Algorithm for Secure Hybrid Cloud Design Against DDoS Attacks

Algorithm for Secure Hybrid Cloud Design Against DDoS Attacks

Akashdeep Bhardwaj, Sam Goundar
DOI: 10.4018/978-1-7998-2466-4.ch020
OnDemand:
(Individual Chapters)
Available
$37.50
No Current Special Offers
TOTAL SAVINGS: $37.50

Abstract

This article describes how cloud computing has become a significant IT infrastructure in business, government, education, research, and service industry domains. Security of cloud-based applications, especially for those applications with constant inbound and outbound user traffic is important. It becomes of the utmost importance to secure the data flowing between the cloud application and user systems against cyber criminals who launch Denial of Service (DoS) attacks. Existing research related to cloud security focuses on securing the flow of information on servers or between networks but there is a lack of research to mitigate Distributed Denial of Service attacks on cloud environments as presented by Buyya et al. and Fachkha, et al. In this article, the authors propose an algorithm and a Hybrid Cloud-based Secure Architecture to mitigate DDoS attacks. By proposing a three-tier cloud infrastructure with a two-tier defense system for separate Network and Application layers, the authors show that DDoS attacks can be detected and blocked before reaching the infrastructure hosting the Cloud applications.
Chapter Preview
Top

2. Preliminaries

The authors recommend implementing a defense in depth approach, with a combination of interactive cyber protection technologies to provide a multiple layered defense, including implementing the following:

  • Rate control threshold for devices with alerts and escalations

    • Inspection of multiple HTTP transactions

    • Detection over a short period of time

    • Triggers on excessive rate of client requests

  • Web Application Firewall (WAF) behind network firewall

    • Inspection of single HTTP transactions

    • Attack detection in real-time

  • Client reputation monitoring

    • Stop malicious actors at the source

    • Behavioral analysis on all cloud platform logs

    • Triggers on malicious intent to forecast potential attacks

Complete Chapter List

Search this Book:
Reset