CFP last date
20 May 2024
Call for Paper
June Edition
IJCA solicits high quality original research papers for the upcoming June edition of the journal. The last date of research paper submission is 20 May 2024

Submit your paper
Know more
Reseach Article

A Survey of Intrusion Detection System for Denial of Service Attack in Cloud

by Shalki Sharma, Anshul Gupta, Sanjay Agrawal
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 120 - Number 19
Year of Publication: 2015
Authors: Shalki Sharma, Anshul Gupta, Sanjay Agrawal
10.5120/21332-4309

Shalki Sharma, Anshul Gupta, Sanjay Agrawal . A Survey of Intrusion Detection System for Denial of Service Attack in Cloud. International Journal of Computer Applications. 120, 19 ( June 2015), 1-4. DOI=10.5120/21332-4309

@article{ 10.5120/21332-4309,
author = { Shalki Sharma, Anshul Gupta, Sanjay Agrawal },
title = { A Survey of Intrusion Detection System for Denial of Service Attack in Cloud },
journal = { International Journal of Computer Applications },
issue_date = { June 2015 },
volume = { 120 },
number = { 19 },
month = { June },
year = { 2015 },
issn = { 0975-8887 },
pages = { 1-4 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume120/number19/21332-4309/ },
doi = { 10.5120/21332-4309 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:06:36.413653+05:30
%A Shalki Sharma
%A Anshul Gupta
%A Sanjay Agrawal
%T A Survey of Intrusion Detection System for Denial of Service Attack in Cloud
%J International Journal of Computer Applications
%@ 0975-8887
%V 120
%N 19
%P 1-4
%D 2015
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Cloud computing provides its user a lot of advantages but this technology has quite a bit of flaws as well. One of main flaw in cloud is the security present in the cloud. There are various threats, attacks and security issues that pertain in cloud. Among all the attacks DoS is a crucial one. The main aim of this attack is to bring down the services and resources and thus effecting everyone who is accessing the resource. This paper discusses about the Denial of Service attack or DoS attack in cloud environment and what are the various detection methods which have been proposed for the same.

References
  1. Mell, Peter, and Tim Grance. "The NIST definition of cloud computing. " (2011).
  2. Alliance, C. "Security guidance for critical areas of focus in cloud computing v3. 0. "Cloud Security Alliance (2011).
  3. Hashizume, Keiko, et al. "An analysis of security issues for cloud computing. "Journal of Internet Services and Applications 4. 1 (2013): 1-13.
  4. Joshi, Bansidhar, A. Santhana Vijayan, and Bineet Kumar Joshi. "Securing cloud computing environment against DDoS attacks. " Computer Communication and Informatics (ICCCI), 2012 International Conference on. IEEE, 2012.
  5. Kumar, Naresh, and Shalini Sharma. "Study of intrusion detection system for DDoS attacks in cloud computing. " Wireless and Optical Communications Networks (WOCN), 2013 Tenth International Conference on. IEEE, 2013.
  6. Lua, Ruiping, and Kin Choong Yow. "Mitigating ddos attacks with transparent and intelligent fast-flux swarm network. " Network, IEEE 25. 4 (2011): 28-33.
  7. Anitha, E. , and S. Malliga. "A packet marking approach to protect cloud environment against DDoS attacks. " Information Communication and Embedded Systems (ICICES), 2013 International Conference on. IEEE, 2013.
  8. Lo, Chi-Chun, Chun-Chieh Huang, and Joy Ku. "A cooperative intrusion detection system framework for cloud computing networks. " Parallel processing workshops (ICPPW), 2010 39th international conference on. IEEE, 2010.
  9. Choi, Junho, et al. "Detecting web based DDoS attack using MapReduce operations in cloud computing environment. " Journal of Internet Services and Information Security 3. 3/4 (2013): 28-37.
  10. Reddy, Pallavali Radha Krishna, and Samia Bouzefrane. "Analysis and Detection of DoS Attacks in Cloud Computing by Using QSE Algorithm. " High Performance Computing and Communications, 2014 IEEE 6th Intl Symp on Cyberspace Safety and Security, 2014 IEEE 11th Intl Conf on Embedded Software and Syst (HPCC, CSS, ICESS), 2014 IEEE Intl Conf on. IEEE, 2014.
  11. Mahajan, Ratul, et al. "Controlling high bandwidth aggregates in the network. "ACM SIGCOMM Computer Communication Review 32. 3 (2002): 62-73.
  12. Top Threats Working Group. "The notorious nine: cloud computing top threats in 2013. " Cloud Security Alliance (2013).
  13. What is cloud? Computing as a service over the Internet: http://www. ibm. com/cloud-computing/in/en/what-is-cloud-computing. html
  14. A denial of service (DoS) attack. http://hacksguide. blogspot. in/2009/06/denial-of-service-dos-attacks. html
Index Terms

Computer Science
Information Sciences

Keywords

Cloud Computing Denial of Service Intrusion Detection.