4.7 Review

DDoS attacks in cloud computing: Issues, taxonomy, and future directions

Journal

COMPUTER COMMUNICATIONS
Volume 107, Issue -, Pages 30-48

Publisher

ELSEVIER SCIENCE BV
DOI: 10.1016/j.comcom.2017.03.010

Keywords

Cloud computing; Distributed Denial of Service (DDoS); Security and protection

Funding

  1. Teacher Fellowship under Faculty Development Program - University Grants Commission under XII Plan
  2. SAFAL (Security Analysis Framework for Android Platform) - Department of Electronics and Information Technology, Government of India
  3. Marie Curie Fellowship - European Commission [PCIG11-GA-2012-321980]
  4. EU [H2020-ICT30-2015-688061, ICI+/2014/342-896]
  5. Italian MIUR-PRIN TENACE [20103P34XC]
  6. Tackling Mobile Mal ware with Innovative Machine Learning Techniques - University of Padua
  7. Melbourne-Chindia Cloud Computing (MC3) Research Network
  8. Australian Research Council

Ask authors/readers for more resources

Security issues related to the cloud computing are relevant to various stakeholders for an informed cloud adoption decision. Apart from data breaches, the cyber security research community is revisiting the attack space for cloud-specific solutions as these issues affect budget, resource management, and service quality. Distributed Denial of Service (DDoS) attack is one such serious attack in the cloud space. In this paper, we present developments related to DDoS attack mitigation solutions in the cloud. In particular, we present a comprehensive survey with a detailed insight into the characterization, prevention, detection, and mitigation mechanisms of these attacks. Additionally, we present a comprehensive solution taxonomy to classify DDoS attack solutions. We also provide a comprehensive discussion on important metrics to evaluate various solutions. This survey concludes that there is a strong requirement of solutions, which are designed keeping utility computing models in mind. Accurate auto-scaling decisions, multi-layer mitigation, and defense using profound resources in the cloud, are some of the key requirements of the desired solutions. In the end, we provide a definite guideline on effective solution building and detailed solution requirements to help the cyber security research community in designing defense mechanisms. To the best of our knowledge, this work is a novel attempt to identify the need of DDoS mitigation solutions involving multi-level information flow and effective resource management during the attack. (c) 2017 Elsevier B.V. All rights reserved.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.7
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available