Mitigating DDoS attacks in containerized environments: A comparative analysis of Docker and Kubernetes
Containerization has become the primary method for deploying applications, with web services being the most prevalent. However, exposing server IP addresses to external connections renders containerized services vulnerable to DDoS attacks, which can deplete server resources and hinder legitimate use...
Saved in:
Published in | Journal of parallel and distributed computing Vol. 204; p. 105130 |
---|---|
Main Authors | , |
Format | Journal Article |
Language | English |
Published |
Elsevier Inc
01.10.2025
|
Subjects | |
Online Access | Get full text |
Cover
Loading…
Abstract | Containerization has become the primary method for deploying applications, with web services being the most prevalent. However, exposing server IP addresses to external connections renders containerized services vulnerable to DDoS attacks, which can deplete server resources and hinder legitimate user access. To address this issue, we implement twelve different mitigation strategies, test them across three common types of web services, and conduct experiments on both Docker and Kubernetes deployment platforms. Furthermore, this study introduces a cross-platform, orchestration-aware evaluation framework that simulates realistic multi-service workloads and analyzes defense strategy performance under varying concurrency conditions. Experimental results indicate that Docker excels in managing white-listed traffic and delaying attacker responses, while Kubernetes achieves low completion times, minimum response times, and low failure rates by processing all requests simultaneously. Based on these findings, we provide actionable insights for selecting appropriate mitigation strategies tailored to different orchestration environments and workload patterns, offering practical guidance for securing containerized deployments against low-rate DDoS threats. Our work not only provides empirical performance evaluations but also reveals deployment-specific trade-offs, offering strategic recommendations for building resilient cloud-native infrastructures.
•Twelve mitigation strategies were evaluated across Docker and Kubernetes platforms.•Experiments applied realistic multi-service workloads and varying concurrency levels.•Platform-aware insights reveal orchestration trade-offs affecting mitigation outcomes.•Offers practical deployment guidance for DDoS resilience in containerized systems. |
---|---|
AbstractList | Containerization has become the primary method for deploying applications, with web services being the most prevalent. However, exposing server IP addresses to external connections renders containerized services vulnerable to DDoS attacks, which can deplete server resources and hinder legitimate user access. To address this issue, we implement twelve different mitigation strategies, test them across three common types of web services, and conduct experiments on both Docker and Kubernetes deployment platforms. Furthermore, this study introduces a cross-platform, orchestration-aware evaluation framework that simulates realistic multi-service workloads and analyzes defense strategy performance under varying concurrency conditions. Experimental results indicate that Docker excels in managing white-listed traffic and delaying attacker responses, while Kubernetes achieves low completion times, minimum response times, and low failure rates by processing all requests simultaneously. Based on these findings, we provide actionable insights for selecting appropriate mitigation strategies tailored to different orchestration environments and workload patterns, offering practical guidance for securing containerized deployments against low-rate DDoS threats. Our work not only provides empirical performance evaluations but also reveals deployment-specific trade-offs, offering strategic recommendations for building resilient cloud-native infrastructures.
•Twelve mitigation strategies were evaluated across Docker and Kubernetes platforms.•Experiments applied realistic multi-service workloads and varying concurrency levels.•Platform-aware insights reveal orchestration trade-offs affecting mitigation outcomes.•Offers practical deployment guidance for DDoS resilience in containerized systems. |
ArticleNumber | 105130 |
Author | Tu, Chih-Han Chuang, Yung-Ting |
Author_xml | – sequence: 1 givenname: Yung-Ting orcidid: 0000-0002-5164-9171 surname: Chuang fullname: Chuang, Yung-Ting email: ytchuang@nycu.edu.tw – sequence: 2 givenname: Chih-Han surname: Tu fullname: Tu, Chih-Han |
BookMark | eNp9kM1OAjEUhbvAREBfwFVfYLA_doYaNwQUjRgX6rrptLekA7SkrST49A7BtaubnJvv5OQboUGIARC6oWRCCa1vu0m3t2bCCBN9ICgnAzQkzR2vGk7FJRrl3BFCqWimQ-TefPFrXXxY48UifmBdijabjH3AJoaifYDkf8BiCAefYthBKPkez_rvbq9TTx4A66C3x-wzjg4votlA6iOLX79bSAEK5Ct04fQ2w_XfHaOvp8fP-XO1el--zGeryjDBS2WlbhopiRRWOGpr00rZCiJq4hiThNu25VrKmkNN2LRxnBlphDGcTUHquuVjxM69JsWcEzi1T36n01FRok52VKdOdtTJjjrb6aGHMwT9soOHpLLxEAxYn8AUZaP_D_8Ft41y1A |
Cites_doi | 10.1109/TPDS.2019.2942591 10.1109/ACCESS.2019.2945930 10.1109/TIFS.2011.2107320 10.1109/SURV.2013.031413.00127 10.1109/ACCESS.2020.2976609 10.1109/TSE.2022.3229221 10.1145/3485537 10.3390/s21051910 10.1109/ACCESS.2024.3501192 10.1016/j.compind.2019.01.006 10.1109/OJIES.2021.3055901 10.1109/TPDS.2018.2794369 10.22214/ijraset.2022.44106 10.1016/j.jnca.2018.07.003 10.1016/j.procs.2020.04.152 10.1145/2723872.2723882 |
ContentType | Journal Article |
Copyright | 2025 Elsevier Inc. |
Copyright_xml | – notice: 2025 Elsevier Inc. |
DBID | AAYXX CITATION |
DOI | 10.1016/j.jpdc.2025.105130 |
DatabaseName | CrossRef |
DatabaseTitle | CrossRef |
DatabaseTitleList | |
DeliveryMethod | fulltext_linktorsrc |
Discipline | Computer Science |
ExternalDocumentID | 10_1016_j_jpdc_2025_105130 S0743731525000978 |
GroupedDBID | --K --M -~X .~1 0R~ 1B1 1~. 1~5 29L 4.4 457 4G. 5GY 5VS 7-5 71M 8P~ 9JN AAEDT AAEDW AAIKJ AAKOC AALRI AAOAW AAQFI AAQXK AATTM AAXKI AAXUO AAYFN AAYWO ABBOA ABDPE ABEFU ABFNM ABFSI ABJNI ABMAC ABWVN ABXDB ACDAQ ACGFS ACNNM ACRLP ACRPL ACVFH ACZNC ADBBV ADCNI ADEZE ADFGL ADHUB ADJOM ADMUD ADNMO ADTZH ADVLN AEBSH AECPX AEIPS AEKER AENEX AEUPX AFJKZ AFPUW AFTJW AFXIZ AGCQF AGHFR AGQPQ AGRNS AGUBO AGYEJ AHHHB AHJVU AHZHX AIALX AIEXJ AIGII AIIUN AIKHN AITUG AKBMS AKRWK AKYEP ALMA_UNASSIGNED_HOLDINGS AMRAJ ANKPU AOUOD APXCP ASPBG AVWKF AXJTR AZFZN BJAXD BKOJK BLXMC BNPGV CAG COF CS3 DM4 DU5 E.L EBS EFBJH EFKBS EJD EO8 EO9 EP2 EP3 F5P FDB FEDTE FGOYB FIRID FNPLU FYGXN G-2 G-Q GBLVA GBOLZ HLZ HVGLF HZ~ H~9 IHE J1W JJJVA K-O KOM LG5 LG9 LY7 M41 MO0 N9A O-L O9- OAUVE OZT P-8 P-9 P2P PC. Q38 R2- RIG ROL RPZ SBC SDF SDG SDP SES SET SEW SPC SPCBC SST SSV SSZ T5K TN5 TWZ WUQ XJT XOL XPP ZMT ZU3 ZY4 ~G- AAYXX CITATION SSH |
ID | FETCH-LOGICAL-c253t-d9a7799095d5f1d6cb99b50560f22903dbb3a9963e60287f32c9c5cc328e9a6b3 |
IEDL.DBID | .~1 |
ISSN | 0743-7315 |
IngestDate | Wed Jul 16 16:43:53 EDT 2025 Sat Aug 09 17:30:59 EDT 2025 |
IsPeerReviewed | true |
IsScholarly | true |
Keywords | Web services security DDoS attacks and defenses Containerization Docker Kubernetes |
Language | English |
LinkModel | DirectLink |
MergedId | FETCHMERGED-LOGICAL-c253t-d9a7799095d5f1d6cb99b50560f22903dbb3a9963e60287f32c9c5cc328e9a6b3 |
ORCID | 0000-0002-5164-9171 |
ParticipantIDs | crossref_primary_10_1016_j_jpdc_2025_105130 elsevier_sciencedirect_doi_10_1016_j_jpdc_2025_105130 |
PublicationCentury | 2000 |
PublicationDate | October 2025 2025-10-00 |
PublicationDateYYYYMMDD | 2025-10-01 |
PublicationDate_xml | – month: 10 year: 2025 text: October 2025 |
PublicationDecade | 2020 |
PublicationTitle | Journal of parallel and distributed computing |
PublicationYear | 2025 |
Publisher | Elsevier Inc |
Publisher_xml | – name: Elsevier Inc |
References | Zhijun, Wenjing, Liang, Meng (br0270) 2020; 8 Shah, Dubaria (br0430) 2019 Kan (br0380) 2016 Wan, Guan, Wang, Bai, Choi (br0360) 2018; 119 Chelladhurai, Chelliah, Kumar (br0400) 2016 Zhao, Wang, Liu, Wang, Zhang, Zheng (br0340) 2018; 29 Watada, Roy, Kadikar, Pham, Xu (br0020) 2019; 7 Merkel (br0070) 2014; 239 Gamess, Parajuli (br0250) 2024 Mondal, Pan, Kabir, Tian, Dai (br0090) 2022 Shamim (br0480) 2021 Nocentino, Weissman, Nocentino, Weissman (br0500) 2021 Johansson, Rågberger, Nolte, Papadopoulos (br0130) 2022 Varghese, Subba, Thai, Barker (br0350) 2016 Hardikar, Ahirwar, Rajan (br0150) 2021 Xiang, Li, Zhou (br0280) 2011; 6 Vayghan, Saied, Toeroe, Khendek (br0120) 2019 Tripathi (br0220) 2024 Somani, Chaudhary (br0330) 2009 Jazayeri (br0160) 2007 Lau, Rubin, Smith, Trajkovic (br0190) 2000; vol. 3 Khatami, Purwanto, Ruriawan (br0140) 2020 Poniszewska-Marańda, Czechowska (br0110) 2021; 21 Bachiega, Souza, Bruschi, De Souza (br0030) 2018 Patidar, Somani (br0260) 2021; 59 Fan, Wang (br0520) 2015 Li, Jin, Zou, Yuan (br0290) 2019; 31 Dewi, Noertjahyana, Palit, Yedutun (br0100) 2019 Garcia (br0240) 2024 Zhou, Zhou, Hoppe (br0310) 2022; 49 Nardelli, Hochreiner, Schulte (br0320) 2017 Huang, Cui, Wen, Huang (br0390) 2019 Zargar, Joshi, Tipper (br0180) 2013; 15 David, Barr (br0490) 2021 Dautov, Song (br0420) 2020; vol. 1 Boettiger (br0050) 2015; 49 Mallikarjunan, Muthupriya, Shalinie (br0200) 2016 Liu, Lan, Pang, Karlsson, Gong (br0300) 2021; 2 Potdar, Narayan, Kengond, Mulla (br0080) 2020; 171 Jaafar, Abdullah, Ismail (br0210) 2019 Koksal, Catak, Dalveren (br0230) 2024 Huang, Wu, Jiang, Jin (br0060) 2019 Gokhale, Turcotte, Tip (br0530) 2021; 5 Nath, Dhar, Basishtha (br0170) 2014 Medel, Rana, Bañares, Arronategui (br0450) 2016 Sinde, Thakkalapally, Ramidi, Veeramalla (br0540) 2022; 10 Vayghan, Saied, Toeroe, Khendek (br0440) 2018 Chen, Guan, Liang, Vernon, McPherson, Lo, Chen, Ahrens (br0040) 2017 Bose, Rahman, Shamim (br0460) 2021 S. Pothuganti, M. Samanth, Comparative analysis of load balancing in cloud platforms for an online bookstore web application using apache benchmark, 2023. T. Borangiu, D. Trentesaux, A. Thomas, P. Leitão, J. Barata, Digital transformation of manufacturing through cloud services and resource virtualization, 2019. Chung, Quang-Hung, Nguyen, Thoai (br0370) 2016 Wenhao, Zheng (br0410) 2020 D'Silva, Ambawade (br0470) 2021 Zhijun (10.1016/j.jpdc.2025.105130_br0270) 2020; 8 Lau (10.1016/j.jpdc.2025.105130_br0190) 2000; vol. 3 Mallikarjunan (10.1016/j.jpdc.2025.105130_br0200) 2016 Zhou (10.1016/j.jpdc.2025.105130_br0310) 2022; 49 Patidar (10.1016/j.jpdc.2025.105130_br0260) 2021; 59 David (10.1016/j.jpdc.2025.105130_br0490) Watada (10.1016/j.jpdc.2025.105130_br0020) 2019; 7 Poniszewska-Marańda (10.1016/j.jpdc.2025.105130_br0110) 2021; 21 Nocentino (10.1016/j.jpdc.2025.105130_br0500) 2021 Nath (10.1016/j.jpdc.2025.105130_br0170) 2014 Potdar (10.1016/j.jpdc.2025.105130_br0080) 2020; 171 Zargar (10.1016/j.jpdc.2025.105130_br0180) 2013; 15 Tripathi (10.1016/j.jpdc.2025.105130_br0220) 2024 Gamess (10.1016/j.jpdc.2025.105130_br0250) 2024 Shamim (10.1016/j.jpdc.2025.105130_br0480) 2021 Merkel (10.1016/j.jpdc.2025.105130_br0070) 2014; 239 Fan (10.1016/j.jpdc.2025.105130_br0520) 2015 Shah (10.1016/j.jpdc.2025.105130_br0430) 2019 D'Silva (10.1016/j.jpdc.2025.105130_br0470) 2021 Hardikar (10.1016/j.jpdc.2025.105130_br0150) 2021 Sinde (10.1016/j.jpdc.2025.105130_br0540) 2022; 10 Xiang (10.1016/j.jpdc.2025.105130_br0280) 2011; 6 Huang (10.1016/j.jpdc.2025.105130_br0390) 2019 Medel (10.1016/j.jpdc.2025.105130_br0450) 2016 Chelladhurai (10.1016/j.jpdc.2025.105130_br0400) 2016 Somani (10.1016/j.jpdc.2025.105130_br0330) 2009 Chen (10.1016/j.jpdc.2025.105130_br0040) Vayghan (10.1016/j.jpdc.2025.105130_br0440) 2018 10.1016/j.jpdc.2025.105130_br0010 Mondal (10.1016/j.jpdc.2025.105130_br0090) 2022 Huang (10.1016/j.jpdc.2025.105130_br0060) 2019 Jaafar (10.1016/j.jpdc.2025.105130_br0210) 2019 Zhao (10.1016/j.jpdc.2025.105130_br0340) 2018; 29 Varghese (10.1016/j.jpdc.2025.105130_br0350) 2016 Kan (10.1016/j.jpdc.2025.105130_br0380) 2016 Johansson (10.1016/j.jpdc.2025.105130_br0130) 2022 Bachiega (10.1016/j.jpdc.2025.105130_br0030) 2018 Li (10.1016/j.jpdc.2025.105130_br0290) 2019; 31 Koksal (10.1016/j.jpdc.2025.105130_br0230) 2024 Vayghan (10.1016/j.jpdc.2025.105130_br0120) 2019 Liu (10.1016/j.jpdc.2025.105130_br0300) 2021; 2 Wan (10.1016/j.jpdc.2025.105130_br0360) 2018; 119 Dewi (10.1016/j.jpdc.2025.105130_br0100) 2019 Jazayeri (10.1016/j.jpdc.2025.105130_br0160) 2007 Boettiger (10.1016/j.jpdc.2025.105130_br0050) 2015; 49 Khatami (10.1016/j.jpdc.2025.105130_br0140) 2020 Garcia (10.1016/j.jpdc.2025.105130_br0240) 2024 Chung (10.1016/j.jpdc.2025.105130_br0370) 2016 Dautov (10.1016/j.jpdc.2025.105130_br0420) 2020; vol. 1 10.1016/j.jpdc.2025.105130_br0510 Nardelli (10.1016/j.jpdc.2025.105130_br0320) 2017 Gokhale (10.1016/j.jpdc.2025.105130_br0530) 2021; 5 Wenhao (10.1016/j.jpdc.2025.105130_br0410) 2020 Bose (10.1016/j.jpdc.2025.105130_br0460) 2021 |
References_xml | – start-page: 37 year: 2015 end-page: 42 ident: br0520 article-title: Performance comparison of web servers with different architectures: a case study using high concurrency workload publication-title: 2015 Third IEEE Workshop on Hot Topics in Web Systems and Technologies (HotWeb) – year: 2024 ident: br0230 article-title: Flexible and lightweight mitigation framework for distributed denial-of-service attacks in container-based edge networks using Kubernetes publication-title: IEEE Access – start-page: 1 year: 2022 end-page: 51 ident: br0090 article-title: Kubernetes in it administration and serverless computing: an empirical study and research challenges publication-title: J. Supercomput. – start-page: 74 year: 2020 end-page: 78 ident: br0140 article-title: High availability storage server with Kubernetes publication-title: 2020 International Conference on Information Technology Systems and Innovation (ICITSI) – volume: 59 year: 2021 ident: br0260 article-title: Serving while attacked: ddos attack effect minimization using page separation and container allocation strategy publication-title: J. Inf. Secur. Appl. – year: 2021 ident: br0490 article-title: Kubernetes autoscaling: yoyo attack vulnerability and mitigation – start-page: 2019 year: 2019 ident: br0210 article-title: Review of recent detection methods for http ddos attack publication-title: J. Comput. Netw. Commun. – year: 2017 ident: br0040 article-title: Docker-enabled build and execution environment (bee): an encapsulated environment enabling hpc applications running everywhere – start-page: 138 year: 2024 end-page: 147 ident: br0250 article-title: Image-processing workloads and ddos attack resilience: evaluating Docker and podman containers on raspberry pi and odroid publication-title: Proceedings of the 2024 ACM Southeast Conference – reference: S. Pothuganti, M. Samanth, Comparative analysis of load balancing in cloud platforms for an online bookstore web application using apache benchmark, 2023. – volume: 2 start-page: 153 year: 2021 end-page: 168 ident: br0300 article-title: Performance evaluation of containerization in edge-cloud computing stacks for industrial applications: a client perspective publication-title: IEEE Open J. Ind. Electron. Soc. – start-page: 354 year: 2020 end-page: 357 ident: br0410 article-title: Vulnerability analysis and security research of Docker container publication-title: 2020 IEEE 3rd International Conference on Information Systems and Computer Aided Education (ICISCAE) – start-page: 41 year: 2009 end-page: 48 ident: br0330 article-title: Application performance isolation in virtualization publication-title: 2009 IEEE International Conference on Cloud Computing – year: 2024 ident: br0240 article-title: Real-time network simulations for ml/dl ddos detection using Docker – start-page: 478 year: 2016 end-page: 483 ident: br0380 article-title: Docloud: an elastic cloud platform for web applications based on Docker publication-title: 2016 18th International Conference on Advanced Communication Technology (ICACT) – volume: 5 start-page: 1 year: 2021 end-page: 27 ident: br0530 article-title: Automatic migration from synchronous to asynchronous javascript apis publication-title: Proc. ACM Program. Lang. – volume: vol. 1 start-page: 263 year: 2020 end-page: 268 ident: br0420 article-title: Towards agile management of containerised software at the edge publication-title: 2020 IEEE Conference on Industrial Cyberphysical Systems (ICPS) – start-page: 28 year: 2019 end-page: 37 ident: br0060 article-title: Fastbuild: accelerating Docker image building for efficient development and deployment of container publication-title: 2019 35th Symposium on Mass Storage Systems and Technologies (MSST) – volume: 21 start-page: 1910 year: 2021 ident: br0110 article-title: Kubernetes cluster for automating software production environment publication-title: Sensors – volume: 15 start-page: 2046 year: 2013 end-page: 2069 ident: br0180 article-title: A survey of defense mechanisms against distributed denial of service (ddos) flooding attacks publication-title: IEEE Commun. Surv. Tutor. – start-page: 856 year: 2016 end-page: 859 ident: br0400 article-title: Securing Docker containers from denial of service (dos) attacks publication-title: 2016 IEEE International Conference on Services Computing (SCC) – volume: 6 start-page: 426 year: 2011 end-page: 437 ident: br0280 article-title: Low-rate ddos attacks detection and traceback by using new information metrics publication-title: IEEE Trans. Inf. Forensics Secur. – start-page: 199 year: 2007 end-page: 213 ident: br0160 article-title: Some trends in web application development publication-title: Future of Software Engineering (FOSE'07) – start-page: 1689 year: 2021 end-page: 1690 ident: br0480 article-title: Mitigating security attacks in Kubernetes manifests for security best practices violation publication-title: Proceedings of the 29th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering – volume: 171 start-page: 1419 year: 2020 end-page: 1428 ident: br0080 article-title: Performance evaluation of Docker container and virtual machine publication-title: Proc. Comput. Sci. – volume: 29 start-page: 1385 year: 2018 end-page: 1400 ident: br0340 article-title: Power-aware and performance-guaranteed virtual machine placement in the cloud publication-title: IEEE Trans. Parallel Distrib. Syst. – start-page: 53 year: 2021 end-page: 70 ident: br0500 article-title: Kubernetes architecture publication-title: SQL Server on Kubernetes: Designing and Building a Modern Data Platform – start-page: 1 year: 2022 end-page: 8 ident: br0130 article-title: Kubernetes orchestration of high availability distributed control systems publication-title: 2022 IEEE International Conference on Industrial Technology (ICIT) – start-page: 970 year: 2018 end-page: 973 ident: br0440 article-title: Deploying microservice based applications with Kubernetes: experiments and lessons learned publication-title: 2018 IEEE 11th International Conference on Cloud Computing (CLOUD) – start-page: 192 year: 2016 end-page: 201 ident: br0350 article-title: Container-based cloud virtual machine benchmarking publication-title: 2016 IEEE International Conference on Cloud Engineering (IC2E) – start-page: 1 year: 2016 end-page: 6 ident: br0200 article-title: A survey of distributed denial of service attack publication-title: 2016 10th International Conference on Intelligent Systems and Control (ISCO) – volume: 8 start-page: 43920 year: 2020 end-page: 43943 ident: br0270 article-title: Low-rate dos attacks, detection, defense, and challenges: a survey publication-title: IEEE Access – volume: 7 start-page: 152443 year: 2019 end-page: 152472 ident: br0020 article-title: Emerging trends, techniques and open issues of containerization: a review publication-title: IEEE Access – reference: T. Borangiu, D. Trentesaux, A. Thomas, P. Leitão, J. Barata, Digital transformation of manufacturing through cloud services and resource virtualization, 2019. – volume: 49 start-page: 71 year: 2015 end-page: 79 ident: br0050 article-title: An introduction to Docker for reproducible research publication-title: Oper. Syst. Rev. – volume: 239 start-page: 2 year: 2014 ident: br0070 article-title: Docker: lightweight Linux containers for consistent development and deployment publication-title: Linux J. – start-page: 86 year: 2014 end-page: 89 ident: br0170 article-title: Web 1.0 to web 3.0-evolution of the web and its various challenges publication-title: 2014 International Conference on Reliability Optimization and Information Technology (ICROIT) – start-page: 1 year: 2019 end-page: 4 ident: br0100 article-title: Server scalability using Kubernetes publication-title: 2019 4th Technology Innovation Management and Engineering Science International Conference (TIMES-iCON) – start-page: 398 year: 2018 end-page: 403 ident: br0030 article-title: Container-based performance evaluation: a survey and challenges publication-title: 2018 IEEE International Conference on Cloud Engineering (IC2E) – start-page: 176 year: 2019 end-page: 185 ident: br0120 article-title: Microservice based architecture: towards high-availability for stateful applications with Kubernetes publication-title: 2019 IEEE 19th International Conference on Software Quality, Reliability and Security (QRS) – start-page: 257 year: 2016 end-page: 262 ident: br0450 article-title: Modelling performance & resource management in Kubernetes publication-title: Proceedings of the 9th International Conference on Utility and Cloud Computing – volume: 31 start-page: 695 year: 2019 end-page: 706 ident: br0290 article-title: Exploring new opportunities to defeat low-rate ddos attack in container-based cloud environment publication-title: IEEE Trans. Parallel Distrib. Syst. – volume: 119 start-page: 97 year: 2018 end-page: 109 ident: br0360 article-title: Application deployment using microservice and Docker containers: framework and optimization publication-title: J. Netw. Comput. Appl. – start-page: 9 year: 2021 end-page: 12 ident: br0460 article-title: ‘Under-reported’ security defects in Kubernetes manifests publication-title: 2021 IEEE/ACM 2nd International Workshop on Engineering and Cybersecurity of Critical Systems (EnCyCriS) – start-page: 0184 year: 2019 end-page: 0189 ident: br0430 article-title: Building modern clouds: using Docker, Kubernetes & Google cloud platform publication-title: 2019 IEEE 9th Annual Computing and Communication Workshop and Conference (CCWC) – start-page: 1214 year: 2019 end-page: 1220 ident: br0390 article-title: Security analysis and threats detection techniques on Docker container publication-title: 2019 IEEE 5th International Conference on Computer and Communications (ICCC) – start-page: 1 year: 2021 end-page: 8 ident: br0470 article-title: Building a zero trust architecture using Kubernetes publication-title: 2021 6th International Conference for Convergence in Technology (i2ct) – start-page: 52 year: 2016 end-page: 57 ident: br0370 article-title: Using Docker in high performance computing applications publication-title: 2016 IEEE Sixth International Conference on Communications and Electronics (ICCE) – start-page: 1996 year: 2021 end-page: 2003 ident: br0150 article-title: Containerization: cloud computing based inspiration technology for adoption through Docker and Kubernetes publication-title: 2021 Second International Conference on Electronics and Sustainable Communication Systems (ICESC) – volume: vol. 3 start-page: 2275 year: 2000 end-page: 2280 ident: br0190 article-title: Distributed denial of service attacks publication-title: Smc 2000 conference proceedings. 2000 ieee international conference on systems, man and cybernetics – year: 2024 ident: br0220 article-title: Attacking and defending Kubernetes – start-page: 5 year: 2017 end-page: 10 ident: br0320 article-title: Elastic provisioning of virtual machines for container deployment publication-title: Proceedings of the 8th ACM/SPEC on International Conference on Performance Engineering Companion – volume: 49 start-page: 2722 year: 2022 end-page: 2740 ident: br0310 article-title: Containerization for high performance computing systems: survey and prospects publication-title: IEEE Trans. Softw. Eng. – volume: 10 start-page: 1305 year: 2022 end-page: 1309 ident: br0540 article-title: Continuous integration and deployment automation in aws cloud infrastructure publication-title: Int. J. Res. Appl. Sci. Eng. Technol. – volume: 31 start-page: 695 issue: 3 year: 2019 ident: 10.1016/j.jpdc.2025.105130_br0290 article-title: Exploring new opportunities to defeat low-rate ddos attack in container-based cloud environment publication-title: IEEE Trans. Parallel Distrib. Syst. doi: 10.1109/TPDS.2019.2942591 – volume: vol. 1 start-page: 263 year: 2020 ident: 10.1016/j.jpdc.2025.105130_br0420 article-title: Towards agile management of containerised software at the edge – start-page: 257 year: 2016 ident: 10.1016/j.jpdc.2025.105130_br0450 article-title: Modelling performance & resource management in Kubernetes – volume: 7 start-page: 152443 year: 2019 ident: 10.1016/j.jpdc.2025.105130_br0020 article-title: Emerging trends, techniques and open issues of containerization: a review publication-title: IEEE Access doi: 10.1109/ACCESS.2019.2945930 – start-page: 9 year: 2021 ident: 10.1016/j.jpdc.2025.105130_br0460 article-title: ‘Under-reported’ security defects in Kubernetes manifests – ident: 10.1016/j.jpdc.2025.105130_br0040 – ident: 10.1016/j.jpdc.2025.105130_br0510 – volume: 239 start-page: 2 issue: 2 year: 2014 ident: 10.1016/j.jpdc.2025.105130_br0070 article-title: Docker: lightweight Linux containers for consistent development and deployment publication-title: Linux J. – volume: vol. 3 start-page: 2275 year: 2000 ident: 10.1016/j.jpdc.2025.105130_br0190 article-title: Distributed denial of service attacks – start-page: 856 year: 2016 ident: 10.1016/j.jpdc.2025.105130_br0400 article-title: Securing Docker containers from denial of service (dos) attacks – start-page: 478 year: 2016 ident: 10.1016/j.jpdc.2025.105130_br0380 article-title: Docloud: an elastic cloud platform for web applications based on Docker – volume: 6 start-page: 426 issue: 2 year: 2011 ident: 10.1016/j.jpdc.2025.105130_br0280 article-title: Low-rate ddos attacks detection and traceback by using new information metrics publication-title: IEEE Trans. Inf. Forensics Secur. doi: 10.1109/TIFS.2011.2107320 – year: 2024 ident: 10.1016/j.jpdc.2025.105130_br0240 – start-page: 354 year: 2020 ident: 10.1016/j.jpdc.2025.105130_br0410 article-title: Vulnerability analysis and security research of Docker container – start-page: 1 year: 2021 ident: 10.1016/j.jpdc.2025.105130_br0470 article-title: Building a zero trust architecture using Kubernetes – start-page: 53 year: 2021 ident: 10.1016/j.jpdc.2025.105130_br0500 article-title: Kubernetes architecture – volume: 15 start-page: 2046 issue: 4 year: 2013 ident: 10.1016/j.jpdc.2025.105130_br0180 article-title: A survey of defense mechanisms against distributed denial of service (ddos) flooding attacks publication-title: IEEE Commun. Surv. Tutor. doi: 10.1109/SURV.2013.031413.00127 – start-page: 1 year: 2016 ident: 10.1016/j.jpdc.2025.105130_br0200 article-title: A survey of distributed denial of service attack – start-page: 1 year: 2022 ident: 10.1016/j.jpdc.2025.105130_br0130 article-title: Kubernetes orchestration of high availability distributed control systems – start-page: 1 year: 2019 ident: 10.1016/j.jpdc.2025.105130_br0100 article-title: Server scalability using Kubernetes – start-page: 176 year: 2019 ident: 10.1016/j.jpdc.2025.105130_br0120 article-title: Microservice based architecture: towards high-availability for stateful applications with Kubernetes – volume: 8 start-page: 43920 year: 2020 ident: 10.1016/j.jpdc.2025.105130_br0270 article-title: Low-rate dos attacks, detection, defense, and challenges: a survey publication-title: IEEE Access doi: 10.1109/ACCESS.2020.2976609 – start-page: 41 year: 2009 ident: 10.1016/j.jpdc.2025.105130_br0330 article-title: Application performance isolation in virtualization – start-page: 1996 year: 2021 ident: 10.1016/j.jpdc.2025.105130_br0150 article-title: Containerization: cloud computing based inspiration technology for adoption through Docker and Kubernetes – start-page: 52 year: 2016 ident: 10.1016/j.jpdc.2025.105130_br0370 article-title: Using Docker in high performance computing applications – start-page: 74 year: 2020 ident: 10.1016/j.jpdc.2025.105130_br0140 article-title: High availability storage server with Kubernetes – volume: 49 start-page: 2722 issue: 4 year: 2022 ident: 10.1016/j.jpdc.2025.105130_br0310 article-title: Containerization for high performance computing systems: survey and prospects publication-title: IEEE Trans. Softw. Eng. doi: 10.1109/TSE.2022.3229221 – start-page: 1 year: 2022 ident: 10.1016/j.jpdc.2025.105130_br0090 article-title: Kubernetes in it administration and serverless computing: an empirical study and research challenges publication-title: J. Supercomput. – start-page: 192 year: 2016 ident: 10.1016/j.jpdc.2025.105130_br0350 article-title: Container-based cloud virtual machine benchmarking – volume: 5 start-page: 1 issue: OOPSLA year: 2021 ident: 10.1016/j.jpdc.2025.105130_br0530 article-title: Automatic migration from synchronous to asynchronous javascript apis publication-title: Proc. ACM Program. Lang. doi: 10.1145/3485537 – start-page: 1214 year: 2019 ident: 10.1016/j.jpdc.2025.105130_br0390 article-title: Security analysis and threats detection techniques on Docker container – volume: 21 start-page: 1910 issue: 5 year: 2021 ident: 10.1016/j.jpdc.2025.105130_br0110 article-title: Kubernetes cluster for automating software production environment publication-title: Sensors doi: 10.3390/s21051910 – year: 2024 ident: 10.1016/j.jpdc.2025.105130_br0220 – year: 2024 ident: 10.1016/j.jpdc.2025.105130_br0230 article-title: Flexible and lightweight mitigation framework for distributed denial-of-service attacks in container-based edge networks using Kubernetes publication-title: IEEE Access doi: 10.1109/ACCESS.2024.3501192 – start-page: 138 year: 2024 ident: 10.1016/j.jpdc.2025.105130_br0250 article-title: Image-processing workloads and ddos attack resilience: evaluating Docker and podman containers on raspberry pi and odroid – ident: 10.1016/j.jpdc.2025.105130_br0010 doi: 10.1016/j.compind.2019.01.006 – volume: 2 start-page: 153 year: 2021 ident: 10.1016/j.jpdc.2025.105130_br0300 article-title: Performance evaluation of containerization in edge-cloud computing stacks for industrial applications: a client perspective publication-title: IEEE Open J. Ind. Electron. Soc. doi: 10.1109/OJIES.2021.3055901 – volume: 29 start-page: 1385 issue: 6 year: 2018 ident: 10.1016/j.jpdc.2025.105130_br0340 article-title: Power-aware and performance-guaranteed virtual machine placement in the cloud publication-title: IEEE Trans. Parallel Distrib. Syst. doi: 10.1109/TPDS.2018.2794369 – ident: 10.1016/j.jpdc.2025.105130_br0490 – start-page: 199 year: 2007 ident: 10.1016/j.jpdc.2025.105130_br0160 article-title: Some trends in web application development – start-page: 5 year: 2017 ident: 10.1016/j.jpdc.2025.105130_br0320 article-title: Elastic provisioning of virtual machines for container deployment – start-page: 970 year: 2018 ident: 10.1016/j.jpdc.2025.105130_br0440 article-title: Deploying microservice based applications with Kubernetes: experiments and lessons learned – start-page: 0184 year: 2019 ident: 10.1016/j.jpdc.2025.105130_br0430 article-title: Building modern clouds: using Docker, Kubernetes & Google cloud platform – volume: 10 start-page: 1305 year: 2022 ident: 10.1016/j.jpdc.2025.105130_br0540 article-title: Continuous integration and deployment automation in aws cloud infrastructure publication-title: Int. J. Res. Appl. Sci. Eng. Technol. doi: 10.22214/ijraset.2022.44106 – start-page: 86 year: 2014 ident: 10.1016/j.jpdc.2025.105130_br0170 article-title: Web 1.0 to web 3.0-evolution of the web and its various challenges – volume: 119 start-page: 97 year: 2018 ident: 10.1016/j.jpdc.2025.105130_br0360 article-title: Application deployment using microservice and Docker containers: framework and optimization publication-title: J. Netw. Comput. Appl. doi: 10.1016/j.jnca.2018.07.003 – volume: 59 year: 2021 ident: 10.1016/j.jpdc.2025.105130_br0260 article-title: Serving while attacked: ddos attack effect minimization using page separation and container allocation strategy publication-title: J. Inf. Secur. Appl. – start-page: 398 year: 2018 ident: 10.1016/j.jpdc.2025.105130_br0030 article-title: Container-based performance evaluation: a survey and challenges – start-page: 28 year: 2019 ident: 10.1016/j.jpdc.2025.105130_br0060 article-title: Fastbuild: accelerating Docker image building for efficient development and deployment of container – start-page: 37 year: 2015 ident: 10.1016/j.jpdc.2025.105130_br0520 article-title: Performance comparison of web servers with different architectures: a case study using high concurrency workload – start-page: 1689 year: 2021 ident: 10.1016/j.jpdc.2025.105130_br0480 article-title: Mitigating security attacks in Kubernetes manifests for security best practices violation – start-page: 2019 year: 2019 ident: 10.1016/j.jpdc.2025.105130_br0210 article-title: Review of recent detection methods for http ddos attack publication-title: J. Comput. Netw. Commun. – volume: 171 start-page: 1419 year: 2020 ident: 10.1016/j.jpdc.2025.105130_br0080 article-title: Performance evaluation of Docker container and virtual machine publication-title: Proc. Comput. Sci. doi: 10.1016/j.procs.2020.04.152 – volume: 49 start-page: 71 issue: 1 year: 2015 ident: 10.1016/j.jpdc.2025.105130_br0050 article-title: An introduction to Docker for reproducible research publication-title: Oper. Syst. Rev. doi: 10.1145/2723872.2723882 |
SSID | ssj0011578 |
Score | 2.4242122 |
Snippet | Containerization has become the primary method for deploying applications, with web services being the most prevalent. However, exposing server IP addresses to... |
SourceID | crossref elsevier |
SourceType | Index Database Publisher |
StartPage | 105130 |
SubjectTerms | Containerization DDoS attacks and defenses Docker Kubernetes Web services security |
Title | Mitigating DDoS attacks in containerized environments: A comparative analysis of Docker and Kubernetes |
URI | https://dx.doi.org/10.1016/j.jpdc.2025.105130 |
Volume | 204 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV09T8MwELWqsrDwjSgflQc2FJrEcRyzVS1VoWqXUqlb5PgDpUhpVaULA78dX-NAkRADY6I4iV6cu7P13juEblnix4rFkSdjZhcoMlCeEKHxjOKaU66Yv1W5jifxcBY9z-m8gXq1FgZolS72VzF9G63dmY5Ds7PK884Ukh8j0L-nUiOAgj1iMMvvP75oHuAlk9RWnHC1E85UHK_FSoGNYUih3W0ATOjfktNOwhkcoQNXKeJu9TLHqKGLE3RYd2HA7qc8RWacVz4ZxSvu95dTLMoShPM4LzAQ0QXI-_J3rfCuqO0Bd7H8dv7GwpmT4KXBNvG82SeIQuHRJtPrAjZnz9Bs8PjSG3que4InQ0pKT3HBmM01nCpqAhXLjPMM6h3fgMc7UVlGhF3tEB3bGoMZEkouqZQkTDQXcUbOUbNYFvoCYW3sOsuXRNh7RJSphETE902ihVBhIoIWuqthS1eVSUZas8cWKYCcAshpBXIL0RrZ9MenTm0U_2Pc5T_HXaF9OKoYeNeoWa43-sZWEmXW3k6VNtrrPo2Gk094n8gy |
linkProvider | Elsevier |
linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV27TsMwFLVKGWDhjShPD2woNInjOGZDLVWhj6Wt1C1y_EApUlpV6cLAt-PbJFAkxMCaxEl0Et97bZ1zLkK3LHJDxcLAkSGzCxTpKUcI3zhGcc0pV8xdq1wHw7A7CV6mdFpDrUoLA7TKMvYXMX0drcsjzRLN5iJNmyNIfoxA_55CjbCFtgM7faGNwf3HF88DzGSiyosTLi-VMwXJa7ZQ4GPoU-h36wEV-rfstJFxOgdorywV8WPxNoeoprMjtF-1YcDlrDxGZpAWRhnZK2635yMs8hyU8zjNMDDRBej70net8Kaq7QE_Yvlt_Y1F6U6C5wbbzPNmnyAyhXurRC8z2J09QZPO07jVdcr2CY70KckdxQVjNtlwqqjxVCgTzhMoeFwDJu9EJQkRdrlDdGiLDGaIL7mkUhI_0lyECTlF9Wye6TOEtbELLVcSYe8RUKYiEhDXNZEWQvmR8BroroItXhQuGXFFH5vFAHIMIMcFyA1EK2TjH986tmH8j3Hn_xx3g3a640E_7j8PexdoF84UdLxLVM-XK31ly4o8uV7_Np9DO8nA |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Mitigating+DDoS+attacks+in+containerized+environments%3A+A+comparative+analysis+of+Docker+and+Kubernetes&rft.jtitle=Journal+of+parallel+and+distributed+computing&rft.au=Chuang%2C+Yung-Ting&rft.au=Tu%2C+Chih-Han&rft.date=2025-10-01&rft.issn=0743-7315&rft.volume=204&rft.spage=105130&rft_id=info:doi/10.1016%2Fj.jpdc.2025.105130&rft.externalDBID=n%2Fa&rft.externalDocID=10_1016_j_jpdc_2025_105130 |
thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=0743-7315&client=summon |
thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=0743-7315&client=summon |
thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=0743-7315&client=summon |