA) 6 3 2014 57 71
    • (2014) Int J Netw Secur Appl (IJNSA) , vol.6 , Issue.3 , pp. 57-71
    • Wong, F.1    Tan, C.X.2
  • 104
    • 14644397228 scopus 로고    scopus 로고
    • Change-point monitoring for the detection of DoS attacks
    • H. Wang, Z. Danlu, and G. Kang Change-point monitoring for the detection of DoS attacks IEEE Trans Depend Secur Comput 1 4 2004 193 208
    • (2004) IEEE Trans Depend Secur Comput , vol.1 , Issue.4 , pp. 193-208
    • Wang, H.1    Danlu, Z.2    Kang, G.3
  • 107
    • 84962011624 scopus 로고    scopus 로고
    • Software-defined networking (SDN) and distributed denial of service (DDoS) attacks in cloud computing environments: A survey, some research issues, and challenges
    • Q. Yan, R. Yu, Q. Gong, and J. Li Software-defined networking (SDN) and distributed denial of service (DDoS) attacks in cloud computing environments: a survey, some research issues, and challenges IEEE Commun Surv Tutor 99 2015 1 23
    • (2015) IEEE Commun Surv Tutor , vol.99 , pp. 1-23
    • Yan, Q.1    Yu, R.2    Gong, Q.3    Li, J.4
  • 108
    • 84888391622 scopus 로고    scopus 로고
    • A survey of defense mechanisms against distributed denial of service (DDoS) flooding attacks
    • S.T. Zargar, J. Joshi, and T. David A survey of defense mechanisms against distributed denial of service (DDoS) flooding attacks IEEE Commun Surv Tutor 15 4 2013 2046 2069
    • (2013) IEEE Commun Surv Tutor , vol.15 , Issue.4 , pp. 2046-2069
    • Zargar, S.T.1    Joshi, J.2    David, T.3
  • 109
    • 84881309371 scopus 로고    scopus 로고
    • DDoS verification and attack packet dropping algorithm in cloud computing
    • M. Zakarya DDoS verification and attack packet dropping algorithm in cloud computing World Appl Sci J 23 11 2013 1418 1424
    • (2013) World Appl Sci J , vol.23 , Issue.11 , pp. 1418-1424
    • Zakarya, M.1
  • 110
    • 80054958822 scopus 로고    scopus 로고
    • An adaptive Shiryaev-Roberts procedure for monitoring dispersion
    • J. Zhang, C. Zou, and Z. Wang An adaptive Shiryaev-Roberts procedure for monitoring dispersion Comput Ind Eng 61 4 2011 1166 1172
    • (2011) Comput Ind Eng , vol.61 , Issue.4 , pp. 1166-1172
    • Zhang, J.1    Zou, C.2    Wang, Z.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.