Can We Beat DDoS Attacks in Clouds?
Cloud is becoming a dominant computing platform. Naturally, a question that arises is whether we can beat notorious DDoS attacks in a cloud environment. Researchers have demonstrated that the essential issue of DDoS attack and defense is resource competition between defenders and attackers. A cloud...
Saved in:
Published in | IEEE transactions on parallel and distributed systems Vol. 25; no. 9; pp. 2245 - 2254 |
---|---|
Main Authors | , , , |
Format | Journal Article |
Language | English |
Published |
New York
IEEE
01.09.2014
The Institute of Electrical and Electronics Engineers, Inc. (IEEE) |
Subjects | |
Online Access | Get full text |
Cover
Loading…
Abstract | Cloud is becoming a dominant computing platform. Naturally, a question that arises is whether we can beat notorious DDoS attacks in a cloud environment. Researchers have demonstrated that the essential issue of DDoS attack and defense is resource competition between defenders and attackers. A cloud usually possesses profound resources and has full control and dynamic allocation capability of its resources. Therefore, cloud offers us the potential to overcome DDoS attacks. However, individual cloud hosted servers are still vulnerable to DDoS attacks if they still run in the traditional way. In this paper, we propose a dynamic resource allocation strategy to counter DDoS attacks against individual cloud customers. When a DDoS attack occurs, we employ the idle resources of the cloud to clone sufficient intrusion prevention servers for the victim in order to quickly filter out attack packets and guarantee the quality of the service for benign users simultaneously. We establish a mathematical model to approximate the needs of our resource investment based on queueing theory. Through careful system analysis and real-world data set experiments, we conclude that we can defeat DDoS attacks in a cloud environment. |
---|---|
AbstractList | Cloud is becoming a dominant computing platform. Naturally, a question that arises is whether we can beat notorious DDoS attacks in a cloud environment. Researchers have demonstrated that the essential issue of DDoS attack and defense is resource competition between defenders and attackers. A cloud usually possesses profound resources and has full control and dynamic allocation capability of its resources. Therefore, cloud offers us the potential to overcome DDoS attacks. However, individual cloud hosted servers are still vulnerable to DDoS attacks if they still run in the traditional way. In this paper, we propose a dynamic resource allocation strategy to counter DDoS attacks against individual cloud customers. When a DDoS attack occurs, we employ the idle resources of the cloud to clone sufficient intrusion prevention servers for the victim in order to quickly filter out attack packets and guarantee the quality of the service for benign users simultaneously. We establish a mathematical model to approximate the needs of our resource investment based on queueing theory. Through careful system analysis and real-world data set experiments, we conclude that we can defeat DDoS attacks in a cloud environment. |
Author | Wu, Dapeng Oliver Yonghong Tian Song Guo Shui Yu |
Author_xml | – sequence: 1 surname: Shui Yu fullname: Shui Yu email: syu@deakin.edu.au organization: Sch. of IT, Deakin Univ., Geelong, VIC, Australia – sequence: 2 surname: Yonghong Tian fullname: Yonghong Tian email: yhtian@pku.edu.cn organization: Sch. of EECS, Peking Univ., Beijing, China – sequence: 3 surname: Song Guo fullname: Song Guo email: sguo@u-aizu.ac.jp organization: Sch. of CSE, Univ. of Aizu, Aizu-Wakamatsu, Japan – sequence: 4 givenname: Dapeng Oliver surname: Wu fullname: Wu, Dapeng Oliver email: wu@ece.ufl.edu organization: Dept. of ECE, Univ. of Florida, Gainesville, FL, USA |
BookMark | eNp10M9LwzAUB_AgE9ymR09eCrt46XyvaZrkJLPzFwwUNvEY0jaFzq6ZTXrwvzdj4kHw9N7h8x5fvhMy6mxnCLlEmCOCvNm8LtfzBJDOUeAJGSNjIk5Q0FHYIWWxTFCekYlzWwBMGaRjMst1F72b6M5oHy2Xdh0tvNflh4uaLspbO1Tu9pyc1rp15uJnTsnbw_0mf4pXL4_P-WIVl1SkPpZYaMYzzXVaJ1kmKDOVFBUrqKQgNCSG6ww4TwteUKiAa5SlRJYBFbUpKZ2S6-PffW8_B-O82jWuNG2rO2MHpwLliCx8C3T2h27t0HchXVCMJpImkAZFj6rsrXO9qVXZeO0b2_leN61CUIfi1KE4dShOheLCVfznat83O91__euvjr4xxvzaLIQVIes3qmV1CQ |
CODEN | ITDSEO |
CitedBy_id | crossref_primary_10_1016_j_asej_2024_102860 crossref_primary_10_1109_TNSE_2020_2981449 crossref_primary_10_1080_13614576_2019_1611468 crossref_primary_10_1007_s12652_018_0800_9 crossref_primary_10_1007_s10586_019_02994_2 crossref_primary_10_1016_j_comcom_2017_03_010 crossref_primary_10_1109_TBDATA_2017_2707552 crossref_primary_10_1007_s00500_018_3407_3 crossref_primary_10_1109_TC_2015_2439287 crossref_primary_10_1109_JIOT_2019_2959025 crossref_primary_10_1016_j_cose_2020_102008 crossref_primary_10_1007_s10479_020_03700_x crossref_primary_10_1016_j_jnca_2016_01_001 crossref_primary_10_1109_COMST_2015_2487361 crossref_primary_10_1016_j_comnet_2016_03_022 crossref_primary_10_1109_TPDS_2019_2942591 crossref_primary_10_1016_j_cosrev_2019_05_002 crossref_primary_10_1155_2016_1075648 crossref_primary_10_26599_TST_2024_9010061 crossref_primary_10_1109_TCC_2020_3000674 crossref_primary_10_1002_cpe_5279 crossref_primary_10_1016_j_future_2017_09_020 crossref_primary_10_1016_j_ins_2019_01_051 crossref_primary_10_1109_LNET_2023_3264827 crossref_primary_10_1109_MCC_2016_94 crossref_primary_10_1109_ACCESS_2019_2908998 crossref_primary_10_1109_COMST_2019_2934468 crossref_primary_10_1007_s10586_018_2365_y crossref_primary_10_1109_MCOM_2018_1701204 crossref_primary_10_1109_TDSC_2020_3011525 crossref_primary_10_3233_IDA_215955 crossref_primary_10_1007_s00521_019_04473_6 crossref_primary_10_1109_TIFS_2018_2809679 crossref_primary_10_1016_j_ins_2018_12_051 crossref_primary_10_1016_j_compeleceng_2016_12_004 crossref_primary_10_1109_TNSM_2018_2800007 crossref_primary_10_1007_s12243_016_0552_5 crossref_primary_10_1109_JIOT_2019_2956173 crossref_primary_10_1109_TIFS_2024_3516560 crossref_primary_10_1109_ACCESS_2018_2853634 crossref_primary_10_1016_j_jisa_2021_102818 crossref_primary_10_1109_TC_2021_3077687 crossref_primary_10_1177_1550147717741463 crossref_primary_10_3233_MGS_190305 crossref_primary_10_1016_j_ins_2022_12_068 crossref_primary_10_1109_MCC_2017_14 crossref_primary_10_1109_TDSC_2017_2763160 crossref_primary_10_1109_ACCESS_2021_3109490 crossref_primary_10_1088_1742_6596_1237_3_032040 crossref_primary_10_1109_TDSC_2022_3151462 crossref_primary_10_1002_smr_2489 crossref_primary_10_1016_j_jnca_2019_102479 crossref_primary_10_1109_TDSC_2024_3428549 crossref_primary_10_1109_TNSM_2018_2822668 crossref_primary_10_1016_j_jisa_2023_103435 crossref_primary_10_1145_3179409 crossref_primary_10_1016_j_cose_2023_103511 crossref_primary_10_1109_COMST_2017_2659646 crossref_primary_10_1016_j_psep_2021_03_004 crossref_primary_10_1109_ACCESS_2017_2756826 crossref_primary_10_1016_j_future_2017_04_023 crossref_primary_10_1109_JSYST_2022_3207019 crossref_primary_10_1002_sec_1709 crossref_primary_10_1109_TNSM_2024_3451613 crossref_primary_10_1016_j_jestch_2021_09_011 crossref_primary_10_1109_TNSM_2019_2920824 crossref_primary_10_1016_j_jnca_2015_09_005 crossref_primary_10_1007_s10586_018_2181_4 crossref_primary_10_1002_ett_4934 crossref_primary_10_1007_s11276_021_02604_3 crossref_primary_10_1007_s11227_018_2323_8 crossref_primary_10_1016_j_eswa_2015_07_027 crossref_primary_10_1109_TPDS_2014_2314672 crossref_primary_10_1155_2022_2223050 crossref_primary_10_1016_j_ins_2022_06_024 crossref_primary_10_1007_s13369_016_2210_7 crossref_primary_10_1016_j_jnca_2016_04_012 crossref_primary_10_1109_COMST_2020_3045136 crossref_primary_10_1109_ACCESS_2016_2621770 crossref_primary_10_1109_ACCESS_2020_2967478 crossref_primary_10_1016_j_jnca_2020_102803 crossref_primary_10_1109_TIFS_2021_3127009 crossref_primary_10_1109_TSC_2016_2602861 crossref_primary_10_1109_LNET_2024_3383601 crossref_primary_10_1007_s42044_019_00039_w crossref_primary_10_1109_TII_2019_2925035 crossref_primary_10_1080_23742917_2017_1384213 crossref_primary_10_3233_MGS_170262 crossref_primary_10_1007_s10922_023_09776_7 crossref_primary_10_1016_j_cosrev_2024_100661 crossref_primary_10_1016_j_asoc_2020_106997 crossref_primary_10_1109_ACCESS_2020_3041641 crossref_primary_10_1016_j_compeleceng_2022_107955 crossref_primary_10_1109_COMST_2016_2610963 crossref_primary_10_1109_TCC_2024_3480194 crossref_primary_10_1109_JIOT_2022_3176121 crossref_primary_10_1109_JSYST_2020_3005201 crossref_primary_10_1016_j_jnca_2024_103946 crossref_primary_10_1109_ACCESS_2019_2922196 crossref_primary_10_1109_JIOT_2021_3065680 crossref_primary_10_1109_TDSC_2021_3055559 crossref_primary_10_1109_MITP_2023_3273295 crossref_primary_10_1109_TII_2021_3088938 crossref_primary_10_3390_e19120649 crossref_primary_10_1007_s10586_019_03031_y crossref_primary_10_1007_s10586_020_03120_3 crossref_primary_10_1016_j_comnet_2022_109555 crossref_primary_10_1016_j_comcom_2019_07_002 crossref_primary_10_1186_s13677_018_0109_4 crossref_primary_10_3390_fi9030043 crossref_primary_10_1002_nem_2094 crossref_primary_10_1007_s11042_017_4742_6 crossref_primary_10_1016_j_compeleceng_2018_02_026 |
Cites_doi | 10.1109/UCC.2011.17 10.1109/MITP.2012.43 10.1016/j.jnca.2010.07.006 10.1109/TPDS.2012.182 10.1109/TSC.2011.44 10.1007/s11134-009-9147-4 10.1109/TNET.2004.842221 10.1109/TPDS.2007.1111 10.1109/INFCOM.2012.6195783 10.1109/INFCOM.2012.6195714 10.1109/CloudCom.2010.73 10.1109/TPDS.2011.199 10.1109/TNET.2012.2194508 10.1145/1216370.1216373 10.1109/INFCOM.2012.6195844 10.1109/MNET.2011.5958005 10.1145/1132026.1132027 10.1109/TSC.2011.7 10.1109/MC.2012.120 10.1109/TPDS.2012.318 10.1109/INFCOM.2012.6195556 10.1109/TPDS.2012.203 10.1109/NOMS.2010.5488345 10.1109/INFCOM.2011.5935302 |
ContentType | Journal Article |
Copyright | Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) Sep 2014 |
Copyright_xml | – notice: Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) Sep 2014 |
DBID | 97E RIA RIE AAYXX CITATION 7SC 7SP 8FD JQ2 L7M L~C L~D F28 FR3 |
DOI | 10.1109/TPDS.2013.181 |
DatabaseName | IEEE All-Society Periodicals Package (ASPP) 2005–Present IEEE All-Society Periodicals Package (ASPP) 1998–Present IEEE Electronic Library (IEL) CrossRef Computer and Information Systems Abstracts Electronics & Communications Abstracts Technology Research Database ProQuest Computer Science Collection Advanced Technologies Database with Aerospace Computer and Information Systems Abstracts Academic Computer and Information Systems Abstracts Professional ANTE: Abstracts in New Technology & Engineering Engineering Research Database |
DatabaseTitle | CrossRef Technology Research Database Computer and Information Systems Abstracts – Academic Electronics & Communications Abstracts ProQuest Computer Science Collection Computer and Information Systems Abstracts Advanced Technologies Database with Aerospace Computer and Information Systems Abstracts Professional Engineering Research Database ANTE: Abstracts in New Technology & Engineering |
DatabaseTitleList | Technology Research Database Technology Research Database |
Database_xml | – sequence: 1 dbid: RIE name: IEEE/IET Electronic Library url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/ sourceTypes: Publisher |
DeliveryMethod | fulltext_linktorsrc |
Discipline | Engineering Computer Science |
EISSN | 1558-2183 |
EndPage | 2254 |
ExternalDocumentID | 3403212381 10_1109_TPDS_2013_181 6567859 |
Genre | orig-research |
GroupedDBID | --Z -~X .DC 0R~ 29I 4.4 5GY 5VS 6IK 97E AAJGR AARMG AASAJ AAWTH ABAZT ABFSI ABQJQ ABVLG ACGFO ACIWK AENEX AETIX AGQYO AGSQL AHBIQ AI. AIBXA AKJIK AKQYR ALLEH ALMA_UNASSIGNED_HOLDINGS ASUFR ATWAV BEFXN BFFAM BGNUA BKEBE BPEOZ CS3 DU5 E.L EBS EJD HZ~ H~9 ICLAB IEDLZ IFIPE IFJZH IPLJI JAVBF LAI M43 MS~ O9- OCL P2P PQQKQ RIA RIE RNI RNS RZB TN5 TWZ UHB VH1 AAYOK AAYXX CITATION RIG 7SC 7SP 8FD JQ2 L7M L~C L~D F28 FR3 |
ID | FETCH-LOGICAL-c384t-91ba576a7a4f266835ed98d5b39308a02e7a60774b7b30d07a19c9156038fec33 |
IEDL.DBID | RIE |
ISSN | 1045-9219 |
IngestDate | Sun Aug 24 03:28:47 EDT 2025 Mon Jun 30 06:43:04 EDT 2025 Thu Apr 24 23:13:02 EDT 2025 Tue Jul 01 02:18:10 EDT 2025 Wed Aug 27 02:52:30 EDT 2025 |
IsPeerReviewed | true |
IsScholarly | true |
Issue | 9 |
Language | English |
License | https://ieeexplore.ieee.org/Xplorehelp/downloads/license-information/IEEE.html |
LinkModel | DirectLink |
MergedId | FETCHMERGED-LOGICAL-c384t-91ba576a7a4f266835ed98d5b39308a02e7a60774b7b30d07a19c9156038fec33 |
Notes | ObjectType-Article-1 SourceType-Scholarly Journals-1 ObjectType-Feature-2 content type line 14 ObjectType-Article-2 ObjectType-Feature-1 content type line 23 |
PQID | 1553293204 |
PQPubID | 85437 |
PageCount | 10 |
ParticipantIDs | ieee_primary_6567859 proquest_journals_1553293204 crossref_citationtrail_10_1109_TPDS_2013_181 crossref_primary_10_1109_TPDS_2013_181 proquest_miscellaneous_1567115930 |
ProviderPackageCode | CITATION AAYXX |
PublicationCentury | 2000 |
PublicationDate | 2014-09-01 |
PublicationDateYYYYMMDD | 2014-09-01 |
PublicationDate_xml | – month: 09 year: 2014 text: 2014-09-01 day: 01 |
PublicationDecade | 2010 |
PublicationPlace | New York |
PublicationPlace_xml | – name: New York |
PublicationTitle | IEEE transactions on parallel and distributed systems |
PublicationTitleAbbrev | TPDS |
PublicationYear | 2014 |
Publisher | IEEE The Institute of Electrical and Electronics Engineers, Inc. (IEEE) |
Publisher_xml | – name: IEEE – name: The Institute of Electrical and Electronics Engineers, Inc. (IEEE) |
References | ref13 ref12 ref15 ref14 ref11 ref10 ref2 ref17 ref16 ref19 ref18 bhadauria (ref4) 2011; abs 1109 5388 rajab (ref6) 2007 armbrust (ref1) 2009 ref24 ref23 ref26 ref25 ref20 ref22 ref21 ref28 ref8 (ref29) 0 ref7 dagon (ref30) 2006 ref9 ref3 ref5 kleinrock (ref27) 1975; i |
References_xml | – ident: ref13 doi: 10.1109/UCC.2011.17 – ident: ref12 doi: 10.1109/MITP.2012.43 – ident: ref3 doi: 10.1016/j.jnca.2010.07.006 – ident: ref24 doi: 10.1109/TPDS.2012.182 – ident: ref15 doi: 10.1109/TSC.2011.44 – ident: ref26 doi: 10.1007/s11134-009-9147-4 – volume: abs 1109 5388 year: 2011 ident: ref4 article-title: A Survey on Security Issues in Cloud Computing publication-title: CoRR – ident: ref7 doi: 10.1109/TNET.2004.842221 – ident: ref9 doi: 10.1109/TPDS.2007.1111 – ident: ref17 doi: 10.1109/INFCOM.2012.6195783 – ident: ref8 doi: 10.1109/INFCOM.2012.6195714 – start-page: 1 year: 2006 ident: ref30 article-title: Modeling Botnet Propagation using Time Zones publication-title: Proc 13th NDSS – ident: ref21 doi: 10.1109/CloudCom.2010.73 – ident: ref23 doi: 10.1109/TPDS.2011.199 – ident: ref10 doi: 10.1109/TNET.2012.2194508 – ident: ref5 doi: 10.1145/1216370.1216373 – ident: ref14 doi: 10.1109/INFCOM.2012.6195844 – start-page: 5 year: 2007 ident: ref6 article-title: My Botnet is Bigger Than Yours (Maybe, Better Than Yours): Why Size Estimates Remain Challenging publication-title: Proc 1st Conf HotBots – volume: i year: 1975 ident: ref27 publication-title: Queueing Systems – ident: ref18 doi: 10.1109/MNET.2011.5958005 – ident: ref28 doi: 10.1145/1132026.1132027 – year: 2009 ident: ref1 publication-title: Above the Clouds A Berkeley View of Cloud Computing – ident: ref11 doi: 10.1109/TSC.2011.7 – ident: ref20 doi: 10.1109/MC.2012.120 – ident: ref25 doi: 10.1109/TPDS.2012.318 – ident: ref2 doi: 10.1109/INFCOM.2012.6195556 – year: 0 ident: ref29 – ident: ref16 doi: 10.1109/TPDS.2012.203 – ident: ref19 doi: 10.1109/NOMS.2010.5488345 – ident: ref22 doi: 10.1109/INFCOM.2011.5935302 |
SSID | ssj0014504 |
Score | 2.5212915 |
Snippet | Cloud is becoming a dominant computing platform. Naturally, a question that arises is whether we can beat notorious DDoS attacks in a cloud environment.... |
SourceID | proquest crossref ieee |
SourceType | Aggregation Database Enrichment Source Index Database Publisher |
StartPage | 2245 |
SubjectTerms | Analytical models Cloud computing Computer crime Computer networks DDoS attacks Denial of service attacks Dynamics Financing Mathematical model Mathematical models mitigation Quality of service Queueing analysis resource investment Resource scheduling Servers system modelling |
Title | Can We Beat DDoS Attacks in Clouds? |
URI | https://ieeexplore.ieee.org/document/6567859 https://www.proquest.com/docview/1553293204 https://www.proquest.com/docview/1567115930 |
Volume | 25 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV3fS8MwED7mnvTB6aY4nRJRfFq3dmnX5knm5hjCRNiGeytJmoI4WnHti3-9l7arv8G3Qo82zeUu3zV39wFccinR6fW4QZkSGKBQyxC9wDWkyxxHho6kGZ3P9L4_Wdh3S2dZgXZZC6OUypLPVEdfZmf5QSxT_ausi9jD9Ry2BVsYuOW1WuWJge1kVIEYXTgGQzP86KfZnT-MZjqJi3Ysz_qy_2SEKj-8cLa1jGsw3Qwqzyh57qSJ6Mi3b_0a_zvqPdgtMCYZ5ItiHyoqqkNtw99ACnOuw86nZoQNuBjyiDwqcoPemYxG8YwMkkRX4JOniAxXcRqsrw9gMb6dDydGQaFgSOrZCboywTGi4C63Q9yKEW6pgHmBIyijpsfNnnJ530QIKFxBzcB0ucUk09XV1AsVKuoQqlEcqSMgwrR4P5CcIkiwBcfQJ9Q86lIKRBhe4DWhvZlYXxb9xTXNxcrP4gyT-VoPvtaDj3powlUp_pI31vhLsKHntBQqprMJrY3W_MLs1r4mQUL80jPtJpyXt9Fg9CkIj1Scapm-izAYv__49yefwDa-284TyVpQTV5TdYrIIxFn2ZJ7B-JU0W8 |
linkProvider | IEEE |
linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1LT8MwDLbGOAAH3ojxDAJxolvbNGtzQmMDjccQEkNwq5I0kxBTi6C98Otx2q68JW6ValVpXNufG9sfwIFQCp2eKyzKtcQEhTqWdCPfUj5nTI2Yojmdz-C63b_zLh7YQw2Oql4YrXVefKab5jI_y48SlZlfZS3EHn7A-BRMY9xnbtGtVZ0ZeCwnC8T8glkcDfFjomZreNO7NWVctOkEzpcIlFOq_PDDeXA5W4DBZFlFTclTM0tlU719m9j433UvwnyJMkmn-CyWoKbjZViYMDiQ0qCXYe7TOMIV2O-KmNxrcoL-mfR6yS3ppKnpwSePMemOkyx6PV6Fu7PTYbdvlSQKlqKBl6IzkwJzCuELb4TBGAGXjngQMUk5tQNhu9oXbRtBoPQltSPbFw5X3PRX02CkUVVrUI-TWK8DkbYj2pESFGGCJwUmPyPDpK6URIwRREEDjiYbG6pywrghuhiHeaZh89DoITR6CFEPDTisxJ-L0Rp_Ca6YPa2Eyu1swNZEa2FpeK-hoUFCBOPaXgP2qttoMuYcRMQ6yYxM20cgjO-_8fuTd2GmPxxchVfn15ebMIvr8Iqysi2opy-Z3kYcksqd_PN7BwCv1Lk |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Can+We+Beat+DDoS+Attacks+in+Clouds%3F&rft.jtitle=IEEE+transactions+on+parallel+and+distributed+systems&rft.au=Yu%2C+Shui&rft.au=Tian%2C+Yonghong&rft.au=Guo%2C+Song&rft.au=Wu%2C+Dapeng+Oliver&rft.date=2014-09-01&rft.issn=1045-9219&rft.volume=25&rft.issue=9&rft.spage=2245&rft.epage=2254&rft_id=info:doi/10.1109%2FTPDS.2013.181&rft.externalDBID=n%2Fa&rft.externalDocID=10_1109_TPDS_2013_181 |
thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1045-9219&client=summon |
thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1045-9219&client=summon |
thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1045-9219&client=summon |