A proactive approach to protect cloud computing environment against DDoS attack

Md. Mamun Ahmed and Ayman El Hajjar 2023. A proactive approach to protect cloud computing environment against DDoS attack. in: Hamid Jahankhani, Arshad Jamal and Guy Brown (ed.) AI, Blockchain and Self-Sovereign Identity in Higher Education Switzerland Springer. pp. 243-278

Chapter titleA proactive approach to protect cloud computing environment against DDoS attack
AuthorsMd. Mamun Ahmed and Ayman El Hajjar
EditorsHamid Jahankhani, Arshad Jamal and Guy Brown
Abstract

The current range of technological and physical advances mostly rely on load dispersion as well as demand delays which modern security solutions are equipped to defend against distributed denial-of-service (DDoS) threats. Clients and website visitors consequently encounter time delays, captchas, and delayed connectivity. In this chapter, we provide a novel layered solution for cloud-based DDoS defence that makes use of Advanced Malware methods and a proactive method for identifying anomalies in traffic behaviour. The model’s first level assesses the packet arrival frames’ starting origin IP address, while the second level looks at request speed and forecasts the threat speed threshold. The third tier, if necessary, minimises the traffic burden by redirecting the traffic towards the proxy. In case a specific web application is the target of the assault, the fifth layer decides whether port-hopping is necessary between the gateway and the destination website. Numerous studies demonstrate how well a multilayer strategy can recognise and limit threats from such a diverse variety of known and undisclosed sources.

KeywordsDDoS
Cloud Computing
Book titleAI, Blockchain and Self-Sovereign Identity in Higher Education
Page range243-278
Year2023
PublisherSpringer
Publication dates
Published23 Jun 2023
Place of publicationSwitzerland
Edition1st
ISBN9783031336263
9783031336294
9783031336270
ISSN1613-5113
Digital Object Identifier (DOI)https://doi.org/10.1007/978-3-031-33627-0

Related outputs

Wireless Networks Cyber Security Threats and Countermeasures
El Hajjar, A. and Jahankhani, H. El Hajjar, A. and Jahankhani, H. (ed.) 2023. Wireless Networks Cyber Security Threats and Countermeasures. Switzerland Springer.

Key-Pre Distribution for the Internet of Things Challenges, Threats and Recommendations
El Hajjar, A. 2023. Key-Pre Distribution for the Internet of Things Challenges, Threats and Recommendations. in: Wireless Networks: Cyber Security Threats and Countermeasures Switzerland Springer. pp. 1-42

Secure routing in IoT networks with SISLOF
El Hajjar, A.E., Roussos, G. and Paterson, M. 2017. Secure routing in IoT networks with SISLOF. 2017 Global Internet of Things Summit (GIoTS). CICG, Geneva 06 - 09 Jun 2017 IEEE . https://doi.org/10.1109/giots.2017.8016278

Secure routing in IoT networks with SISLOF
El Hajjar, A., Roussos, G. and Paterson, M. 2017. Secure routing in IoT networks with SISLOF. Global IoT Summit. Geneva, Switzerland 06 - 09 Jun 2017 IEEE . https://doi.org/10.1109/GIOTS.2017.8016278

Securing the internet of things devices using pre-distributed keys
El Hajjar, A. 2016. Securing the internet of things devices using pre-distributed keys. 2016 IEEE International Conference on Cloud Engineering Workshops (IC2EW). Berlin, Germany 04 - 08 Apr 2016 IEEE . https://doi.org/10.1109/ic2ew.2016.22

Securing the Internet of Things Devices Using Pre-Distributed Keys
El Hajjar, A. 2016. Securing the Internet of Things Devices Using Pre-Distributed Keys. 2016 IEEE International Conference on Cloud Engineering Workshop (IC2EW). Berlin, Germany 04 - 08 Apr 2016 IEEE . https://doi.org/10.1109/IC2EW.2016.22

On the Performance of Key Pre-distribution for RPL-based IoT Networks
El Hajjar, A., Roussos, G. and Paterson, M. 2016. On the Performance of Key Pre-distribution for RPL-based IoT Networks. Interoperability, Safety and Security in IoT. Paris, France 26 - 27 Oct 2016 Springer. https://doi.org/10.1007/978-3-319-52727-7_9

Permalink - https://westminsterresearch.westminster.ac.uk/item/w67vq/a-proactive-approach-to-protect-cloud-computing-environment-against-ddos-attack


Share this

Usage statistics

25 total views
0 total downloads
These values cover views and downloads from WestminsterResearch and are for the period from September 2nd 2018, when this repository was created.