A taxonomy of DDoS attacks and its impact on Docker architecture Online publication date: Mon, 10-Jun-2024
by Sushant Chamoli; Varsha Mittal
International Journal of Information and Computer Security (IJICS), Vol. 23, No. 4, 2024
Abstract: Cloud infrastructure has become a favourite target for attackers as more and more organisations are switching to it owing to features like availability, scalability, and cost savings. Virtualisation has been the core of cloud computing and Docker containers are picking up ubiquity as a virtualisation tool, owing to their lighter weight and quicker start-up times. However, because the containers share the underlying host kernel, any container-level attack can have serious consequences for the host system. This study analyses and categorises the DDoS attack - one of the most prevalent and straightforward attacks. Docker architecture has been accompanied by its threat model to gain an understanding of various attack surfaces that can be exploited in a Docker ecosystem. Finally, following a simulation of DDoS attack on the Docker container, approaches unique to the Docker architecture are suggested for mitigating such attacks.
Existing subscribers:
Go to Inderscience Online Journals to access the Full Text of this article.
If you are not a subscriber and you just want to read the full contents of this article, buy online access here.Complimentary Subscribers, Editors or Members of the Editorial Board of the International Journal of Information and Computer Security (IJICS):
Login with your Inderscience username and password:
Want to subscribe?
A subscription gives you complete access to all articles in the current issue, as well as to all articles in the previous three years (where applicable). See our Orders page to subscribe.
If you still need assistance, please email subs@inderscience.com