The IUP Journal of Computer Sciences
A Comprehensive Overview of DDoS Attacks in Cloud Computing Environment and Different Machine Learning Techniques

Article Details
Pub. Date : Aprill, 2022
Product Name : The IUP Journal of Computer Sciences
Product Type : Article
Product Code : IJCS030422
Author Name : Sherwin Kati1 Abhishek Ove, Bhavana Gotipamul, Mayur Kodche and Swati Jaiswal
Availability : YES
Subject/Domain : Management
Download Format : PDF Format
No. of Pages : 20

Price

Download
Abstract

As cloud computing usage gains popularity, the security vulnerabilities are also increasing. Cloud computing is affected by many types of attacks like account hijacking, data breaches, malicious insiders, human error, etc. This paper primarily focuses on Distributed Denialof-Service (DDoS) attacks, a major security issue for a cloud system. By sending huge amounts of unusual traffic, a DDoS attack corrupts the resources and makes them inaccessible. DDoS attacks are designed to drain resources like main memory, CPU refining, processing space and network frequency, thus making them inaccessible to the customers. It is difficult to identify the difference between the attacker's requests and legitimate user requests in cloud systems at all stages, especially when the latter comes from a huge number of geographically dispersed workstations. The paper provides a detailed analysis of DDoS attacks and makes a comparative study of various algorithms against the attacks on cloud computing.


Introduction

Cloud computing paradigm, based on a worldwide Internet-based network, consists of a huge number of servers that are typically open-source, modular and inexpensive. Clouds store massive amounts of data and cover a huge variety of services to large


Keywords

Distributed Denial-of-Service (DDoS), Security, Cloud services, Algorithms