DOI QR코드

DOI QR Code

DDoS attacks prevention in cloud computing through Transport Control protocol TCP using Round-Trip-Time RTT

  • Alibrahim, Thikra S (Department of Computer Sience, College of Computer and Information Sciences, Jouf University) ;
  • Hendaoui, Saloua (Department of Computer Sience, College of Computer and Information Sciences, Jouf University)
  • Received : 2021.12.05
  • Published : 2022.01.30

Abstract

One of the most essential foundations upon which big institutions rely in delivering cloud computing and hosting services, as well as other kinds of multiple digital services, is the security of infrastructures for digital and information services throughout the world. Distributed denial-of-service (DDoS) assaults are one of the most common types of threats to networks and data centers. Denial of service attacks of all types operates on the premise of flooding the target with a massive volume of requests and data until it reaches a size bigger than the target's energy, at which point it collapses or goes out of service. where it takes advantage of a flaw in the Transport Control Protocol's transmitting and receiving (3-way Handshake) (TCP). The current study's major focus is on an architecture that stops DDoS attacks assaults by producing code for DDoS attacks using a cloud controller and calculating Round-Tripe Time (RTT).

Keywords

Acknowledgement

The authors would like to thank the Deanship of Graduate Studies at Jouf University for funding and supporting this research through the initiative of DGS, Graduate Students Research Support (GSR) at Jouf University, Saudi Arabia.

References

  1. Darwish, M., A. Ouda, and L.F. Capretz. Cloud-based DDoS attacks and defenses. in International Conference on Information Society (i-Society 2013). 2013. IEEE.
  2. Carlin, A., M. Hammoudeh, and O. Aldabbas, Defence for distributed denial of service attacks in cloud computing. Procedia computer science, 2015. 73: p. 490-497.
  3. Osanaiye, O.A., DDoS defence for service availability in cloud computing. 2016.
  4. Gupta, B., R. Joshi, and M. Misra, Prediction of a number of zombies in a DDoS attack using a polynomial regression model. Journal of advances in information technology, 2011. 2(1): p. 57-62.
  5. Dixit, S., Cloud Computing Security aspects: Threats, Countermeasures and Intrusion Detection using Support Vector Machine. Turkish Journal of Computer and Mathematics Education (TURCOMAT), 2021. 12(10): p. 2271-2277.
  6. Alouffi, B., et al., A Systematic Literature Review on Cloud Computing Security: Threats and Mitigation Strategies. IEEE Access, 2021. 9: p. 57792-57807. https://doi.org/10.1109/ACCESS.2021.3073203
  7. Siddiqui, S.T., et al., Cloud-based e-learning: using cloud computing platform for effective e-learning, in Smart Innovations in Communication and Computational Sciences. 2019, Springer. p. 335-346.
  8. Miyachi, C., What is "Cloud"? It is time to update the NIST definition? IEEE Cloud computing, 2018. 5(03): p. 6-11. https://doi.org/10.1109/mcc.2018.032591611
  9. Alam, T., Cloud Computing and its role in Information Technology. IAIC Transactions on Sustainable Digital Innovation (ITSDI), 2021. 1: p. 108-115.
  10. Attaran, M. and J. Woods, Cloud computing technology: improving small business performance using the Internet. Journal of Small Business & Entrepreneurship, 2019. 31(6): p. 495-519. https://doi.org/10.1080/08276331.2018.1466850
  11. Ali, M.B., T. Wood-Harper, and R. Ramlogan, A Framework Strategy to Overcome Trust Issues on Cloud Computing Adoption in Higher Education, in Modern Principles, Practices, and Algorithms for Cloud Security. 2020, IGI Global. p. 162-183.
  12. Alhenaki, L., et al. A survey on the security of cloud computing. in 2019 2nd International Conference on Computer Applications & Information Security (ICCAIS). 2019. IEEE.
  13. Harshita, H., Detection, and prevention of ICMP flood DDOS attack. International Journal of New Technology and Research, 2017. 3(3): p. 263333.
  14. Balarezo, J.F., et al., A survey on DoS/DDoS attacks mathematical modelling for traditional, SDN and virtual networks. Engineering Science and Technology, an International Journal, 2021.
  15. Schuba, C.L., et al. Analysis of a denial of service attack on TCP. in Proceedings. 1997 IEEE Symposium on Security and Privacy (Cat. No. 97CB36097). 1997. IEEE.
  16. Amjad, A., et al., Detection and mitigation of DDoS attack in cloud computing using a machine learning algorithm. EAI Endorsed Transactions on Scalable Information Systems, 2019. 6(26).
  17. Kieu, M.V. and T.T. Nguyen. A way to estimate TCP throughput under low-rate DDoS attacks: one TCP flow. in 2020 RIVF International Conference on Computing and Communication Technologies (RIVF). 2020. IEEE.
  18. Sahu, S.K. and R. Khare, DDOS Attacks & Mitigation Techniques in Cloud Computing Environments. Gedrag Organ. Rev, 2020. 33(2): p. 2426-2435.
  19. Wani, A.R., et al. Analysis and detection of DDoS attacks on cloud computing environment using machine learning techniques. in 2019 Amity International conference on artificial intelligence (AICAI). 2019. IEEE.
  20. Bedi, H.S., S. Roy, and S. Shiva. Game theory-based defense mechanisms against DDoS attacks on TCP/TCP-friendly flows. in 2011 IEEE symposium on computational intelligence in cyber security (CICS). 2011. IEEE.
  21. Jiao, J., et al. Detecting TCP-based DDoS attacks in Baidu cloud computing data centers. in 2017 IEEE 36th Symposium on Reliable Distributed Systems (SRDS). 2017. IEEE.
  22. Shukur, H., et al., Cloud computing virtualization of resources allocation for distributed systems. Journal of Applied Science and Technology Trends, 2020. 1(3): p. 98-105. https://doi.org/10.38094/jastt1331
  23. Atiewi, S., A. Abuhussein, and M.A. Saleh. Impact of Virtualization on Cloud Computing Energy Consumption: Empirical Study. in Proceedings of the 2nd International Symposium on Computer Science and Intelligent Control. 2018.
  24. Malik, M.I., S.H. Wani, and A. Rashid, CLOUD COMPUTING-TECHNOLOGIES. International Journal of Advanced Research in Computer Science, 2018. 9(2).
  25. Kumar, R. and S. Charu, An importance of using virtualization technology in cloud computing. Global Journal of Computers & Technology, 2015. 1(2).
  26. Erhan, Derya (2020), "Bogazici University Distributed Denial of Service (BOUN DDoS) Dataset", Mendeley Data, V1, doi: 10.17632/mfnn9bh42m.1