Mapana Published Paper
Mapana Published Paper
Abstract
Today, most IT companies are moving towards Cloud
infrastructure and technology due to its flexibility,
scalability, and cost-effective features. Nevertheless,
security is still the main hindrance to accepting cloud
computing on a large scale. There are many security
issues related to cloud implementation, and one of the
major threats is Distributed Denial of Services (DDoS)
attack on cloud servers and applications. The DDoS attack
is a most prevalent security issue where the attacker
intends to make all victim’s resources, like cloud servers,
storage, bandwidth, etc., unavailable to a general user,
which results in dissatisfactory outcomes in related
business. This paper emphasizes understanding issues
related to DDoS attacks, such as server outages, asset
theft, and resource losses, followed by their detection and
analysis. The paper also explores the possible mitigation
strategies to reduce the impact of DDoS.
Keywords: Security, Availability, Distributed Denial of Services,
Botnet-based DDoS, Flood attacks, Detection, and Mitigation
I. Introduction
Many IT companies are still reluctant to use cloud infrastructure
due to security issues. It is because Cloud computing architecture
122
S. Pahal & Anjana Distributed Denial of Services Attacks on Cloud…
123
Mapana - Journal of Sciences, Vol. 22, No. 01 ISSN 0975-3303
124
S. Pahal & Anjana Distributed Denial of Services Attacks on Cloud…
125
Mapana - Journal of Sciences, Vol. 22, No. 01 ISSN 0975-3303
126
S. Pahal & Anjana Distributed Denial of Services Attacks on Cloud…
never reach the SIP proxy server, and the call receiver gets a lot
of fake VoIP calls, which makes it tough to reach legitimate
callers respectively [20].
c) Distributed Reflector (DRDoS) Attacks: As shown in Figure 5,
reflectors are used to hide the identity of the sources used in
traffic attacks. Reflectors are third-party sources like routers,
web servers, or cloud servers that help to relay the attack traffic
to the victim by responding to an incoming malicious packet.
There are three stages of a DRDoS attack: i) Attacker takes
control over all bots (zombies/slaves), ii) Once all zombies are
under the attacker's control, attackers send instructions to
zombies to send attack traffic through reflectors using the
victim's IP address as Source IP address and iii) reflectors send
reply traffic to the victim who finally makes DDoS attack. In this
way, DDoS attacks amplify the attack traffic by distributing it
among various reflectors, which causes lots of damage to the
services [21].
128
S. Pahal & Anjana Distributed Denial of Services Attacks on Cloud…
129
Mapana - Journal of Sciences, Vol. 22, No. 01 ISSN 0975-3303
130
S. Pahal & Anjana Distributed Denial of Services Attacks on Cloud…
134
S. Pahal & Anjana Distributed Denial of Services Attacks on Cloud…
137
Mapana - Journal of Sciences, Vol. 22, No. 01 ISSN 0975-3303
138
S. Pahal & Anjana Distributed Denial of Services Attacks on Cloud…
139
Mapana - Journal of Sciences, Vol. 22, No. 01 ISSN 0975-3303
vii) Protect all TCP ports: Protect all TCP ports by using proxy
traffic from the attack traffic.
References
1) Anjana & Ajit Singh, Security concerns and
countermeasures in cloud computing: a qualitative analysis
International Journal of Information Technology volume 11,
pages683–690(2019), 28 February 2018(Original)
2) G. Carl, G. Kesidis, R. R. Brooks and Suresh Rai, "Denial-of-
service attack-detection techniques," in IEEE Internet
Computing, vol. 10, no. 1, pp. 82-89, Jan.-Feb. 2006.
3) Hadeel S Obaid, International Journal of Engineering
Research & Technology (IJERT) http://www.ijert.org ISSN:
2278-0181, Vol. 9 Issue 03, pp 631-636, March-2020
4) Mohammad Masdar* and Marzie Jalali, A survey and
taxonomy of DoS attacks in cloud computing, SECURITY
AND COMMUNICATION NETWORKS Security Comm.
Networks 2016 in Wiley Online Library
(wileyonlinelibrary.com); Vol. 9, pp 3724–3751, DOI:
10.1002/sec.1539, Published online 13 July 2016
5) Yu S. Distributed Denial of Service Attack and Defence.
Springer: London, UK, 2014.
6) Esrra Alomari et al.Botnet-based Distributed Denial of
Service (DDoS) Attacks on Web Servers: Classification and
Art, International Journal of Computer Applications (0975 –
8887), Volume 49– No.7, July 2012
7) S. M. Specht and R. B. Lee, "Distributed Denial of service:
Taxonomies of attacks, tools, and countermeasures," in the
Proceedings of the International Workshop on Security in
Parallel and Distributed Systems, 2004, pp. 543-550.
8) K. J. Houle, "Trends in Denial of Service Attack
Technology," CERT Coordination Center, Carnegie Mellon
Software Engineering Institute, Oct 2001.
140
S. Pahal & Anjana Distributed Denial of Services Attacks on Cloud…
141
Mapana - Journal of Sciences, Vol. 22, No. 01 ISSN 0975-3303
142
S. Pahal & Anjana Distributed Denial of Services Attacks on Cloud…
143
Mapana - Journal of Sciences, Vol. 22, No. 01 ISSN 0975-3303
37) Rexroad, B., & van der Merwe, J. (2010). Network security–
A service provider view. In Guide to reliable internet
services and applications (pp. 447-515). Springer.
38) Owezarski, P. (2009). Implementation of adaptive traffic
sampling and management, path performance. Academic
Press.
39) Wen, S., Jia, W., Zhou, W., Zhou, W., & Xu, C. (2010). Cold:
Surviving various application-layer DDoS attacks that
mimic flash crowd. Paper presented at the network and
system security (NSS), 2010 4th international conference on.
40) Kandula, S., Katabi, D., Jacob, M., & Berger, A. (2005). Botz-
4-sale: Surviving organized DDoS attacks that mimic flash
crowds. Paper presented at the 2nd conference on a
symposium on networked systems design &
implementation.
41) Stavrou, A., Cook, D. L., Morein, W. G., Keromytis, A. D.,
Misra, V., & Rubenstein, D. (2005). Web so: An overlay-
based system for protecting web servers from denial of
service attacks. Computer Networks, 48(5), 781-807.
42) Gummadi, R., Balakrishnan, H., Maniatis, P., & Ratnasamy,
S. (2009). Not-a-bot: Improving service availability in the
face of botnet attacks. Paper presented at the NSDI.
43) Djalaliev, P., Jamshed, M., Farnan, N., & Brustoloni, J.
(2008). Sentinel: Hardware-accelerated mitigation of bot-
based DDoS attacks. Paper presented at the computer
communications and networks, 2008. Icccn'08. 17th
international conference on.
44) M. Glenn, "A summary of dos/DDoS prevention,
monitoring and mitigation techniques in a service provider
environment," SANS Institute, 2003.
45) J. Molsa, "Effectiveness of rate-limiting in mitigating
flooding DOS attacks," In International Conference on
Communications, Internet, and Information Technology,
pp. 155-160, 2004.
144
S. Pahal & Anjana Distributed Denial of Services Attacks on Cloud…
145