Total views : 11

Reducing DDoS Attack in Cloud using Layered Model


  • School of Computer Science and Engineering, Lovely Professional University, Phagwara – 144411, Punjab, India


Background: Cloud Computing is the field of concern these days. Organizations are more worried for the security of cloud as it provides resources on “pay-as-you-need” basis. Methods: Security and safety are the two most important things in cloud. An enhanced model is proposed to detect the DDoS attack. The model consists of many phases which will filter out the attack at each layer. Findings: The system is proposed with different layers namely IP address filtering which will filter the illegitimate ip addresses followed by hop count check. Cloud Traceback Model is used as one layer which uses the technique of marking the packets and is capable of filtering the packets. Applications/ Improvements: The model proposed is applicable in cloud infrastructure as it embeds different techniques to reduce the chances of DDoS attack. The model is easy to deploy and all the modules can be easily integrated into one model.


Cloud Computing, DDoS, Encryption, Hop count , Legitimate IP, Trace Back Model.

Full Text:

 |  (PDF views: 26)


  • Wang L, Laszewski G Von, Younge A, He X. Cloud computing: A perspective study. New Gener Comput. 2010; 28(2):137–46.
  • Ahmed M, Hossain MA. Cloud Computing and Security Issues in the Cloud. International Journal of Network Security and Its Applications. 2014; 6(1):25–36. DOI:10.5121/ijnsa.2014.6103.
  • Zissis D, Lekkas D. Addressing cloud computing security issues. Future Generation Computer Systems. 2012; 28(3):583–92. DOI:10.1016/j.future.2010.12.006.
  • Bouzida Y, Cuppens F, Gombault S. Detecting and reacting against distributed denial of service attacks. 2006 IEEE International Conference of Communication ICC 2006. 2006; 5(August 2016):2394–9. DOI:10.1109/ICC.2006.255128.
  • Tianfield H. Security issues in cloud computing. IEEE International Conference on Systems, Man and Cybernetics. 2012:1082–9. DOI:10.1109/ICSMC.2012.6377874.
  • Popovic K, Hocenski Z. Cloud computing security issues and challenges. Proceedings of 33rd Interational Convention. 2010.p. 344–9.
  • Deshmukh RV, Devadkar KK. Understanding DDoS attack and its effect in cloud environment. Procedia Computer Science. 2015; 49(1):202–10. DOI:10.1016/j.procs.2015.04.245.
  • Ramgovind S, Eloff MM, Smith E. The management of security in Cloud computing. Information Security for South Africa. 2010:1–7.
  • Thesis M. Security solutions for cloud technologies. 2013;128(16):8887.
  • Yan Q, Yu FR, Member S, Gong Q, Li J. Software-Defined Networking ( SDN ) and Distributed Denial of Service ( DDoS ) Attacks in Cloud Computing Environments : A Survey , Some Research Issues , and Challenges. IEEE Commun Survey and Tutorials. 2015; 18(c):2–23. DOI:10.1109/COMST.2015.2487361.
  • Yan Q, Yu FR. Distributed denial of service attacks in software-defined networking with cloud computing. IEEE Communication Magazine. 2015; 53(4):52–9. DOI:10.1109/MCOM.2015.7081075.
  • Srinivasan S, Raja K. Preventing Cloud Attacks using Bio-Metric Authentication in Cloud Computing. 2016; 9(June). DOI:10.17485/ijst/2016/v9i23/88322.
  • Hari SK, Sudhan H, Kumar SS. An Innovative Proposal for Secure Cloud Authentication using Encrypted Biometric Authentication Scheme. 2015; 8(December). DOI:10.17485/ijst/2015/v8i35/82743.
  • Chonka A, Zhou W, Xiang Y. Protecting web services with service oriented traceback architecture. Proceedingsof IEEE 8th International Conference on Computer and Information Technology CIT 2008. 2008:706–11. DOI:10.1109/CIT.2008.4594761.
  • Belenky A, Ansari N. Tracing multiple attackers with deterministic packet marking (DPM). 2003 IEEE Pacific Rim Conference Communications, Computers and Signal Process (PACRIM 2003). 2003;1:49–52. DOI:10.1109/PACRIM.2003.1235716.
  • Degree B, Information IN. Flexible Determinisic Packet Marking : An IP Traceback System To Find Real Source Of Attack. 2009; 20(5):1–14.
  • Joshi B, Vijayan a. S, Joshi BK. Securing cloud computing environment against DDoS attacks. 2012 International Conference on Computer Communication and Informatics. 2012:1–5. DOI:10.1109/ICCCI.2012.6158817.
  • Chonka A, Xiang Y, Zhou W, Bonti A. Cloud security defence to protect cloud computing against HTTP-DoS and XML-DoS attacks. Journal of Network and Computer Applications. 2011; 34(4):1097–107. DOI:10.1016/j.jnca.2010.06.004.
  • Yu S, Tian Y, Guo S, Wu D. Can We Beat DDoS Attacks in Clouds?(Supplementary Material). IEEE Transactions on Parallel and Distributed Systems. 2000; 25(9):1–4. DOI:10.1109/TPDS.2013.181.


  • There are currently no refbacks.

Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.