Protecting Cloud Computing Against DDoS Attacks

  • Conference paper
  • First Online:
Proceedings of World Conference on Information Systems for Business Management (ISBM 2023)

Part of the book series: Lecture Notes in Networks and Systems ((LNNS,volume 834))

Included in the following conference series:

  • 117 Accesses

Abstract

In recent years, there have been increasing DDoS attacks on cloud computing. Cloud computing is used to store data through the Internet. In this, the users store data virtually rather than storing the data in large number of hard discs, or USBs. There are various platforms in the cloud such as Amazon, Google Cloud and Azure. We have used Azure to check the DDoS configuration. To detect the attacks, we have used random forest algorithm which gives us the maximum accuracy when compared to other algorithms. The main motivation of this paper is to make people aware of how DDoS attack is going to be performed and detected in cloud. Finally, mitigations are also suggested.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
EUR 32.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or Ebook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
GBP 19.95
Price includes VAT (United Kingdom)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
GBP 143.50
Price includes VAT (United Kingdom)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
GBP 179.99
Price includes VAT (United Kingdom)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free ship** worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Rakesh N (2016) Performance analysis of anomaly detection of different IoT datasets using cloud micro services. In: International conference on inventive computation technologies (ICICT), vol 3. IEEE, pp 1–5

    Google Scholar 

  2. Darwish M, Ouda A, Capretz LF (2013) Cloud-based DDoS attacks and defenses. In: IEEE international conference on information society, pp 67–71

    Google Scholar 

  3. Guo J, Guo H (2023) Real-time risk detection method and protection strategy for intelligent ship network security based on cloud computing. Symmetry 15(5):988

    Article  Google Scholar 

  4. **a Y, Zhang Y, Dai L, Zhan Y, Guo Z (2022) A brief survey on recent advances in cloud control systems. IEEE Trans Circuits Syst II Express Briefs 69(7):3108–3114

    Google Scholar 

  5. Trostle J (2006) Protecting against distributed denial of service (ddos) attacks using distributed filtering. In: Securecomm and workshops. IEEE, pp. 1–11

    Google Scholar 

  6. Anantha Padmanabhan A, Achuthan K (2022) Threat modeling and threat intelligence system for cloud using splunk. In: 10th international symposium on digital forensics and security (ISDFS). IEEE, pp 1–6

    Google Scholar 

  7. Abusaimeh H (2020) Distributed denial of service attacks in cloud computing. IJACSA 11(6)

    Google Scholar 

  8. Chonka A, Zhou W, **ang Y (2008) Protecting web services with service oriented traceback architecture. In: 8th IEEE international conference on computer and information technology. IEEE, pp 706–711

    Google Scholar 

  9. Ahmed MM, El-Hajjar A (2023) A proactive approach to protect cloud computing environment against a distributed denial of service (DDoS) attack. In: AI, blockchain and self-sovereign identity in higher education. Springer Nature Switzerland, Cham, pp 243–278

    Google Scholar 

  10. Mahdavi Hezavehi S, Rahmani R (2023) Interactive anomaly-based DDoS attack detection method in cloud computing environments using a third-party auditor, pp 82–99

    Google Scholar 

  11. Kiruthika M, Charivukalayil JJ, Chavan S, Mathew JJ, Cardoza C (2023) Enhancement of detection mechanisms for HTTP based DoS/DDoS attacks. ADBU J Eng Technol 12(1)

    Google Scholar 

  12. Alashjaee AH, Jabeur RA (2022) A efficient method to detect DDos attack in cloud computing. Int J 11(6):218–226

    Google Scholar 

  13. Suresh M, Amritha PP, Mohan AK, Kumar VA (2018) An investigation on HTTP/2 security. J Cyber Secur Mobil 161–180

    Google Scholar 

  14. Abhiram D, Harish R, Praveen K (2022) Zero-trust security implementation using SDP over VPN. In: Inventive communication and computational technologies: proceedings of ICICCT. Springer Singapore, pp 267–276

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to T. Vishnu Vardhan .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2024 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Vardhan, T.V., Amritha, P.P., Ambili, K.N. (2024). Protecting Cloud Computing Against DDoS Attacks. In: Iglesias, A., Shin, J., Patel, B., Joshi, A. (eds) Proceedings of World Conference on Information Systems for Business Management. ISBM 2023. Lecture Notes in Networks and Systems, vol 834. Springer, Singapore. https://doi.org/10.1007/978-981-99-8349-0_18

Download citation

Publish with us

Policies and ethics

Navigation