Proactive DDoS Attack Mitigation in Cloud-Fog Environment using Moving Target Defense

12/03/2020
by   Vaishali Kansal, et al.
0

Distributed Denial of Service (DDoS) attacks are serious cyber attacks and mitigating DDoS attacks in cloud is a topic of ongoing research interest which remains a major security challenge. Fog computing is an extension of cloud computing which has been used to secure cloud. Moving Target Defense (MTD) is a newly recognized, proactive security defense that can be used to mitigate DDoS attacks on cloud. MTD intends to make a system dynamic in nature and uncertain by changing attack surface continuously to confuse attackers. In this paper, a novel DDoS mitigation framework is presented to support Cloud-Fog Platform using MTD technique (CFPM). CFPM applies migration MTD technique at fog layer to mitigate DDoS attacks in cloud. It detects attacker among all the legitimate clients proactively at the fog layer and isolate it from innocent clients. CFPM uses an effective request handling procedure for load balancing and attacker isolation procedure which aims to minimize disruption to cloud server as well as serving fog servers. In addition, effectiveness of CFPM is evaluated by analyzing the behavior of the system before and after attack, considering different possible scenarios. This approach is effective as it uses the advantage of both MTD technique and Fog computing paradigm supporting cloud environment.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
12/04/2017

Changing proxy-server identities as a proactive moving-target defense against reconnaissance for DDoS attacks

We consider a cloud based multiserver system consisting of a set of repl...
research
05/31/2019

Comparative Analysis of State-of-the-Art EDoS Mitigation Techniques in Cloud Computing Environment

A new variant of the DDoS attack, called Economic Denial of Sustainabili...
research
09/03/2019

Towards Models for Availability and Security Evaluation of Cloud Computing with Moving Target Defense

Security is one of the most relevant concerns in cloud computing. With t...
research
03/24/2019

Fog Computing Vs. Cloud Computing

This article gives an overview of what Fog computing is, its uses and th...
research
01/11/2019

Don't Wait to be Breached! Creating Asymmetric Uncertainty of Cloud Applications via Moving Target Defenses

Cloud applications expose - besides service endpoints - also potential o...
research
04/16/2021

Denial of Wallet – Defining a Looming Threat to Serverless Computing

Serverless computing is the latest paradigm in cloud computing, offering...
research
02/10/2018

About being the Tortoise or the Hare? - A Position Paper on Making Cloud Applications too Fast and Furious for Attackers

Cloud applications expose - beside service endpoints - also potential or...

Please sign up or login with your details

Forgot password? Click here to reset