Detection of DDoS/DoS Attack Methodologies in Cloud Computing Network: A Survey

Authors

  • Tariq Mehboob Department of Information Technology, Lahore Garrison University Lahore, 54000, Pakistan.
  • Irshad Ahmad Sumra Department of Computer Science, Lahore Garrison University Lahore, 54000, Pakistan.
  • Iram Shahzadi Department of Information Technology, Lahore Garrison University Lahore, 54000, Pakistan.

Keywords:

IAAS, PAAS, Public, Private, Hybrid, Community, Integrity, Confidentiality, Availability

Abstract

The concept of cloud computing has been proposed for many years, and the first cloud computing service was launched in the 21st century. Cloud computing uses the Internet or the cloud to provide computing services such as servers, storage, databases, networks, software, analytics, and intelligence. The three types of cloud computing include IAAS, PAAS, and SAAS. CIA, which stands for Trust, Integrity, and Availability, is the foundation of information security. While DDoS/DoS destroys availability, network unavailability and network inadequacy affect reliability. DoS and distributed DoS (DDoS) attacks have become more sophisticated and cannot be stopped by traditional protection tools in cloud computing. Machine learning and neural networks are subcategories of software computing techniques that can be used for network analysis to detect patterns in the occurrence of DDoS/DoS attacks. With the rise of cloud computing, the threat of attacks has also increased. Attackers are also using new technologies to attack the cloud to disrupt services. These attacks can cause serious damage to cloud service providers and their customers. DDoS/DoS attacks attempt to prevent loss of revenue, reputation, and trust. By using cloud computing technology, cloud service providers can ensure that their services are secure and reliable, thereby enhancing confident and proud customer experience.

Downloads

Published

2024-09-30

How to Cite

Tariq Mehboob, Irshad Ahmad Sumra, & Iram Shahzadi. (2024). Detection of DDoS/DoS Attack Methodologies in Cloud Computing Network: A Survey. Journal of Computing & Biomedical Informatics. Retrieved from https://jcbi.org/index.php/Main/article/view/191

Issue

Section

Articles