13DDoS Attacks: Tools, Mitigation Approaches, and Probable Impact on Private Cloud Environment

R. K. Deka1, D. K. Bhattacharyya2, and J. K. Kalita3

1Department of Computer Science and Engineering, Assam Don Bosco University, Guwahati, Assam, India

2Department of Computer Science and Engineering, School of Engineering, Tezpur University, Tezpur, Assam, India

3Department of Computer Science, College of Engineering and Applied Science, University of Colorado, Boulder, CO, USA

13.1 Introduction

The cloud computing infrastructure allows a service provider on the Internet to provide the use of computing resources to fulfill the necessary demands of users. Due to virtualization, it is possible to provide services using optimal resources. Khorshed et al. [1] define cloud computing as “a system of shared resources of a data centre using virtualization technology. Such systems provide elasticity based on demand and ask for charges based on customer usage.”

Scanning, DoS, and penetration [2] can occur in a live network of computers. The Arbor Networks1 reported the largest (at that time) DDoS attack of 400 Gbps in 2014. In Figure 13.1, we can see DDoS attack trends in 20202. In particular, large‐scale DDoS attack frequency has continued to trend upward, as shown in Figure 13.2.

The Mirai botnet attack is launched using IoT devices such as DVR players and digital cameras. The victims were the servers of Dyn, a company that controls much of the Internet’s Domain Name System (DNS) infrastructure. ...

Get Big Data Analytics for Internet of Things now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.