Can We Beat DDoS Attacks in Clouds?

Cloud is becoming a dominant computing platform. Naturally, a question that arises is whether we can beat notorious DDoS attacks in a cloud environment. Researchers have demonstrated that the essential issue of DDoS attack and defense is resource competition between defenders and attackers. A cloud...

Full description

Saved in:
Bibliographic Details
Published inIEEE transactions on parallel and distributed systems Vol. 25; no. 9; pp. 2245 - 2254
Main Authors Shui Yu, Yonghong Tian, Song Guo, Wu, Dapeng Oliver
Format Journal Article
LanguageEnglish
Published New York IEEE 01.09.2014
The Institute of Electrical and Electronics Engineers, Inc. (IEEE)
Subjects
Online AccessGet full text

Cover

Loading…
Abstract Cloud is becoming a dominant computing platform. Naturally, a question that arises is whether we can beat notorious DDoS attacks in a cloud environment. Researchers have demonstrated that the essential issue of DDoS attack and defense is resource competition between defenders and attackers. A cloud usually possesses profound resources and has full control and dynamic allocation capability of its resources. Therefore, cloud offers us the potential to overcome DDoS attacks. However, individual cloud hosted servers are still vulnerable to DDoS attacks if they still run in the traditional way. In this paper, we propose a dynamic resource allocation strategy to counter DDoS attacks against individual cloud customers. When a DDoS attack occurs, we employ the idle resources of the cloud to clone sufficient intrusion prevention servers for the victim in order to quickly filter out attack packets and guarantee the quality of the service for benign users simultaneously. We establish a mathematical model to approximate the needs of our resource investment based on queueing theory. Through careful system analysis and real-world data set experiments, we conclude that we can defeat DDoS attacks in a cloud environment.
AbstractList Cloud is becoming a dominant computing platform. Naturally, a question that arises is whether we can beat notorious DDoS attacks in a cloud environment. Researchers have demonstrated that the essential issue of DDoS attack and defense is resource competition between defenders and attackers. A cloud usually possesses profound resources and has full control and dynamic allocation capability of its resources. Therefore, cloud offers us the potential to overcome DDoS attacks. However, individual cloud hosted servers are still vulnerable to DDoS attacks if they still run in the traditional way. In this paper, we propose a dynamic resource allocation strategy to counter DDoS attacks against individual cloud customers. When a DDoS attack occurs, we employ the idle resources of the cloud to clone sufficient intrusion prevention servers for the victim in order to quickly filter out attack packets and guarantee the quality of the service for benign users simultaneously. We establish a mathematical model to approximate the needs of our resource investment based on queueing theory. Through careful system analysis and real-world data set experiments, we conclude that we can defeat DDoS attacks in a cloud environment.
Author Wu, Dapeng Oliver
Yonghong Tian
Song Guo
Shui Yu
Author_xml – sequence: 1
  surname: Shui Yu
  fullname: Shui Yu
  email: syu@deakin.edu.au
  organization: Sch. of IT, Deakin Univ., Geelong, VIC, Australia
– sequence: 2
  surname: Yonghong Tian
  fullname: Yonghong Tian
  email: yhtian@pku.edu.cn
  organization: Sch. of EECS, Peking Univ., Beijing, China
– sequence: 3
  surname: Song Guo
  fullname: Song Guo
  email: sguo@u-aizu.ac.jp
  organization: Sch. of CSE, Univ. of Aizu, Aizu-Wakamatsu, Japan
– sequence: 4
  givenname: Dapeng Oliver
  surname: Wu
  fullname: Wu, Dapeng Oliver
  email: wu@ece.ufl.edu
  organization: Dept. of ECE, Univ. of Florida, Gainesville, FL, USA
BookMark eNp10M9LwzAUB_AgE9ymR09eCrt46XyvaZrkJLPzFwwUNvEY0jaFzq6ZTXrwvzdj4kHw9N7h8x5fvhMy6mxnCLlEmCOCvNm8LtfzBJDOUeAJGSNjIk5Q0FHYIWWxTFCekYlzWwBMGaRjMst1F72b6M5oHy2Xdh0tvNflh4uaLspbO1Tu9pyc1rp15uJnTsnbw_0mf4pXL4_P-WIVl1SkPpZYaMYzzXVaJ1kmKDOVFBUrqKQgNCSG6ww4TwteUKiAa5SlRJYBFbUpKZ2S6-PffW8_B-O82jWuNG2rO2MHpwLliCx8C3T2h27t0HchXVCMJpImkAZFj6rsrXO9qVXZeO0b2_leN61CUIfi1KE4dShOheLCVfznat83O91__euvjr4xxvzaLIQVIes3qmV1CQ
CODEN ITDSEO
CitedBy_id crossref_primary_10_1016_j_asej_2024_102860
crossref_primary_10_1109_TNSE_2020_2981449
crossref_primary_10_1080_13614576_2019_1611468
crossref_primary_10_1007_s12652_018_0800_9
crossref_primary_10_1007_s10586_019_02994_2
crossref_primary_10_1016_j_comcom_2017_03_010
crossref_primary_10_1109_TBDATA_2017_2707552
crossref_primary_10_1007_s00500_018_3407_3
crossref_primary_10_1109_TC_2015_2439287
crossref_primary_10_1109_JIOT_2019_2959025
crossref_primary_10_1016_j_cose_2020_102008
crossref_primary_10_1007_s10479_020_03700_x
crossref_primary_10_1016_j_jnca_2016_01_001
crossref_primary_10_1109_COMST_2015_2487361
crossref_primary_10_1016_j_comnet_2016_03_022
crossref_primary_10_1109_TPDS_2019_2942591
crossref_primary_10_1016_j_cosrev_2019_05_002
crossref_primary_10_1155_2016_1075648
crossref_primary_10_26599_TST_2024_9010061
crossref_primary_10_1109_TCC_2020_3000674
crossref_primary_10_1002_cpe_5279
crossref_primary_10_1016_j_future_2017_09_020
crossref_primary_10_1016_j_ins_2019_01_051
crossref_primary_10_1109_LNET_2023_3264827
crossref_primary_10_1109_MCC_2016_94
crossref_primary_10_1109_ACCESS_2019_2908998
crossref_primary_10_1109_COMST_2019_2934468
crossref_primary_10_1007_s10586_018_2365_y
crossref_primary_10_1109_MCOM_2018_1701204
crossref_primary_10_1109_TDSC_2020_3011525
crossref_primary_10_3233_IDA_215955
crossref_primary_10_1007_s00521_019_04473_6
crossref_primary_10_1109_TIFS_2018_2809679
crossref_primary_10_1016_j_ins_2018_12_051
crossref_primary_10_1016_j_compeleceng_2016_12_004
crossref_primary_10_1109_TNSM_2018_2800007
crossref_primary_10_1007_s12243_016_0552_5
crossref_primary_10_1109_JIOT_2019_2956173
crossref_primary_10_1109_TIFS_2024_3516560
crossref_primary_10_1109_ACCESS_2018_2853634
crossref_primary_10_1016_j_jisa_2021_102818
crossref_primary_10_1109_TC_2021_3077687
crossref_primary_10_1177_1550147717741463
crossref_primary_10_3233_MGS_190305
crossref_primary_10_1016_j_ins_2022_12_068
crossref_primary_10_1109_MCC_2017_14
crossref_primary_10_1109_TDSC_2017_2763160
crossref_primary_10_1109_ACCESS_2021_3109490
crossref_primary_10_1088_1742_6596_1237_3_032040
crossref_primary_10_1109_TDSC_2022_3151462
crossref_primary_10_1002_smr_2489
crossref_primary_10_1016_j_jnca_2019_102479
crossref_primary_10_1109_TDSC_2024_3428549
crossref_primary_10_1109_TNSM_2018_2822668
crossref_primary_10_1016_j_jisa_2023_103435
crossref_primary_10_1145_3179409
crossref_primary_10_1016_j_cose_2023_103511
crossref_primary_10_1109_COMST_2017_2659646
crossref_primary_10_1016_j_psep_2021_03_004
crossref_primary_10_1109_ACCESS_2017_2756826
crossref_primary_10_1016_j_future_2017_04_023
crossref_primary_10_1109_JSYST_2022_3207019
crossref_primary_10_1002_sec_1709
crossref_primary_10_1109_TNSM_2024_3451613
crossref_primary_10_1016_j_jestch_2021_09_011
crossref_primary_10_1109_TNSM_2019_2920824
crossref_primary_10_1016_j_jnca_2015_09_005
crossref_primary_10_1007_s10586_018_2181_4
crossref_primary_10_1002_ett_4934
crossref_primary_10_1007_s11276_021_02604_3
crossref_primary_10_1007_s11227_018_2323_8
crossref_primary_10_1016_j_eswa_2015_07_027
crossref_primary_10_1109_TPDS_2014_2314672
crossref_primary_10_1155_2022_2223050
crossref_primary_10_1016_j_ins_2022_06_024
crossref_primary_10_1007_s13369_016_2210_7
crossref_primary_10_1016_j_jnca_2016_04_012
crossref_primary_10_1109_COMST_2020_3045136
crossref_primary_10_1109_ACCESS_2016_2621770
crossref_primary_10_1109_ACCESS_2020_2967478
crossref_primary_10_1016_j_jnca_2020_102803
crossref_primary_10_1109_TIFS_2021_3127009
crossref_primary_10_1109_TSC_2016_2602861
crossref_primary_10_1109_LNET_2024_3383601
crossref_primary_10_1007_s42044_019_00039_w
crossref_primary_10_1109_TII_2019_2925035
crossref_primary_10_1080_23742917_2017_1384213
crossref_primary_10_3233_MGS_170262
crossref_primary_10_1007_s10922_023_09776_7
crossref_primary_10_1016_j_cosrev_2024_100661
crossref_primary_10_1016_j_asoc_2020_106997
crossref_primary_10_1109_ACCESS_2020_3041641
crossref_primary_10_1016_j_compeleceng_2022_107955
crossref_primary_10_1109_COMST_2016_2610963
crossref_primary_10_1109_TCC_2024_3480194
crossref_primary_10_1109_JIOT_2022_3176121
crossref_primary_10_1109_JSYST_2020_3005201
crossref_primary_10_1016_j_jnca_2024_103946
crossref_primary_10_1109_ACCESS_2019_2922196
crossref_primary_10_1109_JIOT_2021_3065680
crossref_primary_10_1109_TDSC_2021_3055559
crossref_primary_10_1109_MITP_2023_3273295
crossref_primary_10_1109_TII_2021_3088938
crossref_primary_10_3390_e19120649
crossref_primary_10_1007_s10586_019_03031_y
crossref_primary_10_1007_s10586_020_03120_3
crossref_primary_10_1016_j_comnet_2022_109555
crossref_primary_10_1016_j_comcom_2019_07_002
crossref_primary_10_1186_s13677_018_0109_4
crossref_primary_10_3390_fi9030043
crossref_primary_10_1002_nem_2094
crossref_primary_10_1007_s11042_017_4742_6
crossref_primary_10_1016_j_compeleceng_2018_02_026
Cites_doi 10.1109/UCC.2011.17
10.1109/MITP.2012.43
10.1016/j.jnca.2010.07.006
10.1109/TPDS.2012.182
10.1109/TSC.2011.44
10.1007/s11134-009-9147-4
10.1109/TNET.2004.842221
10.1109/TPDS.2007.1111
10.1109/INFCOM.2012.6195783
10.1109/INFCOM.2012.6195714
10.1109/CloudCom.2010.73
10.1109/TPDS.2011.199
10.1109/TNET.2012.2194508
10.1145/1216370.1216373
10.1109/INFCOM.2012.6195844
10.1109/MNET.2011.5958005
10.1145/1132026.1132027
10.1109/TSC.2011.7
10.1109/MC.2012.120
10.1109/TPDS.2012.318
10.1109/INFCOM.2012.6195556
10.1109/TPDS.2012.203
10.1109/NOMS.2010.5488345
10.1109/INFCOM.2011.5935302
ContentType Journal Article
Copyright Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) Sep 2014
Copyright_xml – notice: Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) Sep 2014
DBID 97E
RIA
RIE
AAYXX
CITATION
7SC
7SP
8FD
JQ2
L7M
L~C
L~D
F28
FR3
DOI 10.1109/TPDS.2013.181
DatabaseName IEEE All-Society Periodicals Package (ASPP) 2005–Present
IEEE All-Society Periodicals Package (ASPP) 1998–Present
IEEE Electronic Library (IEL)
CrossRef
Computer and Information Systems Abstracts
Electronics & Communications Abstracts
Technology Research Database
ProQuest Computer Science Collection
Advanced Technologies Database with Aerospace
Computer and Information Systems Abstracts – Academic
Computer and Information Systems Abstracts Professional
ANTE: Abstracts in New Technology & Engineering
Engineering Research Database
DatabaseTitle CrossRef
Technology Research Database
Computer and Information Systems Abstracts – Academic
Electronics & Communications Abstracts
ProQuest Computer Science Collection
Computer and Information Systems Abstracts
Advanced Technologies Database with Aerospace
Computer and Information Systems Abstracts Professional
Engineering Research Database
ANTE: Abstracts in New Technology & Engineering
DatabaseTitleList
Technology Research Database
Technology Research Database
Database_xml – sequence: 1
  dbid: RIE
  name: IEEE/IET Electronic Library
  url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/
  sourceTypes: Publisher
DeliveryMethod fulltext_linktorsrc
Discipline Engineering
Computer Science
EISSN 1558-2183
EndPage 2254
ExternalDocumentID 3403212381
10_1109_TPDS_2013_181
6567859
Genre orig-research
GroupedDBID --Z
-~X
.DC
0R~
29I
4.4
5GY
5VS
6IK
97E
AAJGR
AARMG
AASAJ
AAWTH
ABAZT
ABFSI
ABQJQ
ABVLG
ACGFO
ACIWK
AENEX
AETIX
AGQYO
AGSQL
AHBIQ
AI.
AIBXA
AKJIK
AKQYR
ALLEH
ALMA_UNASSIGNED_HOLDINGS
ASUFR
ATWAV
BEFXN
BFFAM
BGNUA
BKEBE
BPEOZ
CS3
DU5
E.L
EBS
EJD
HZ~
H~9
ICLAB
IEDLZ
IFIPE
IFJZH
IPLJI
JAVBF
LAI
M43
MS~
O9-
OCL
P2P
PQQKQ
RIA
RIE
RNI
RNS
RZB
TN5
TWZ
UHB
VH1
AAYOK
AAYXX
CITATION
RIG
7SC
7SP
8FD
JQ2
L7M
L~C
L~D
F28
FR3
ID FETCH-LOGICAL-c384t-91ba576a7a4f266835ed98d5b39308a02e7a60774b7b30d07a19c9156038fec33
IEDL.DBID RIE
ISSN 1045-9219
IngestDate Sun Aug 24 03:28:47 EDT 2025
Mon Jun 30 06:43:04 EDT 2025
Thu Apr 24 23:13:02 EDT 2025
Tue Jul 01 02:18:10 EDT 2025
Wed Aug 27 02:52:30 EDT 2025
IsPeerReviewed true
IsScholarly true
Issue 9
Language English
License https://ieeexplore.ieee.org/Xplorehelp/downloads/license-information/IEEE.html
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c384t-91ba576a7a4f266835ed98d5b39308a02e7a60774b7b30d07a19c9156038fec33
Notes ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 14
ObjectType-Article-2
ObjectType-Feature-1
content type line 23
PQID 1553293204
PQPubID 85437
PageCount 10
ParticipantIDs ieee_primary_6567859
proquest_journals_1553293204
crossref_citationtrail_10_1109_TPDS_2013_181
crossref_primary_10_1109_TPDS_2013_181
proquest_miscellaneous_1567115930
ProviderPackageCode CITATION
AAYXX
PublicationCentury 2000
PublicationDate 2014-09-01
PublicationDateYYYYMMDD 2014-09-01
PublicationDate_xml – month: 09
  year: 2014
  text: 2014-09-01
  day: 01
PublicationDecade 2010
PublicationPlace New York
PublicationPlace_xml – name: New York
PublicationTitle IEEE transactions on parallel and distributed systems
PublicationTitleAbbrev TPDS
PublicationYear 2014
Publisher IEEE
The Institute of Electrical and Electronics Engineers, Inc. (IEEE)
Publisher_xml – name: IEEE
– name: The Institute of Electrical and Electronics Engineers, Inc. (IEEE)
References ref13
ref12
ref15
ref14
ref11
ref10
ref2
ref17
ref16
ref19
ref18
bhadauria (ref4) 2011; abs 1109 5388
rajab (ref6) 2007
armbrust (ref1) 2009
ref24
ref23
ref26
ref25
ref20
ref22
ref21
ref28
ref8
(ref29) 0
ref7
dagon (ref30) 2006
ref9
ref3
ref5
kleinrock (ref27) 1975; i
References_xml – ident: ref13
  doi: 10.1109/UCC.2011.17
– ident: ref12
  doi: 10.1109/MITP.2012.43
– ident: ref3
  doi: 10.1016/j.jnca.2010.07.006
– ident: ref24
  doi: 10.1109/TPDS.2012.182
– ident: ref15
  doi: 10.1109/TSC.2011.44
– ident: ref26
  doi: 10.1007/s11134-009-9147-4
– volume: abs 1109 5388
  year: 2011
  ident: ref4
  article-title: A Survey on Security Issues in Cloud Computing
  publication-title: CoRR
– ident: ref7
  doi: 10.1109/TNET.2004.842221
– ident: ref9
  doi: 10.1109/TPDS.2007.1111
– ident: ref17
  doi: 10.1109/INFCOM.2012.6195783
– ident: ref8
  doi: 10.1109/INFCOM.2012.6195714
– start-page: 1
  year: 2006
  ident: ref30
  article-title: Modeling Botnet Propagation using Time Zones
  publication-title: Proc 13th NDSS
– ident: ref21
  doi: 10.1109/CloudCom.2010.73
– ident: ref23
  doi: 10.1109/TPDS.2011.199
– ident: ref10
  doi: 10.1109/TNET.2012.2194508
– ident: ref5
  doi: 10.1145/1216370.1216373
– ident: ref14
  doi: 10.1109/INFCOM.2012.6195844
– start-page: 5
  year: 2007
  ident: ref6
  article-title: My Botnet is Bigger Than Yours (Maybe, Better Than Yours): Why Size Estimates Remain Challenging
  publication-title: Proc 1st Conf HotBots
– volume: i
  year: 1975
  ident: ref27
  publication-title: Queueing Systems
– ident: ref18
  doi: 10.1109/MNET.2011.5958005
– ident: ref28
  doi: 10.1145/1132026.1132027
– year: 2009
  ident: ref1
  publication-title: Above the Clouds A Berkeley View of Cloud Computing
– ident: ref11
  doi: 10.1109/TSC.2011.7
– ident: ref20
  doi: 10.1109/MC.2012.120
– ident: ref25
  doi: 10.1109/TPDS.2012.318
– ident: ref2
  doi: 10.1109/INFCOM.2012.6195556
– year: 0
  ident: ref29
– ident: ref16
  doi: 10.1109/TPDS.2012.203
– ident: ref19
  doi: 10.1109/NOMS.2010.5488345
– ident: ref22
  doi: 10.1109/INFCOM.2011.5935302
SSID ssj0014504
Score 2.5212915
Snippet Cloud is becoming a dominant computing platform. Naturally, a question that arises is whether we can beat notorious DDoS attacks in a cloud environment....
SourceID proquest
crossref
ieee
SourceType Aggregation Database
Enrichment Source
Index Database
Publisher
StartPage 2245
SubjectTerms Analytical models
Cloud computing
Computer crime
Computer networks
DDoS attacks
Denial of service attacks
Dynamics
Financing
Mathematical model
Mathematical models
mitigation
Quality of service
Queueing analysis
resource investment
Resource scheduling
Servers
system modelling
Title Can We Beat DDoS Attacks in Clouds?
URI https://ieeexplore.ieee.org/document/6567859
https://www.proquest.com/docview/1553293204
https://www.proquest.com/docview/1567115930
Volume 25
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV3fS8MwED7mnvTB6aY4nRJRfFq3dmnX5knm5hjCRNiGeytJmoI4WnHti3-9l7arv8G3Qo82zeUu3zV39wFccinR6fW4QZkSGKBQyxC9wDWkyxxHho6kGZ3P9L4_Wdh3S2dZgXZZC6OUypLPVEdfZmf5QSxT_ausi9jD9Ry2BVsYuOW1WuWJge1kVIEYXTgGQzP86KfZnT-MZjqJi3Ysz_qy_2SEKj-8cLa1jGsw3Qwqzyh57qSJ6Mi3b_0a_zvqPdgtMCYZ5ItiHyoqqkNtw99ACnOuw86nZoQNuBjyiDwqcoPemYxG8YwMkkRX4JOniAxXcRqsrw9gMb6dDydGQaFgSOrZCboywTGi4C63Q9yKEW6pgHmBIyijpsfNnnJ530QIKFxBzcB0ucUk09XV1AsVKuoQqlEcqSMgwrR4P5CcIkiwBcfQJ9Q86lIKRBhe4DWhvZlYXxb9xTXNxcrP4gyT-VoPvtaDj3powlUp_pI31vhLsKHntBQqprMJrY3W_MLs1r4mQUL80jPtJpyXt9Fg9CkIj1Scapm-izAYv__49yefwDa-284TyVpQTV5TdYrIIxFn2ZJ7B-JU0W8
linkProvider IEEE
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1LT8MwDLbGOAAH3ojxDAJxolvbNGtzQmMDjccQEkNwq5I0kxBTi6C98Otx2q68JW6ValVpXNufG9sfwIFQCp2eKyzKtcQEhTqWdCPfUj5nTI2Yojmdz-C63b_zLh7YQw2Oql4YrXVefKab5jI_y48SlZlfZS3EHn7A-BRMY9xnbtGtVZ0ZeCwnC8T8glkcDfFjomZreNO7NWVctOkEzpcIlFOq_PDDeXA5W4DBZFlFTclTM0tlU719m9j433UvwnyJMkmn-CyWoKbjZViYMDiQ0qCXYe7TOMIV2O-KmNxrcoL-mfR6yS3ppKnpwSePMemOkyx6PV6Fu7PTYbdvlSQKlqKBl6IzkwJzCuELb4TBGAGXjngQMUk5tQNhu9oXbRtBoPQltSPbFw5X3PRX02CkUVVrUI-TWK8DkbYj2pESFGGCJwUmPyPDpK6URIwRREEDjiYbG6pywrghuhiHeaZh89DoITR6CFEPDTisxJ-L0Rp_Ca6YPa2Eyu1swNZEa2FpeK-hoUFCBOPaXgP2qttoMuYcRMQ6yYxM20cgjO-_8fuTd2GmPxxchVfn15ebMIvr8Iqysi2opy-Z3kYcksqd_PN7BwCv1Lk
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Can+We+Beat+DDoS+Attacks+in+Clouds%3F&rft.jtitle=IEEE+transactions+on+parallel+and+distributed+systems&rft.au=Yu%2C+Shui&rft.au=Tian%2C+Yonghong&rft.au=Guo%2C+Song&rft.au=Wu%2C+Dapeng+Oliver&rft.date=2014-09-01&rft.issn=1045-9219&rft.volume=25&rft.issue=9&rft.spage=2245&rft.epage=2254&rft_id=info:doi/10.1109%2FTPDS.2013.181&rft.externalDBID=n%2Fa&rft.externalDocID=10_1109_TPDS_2013_181
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1045-9219&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1045-9219&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1045-9219&client=summon