Abstract

Security in cloud computing is the ultimate question that every potential user studies before adopting it. Among the important points that the provider must ensure is that the Cloud will be available anytime the consumer tries to access it. Generally, the Cloud is accessible via the Internet, what makes it subject to a large variety of attacks. Today, the most striking cyber-attacks are the flooding DoS and its variant DDoS. This type of attacks aims to break down the availability of a service to its legitimate clients. In this paper, we underline the most used techniques to stand up against DoS flooading attacks in the Cloud.

Highlights

  • Cloud featuresThe Cloud has to ensure the following features [1]:. On-demand self-service: give the consumer the possibility to provision power of computing as needed without any human interaction;

  • Cloud computing is, without any doubt, the future of IT systems

  • Software as a service (SaaS): the users can rent a set of applications running on the Cloud by the provider;

Read more

Summary

Cloud features

The Cloud has to ensure the following features [1]:. On-demand self-service: give the consumer the possibility to provision power of computing as needed without any human interaction;. The Cloud has to ensure the following features [1]:. Broad network access: make the Cloud available from any type of network using any client platform;. Resource pooling: the Cloud uses a multi-tenant model to serve multiple consumers. The resources have to be pooled to maximize the number of consumers;. Rapid elasticity: make the consumers think that the resources are unlimited and available anytime they want more;. Measured service: Cloud systems must monitor resources usage appropriate to the type of service. This can be done by using a metering capability. Infrastructure from the Cloud and run any kind of applications even the operating system

Deployment model
Security issues in Cloud Computing
Data security
Service models
Data location
Web applications security
Virtualization issues
DoS and DDoS detection techniques
IP traceback
Mobile agent techniques
A mobile agent system to enhance DoS and DDoS detection in Cloud Computing
VMs order
Components of the mobile agent
Scenarios
Conclusion

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.