Title: Detection of distributed denial of service attacks in cloud computing by identifying spoofed IP
Authors: N. Jeyanthi; Uttara Barde; M. Sravani; Venu Tiwari; N.Ch. Sriman Narayana Iyengar
Addresses: School of Information Technology and Engineering, VIT University, Vellore 632014, TN, India ' School of Information Technology and Engineering, VIT University, Vellore 632014, TN, India ' School of Information Technology and Engineering, VIT University, Vellore 632014, TN, India ' School of Information Technology and Engineering, VIT University, Vellore 632014, TN, India ' School of Computing Science and Engineering, VIT University, Vellore 632014, TN, India
Abstract: Cloud computing is a booming field which will be predominating the IT industries soon. Cloud computing is a virtual dynamic version of the present day internet resource access which is static. Cloud computing provides high availability of various large-scale geographically distributed resources for users ranging from small to large-scale on demand. The two key advantages of this model are ease of use and cost effectiveness, i.e., cost as per the usage and maximum resource utilisation. The main issue identified in cloud computing is security. In the specific case of cloud computing systems, the impact of a flooding attack is expected to be amplified drastically as and when the cloud computing operating system notices the high workload on the flooded service, it will start to provide more computational power to cope with the additional workload. The attacker can flood a single, cloud-based address in order to perform a full loss of availability on the intended service. In this paper, the proposed spoofing detection algorithm to detect DDos attacks launched against a server inside a cloud.
Keywords: cloud computing; DDoS attacks; flooding attacks; spoofed IP; distributed DoS; denial of service attacks; cloud security; spoofing detection.
DOI: 10.1504/IJCNDS.2013.056223
International Journal of Communication Networks and Distributed Systems, 2013 Vol.11 No.3, pp.262 - 279
Published online: 28 Feb 2014 *
Full-text access for editors Full-text access for subscribers Purchase this article Comment on this article