Abstract
In recent years, there have been increasing DDoS attacks on cloud computing. Cloud computing is used to store data through the Internet. In this, the users store data virtually rather than storing the data in large number of hard discs, or USBs. There are various platforms in the cloud such as Amazon, Google Cloud and Azure. We have used Azure to check the DDoS configuration. To detect the attacks, we have used random forest algorithm which gives us the maximum accuracy when compared to other algorithms. The main motivation of this paper is to make people aware of how DDoS attack is going to be performed and detected in cloud. Finally, mitigations are also suggested.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Rakesh N (2016) Performance analysis of anomaly detection of different IoT datasets using cloud micro services. In: International conference on inventive computation technologies (ICICT), vol 3. IEEE, pp 1–5
Darwish M, Ouda A, Capretz LF (2013) Cloud-based DDoS attacks and defenses. In: IEEE international conference on information society, pp 67–71
Guo J, Guo H (2023) Real-time risk detection method and protection strategy for intelligent ship network security based on cloud computing. Symmetry 15(5):988
**a Y, Zhang Y, Dai L, Zhan Y, Guo Z (2022) A brief survey on recent advances in cloud control systems. IEEE Trans Circuits Syst II Express Briefs 69(7):3108–3114
Trostle J (2006) Protecting against distributed denial of service (ddos) attacks using distributed filtering. In: Securecomm and workshops. IEEE, pp. 1–11
Anantha Padmanabhan A, Achuthan K (2022) Threat modeling and threat intelligence system for cloud using splunk. In: 10th international symposium on digital forensics and security (ISDFS). IEEE, pp 1–6
Abusaimeh H (2020) Distributed denial of service attacks in cloud computing. IJACSA 11(6)
Chonka A, Zhou W, **ang Y (2008) Protecting web services with service oriented traceback architecture. In: 8th IEEE international conference on computer and information technology. IEEE, pp 706–711
Ahmed MM, El-Hajjar A (2023) A proactive approach to protect cloud computing environment against a distributed denial of service (DDoS) attack. In: AI, blockchain and self-sovereign identity in higher education. Springer Nature Switzerland, Cham, pp 243–278
Mahdavi Hezavehi S, Rahmani R (2023) Interactive anomaly-based DDoS attack detection method in cloud computing environments using a third-party auditor, pp 82–99
Kiruthika M, Charivukalayil JJ, Chavan S, Mathew JJ, Cardoza C (2023) Enhancement of detection mechanisms for HTTP based DoS/DDoS attacks. ADBU J Eng Technol 12(1)
Alashjaee AH, Jabeur RA (2022) A efficient method to detect DDos attack in cloud computing. Int J 11(6):218–226
Suresh M, Amritha PP, Mohan AK, Kumar VA (2018) An investigation on HTTP/2 security. J Cyber Secur Mobil 161–180
Abhiram D, Harish R, Praveen K (2022) Zero-trust security implementation using SDP over VPN. In: Inventive communication and computational technologies: proceedings of ICICCT. Springer Singapore, pp 267–276
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2024 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Vardhan, T.V., Amritha, P.P., Ambili, K.N. (2024). Protecting Cloud Computing Against DDoS Attacks. In: Iglesias, A., Shin, J., Patel, B., Joshi, A. (eds) Proceedings of World Conference on Information Systems for Business Management. ISBM 2023. Lecture Notes in Networks and Systems, vol 834. Springer, Singapore. https://doi.org/10.1007/978-981-99-8349-0_18
Download citation
DOI: https://doi.org/10.1007/978-981-99-8349-0_18
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-99-8348-3
Online ISBN: 978-981-99-8349-0
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)