Issue No. 01 - Jan.-Feb. (2017 vol. 4)
DOI Bookmark: http://doi.ieeecomputersociety.org/10.1109/MCC.2017.14
Gaurav Somani , Central University of Rajasthan, India
Manoj Singh Gaur , Malaviya National Institute of Technology, India
Dheeraj Sanghi , Indian Institute of Technology Kanpur, India
Mauro Conti , University of Padua, Italy
Muttukrishnan Rajarajan , City University London, England
Rajkumar Buyya , The University of Melbourne, Australia
Distributed Denial of Service (DDoS) attacks targeted to cloud services, show serious attack consequences like heavy downtime, economic losses and both short term and long-term business and reputation losses. We present an overview of these attacks and their variants in consonance to cloud infrastructure and explain the attack dynamics. Cloud resource management using auto-scaling algorithms is used to dig the requirements of DDoS mitigation solutions. These requirements include sustainability or budget constraints, controlled auto-scaling, minimization based optimized control of attack traffic, mitigation throughput time (MTT), service quality and availability. Towards the end, we develop and propose a detailed guideline on possible solutions leading to a novel collaborative solution framework based on multi-level alert flows. We also comment on the future attacks in the DDoS space and give a novel DDoS attack variant "Detection Near Impossible (DeNy) DDoS" as an anticipated vision for future attacks to orchestrate the upcoming solutions from the community.
Computer crime, Cloud computing, Servers, Economics, Business, Bandwidth, Energy consumption
G. Somani, M. S. Gaur, D. Sanghi, M. Conti, M. Rajarajan and R. Buyya, "Combating DDoS Attacks in the Cloud: Requirements, Trends, and Future Directions," in IEEE Cloud Computing, vol. 4, no. 1, pp. 22-32, 2017.