• P-ISSN 0974-6846 E-ISSN 0974-5645

Indian Journal of Science and Technology


Indian Journal of Science and Technology

Year: 2020, Volume: 13, Issue: 29, Pages: 2962-2972

Original Article

Analyzing distributed denial of service attacks in cloud computing towards the Pakistan information technology industry

Received Date:16 July 2020, Accepted Date:27 July 2020, Published Date:11 August 2020


Objectives: Cloud computing technology is in continuous development, and with numerous challenges regarding security. In this context, one of the main concerns for cloud computing is represented by the trustworthiness of cloud services in the Pakistan Information Technology (IT) industry. This problem requires prompt resolution because IT organizations in Pakistan adopting cloud services would be exposed to increased expenditures while at a higher risk. A survey conducted by International Data Corporation (IDC) in August 2008 confirms that security is the major barrier for cloud users in Pakistan.Material/methods: We have proposed the mathematical-based model for an estimate of our user’s requirements regarding our resource investment based on queuing theory to overcome these security issues in cloud technology. We are adopting a system and real-world analysis using data set experiments.Result: In this article, we proposed a solution to overcome the Distributed Denial of Service (DDoS) attacks in a cloud computing environment in the Pakistan IT services; because along with discussed above phenomena, we also used DST and FTA (Fault Tree Analysis) for mentioned attacks. Conclusion:Our proposed solution based on Dempsters combination rule is to analyzed mixture proof of different types of cloud attacks in IT industries in Pakistan.

Keywords: DDoS attacks; IT Services; attack detection; cryptography; cloud computing


  1. Somani G, Gaur MS, Sanghi D, Conti M, Buyya R. DDoS attacks in cloud computing: Issues, taxonomy, and future directions. Computer Communications. 2017;107:30–48. Available from: https://dx.doi.org/10.1016/j.comcom.2017.03.010
  2. Iqbal S, Kiah MLM, Dhaghighi B, Hussain M, Khan S, Khan MK, et al. On cloud security attacks: A taxonomy and intrusion detection and prevention as a service. Journal of Network and Computer Applications. 2016;74:98–120. Available from: https://dx.doi.org/10.1016/j.jnca.2016.08.016
  3. Rengaraju P, Ramanan VR, Lung CH. Detection and prevention of DoS attacks in Software-Defined Cloud networks. 2017 IEEE Conference on Dependable and Secure Computing. 2017;p. 217–223. Available from: https://ieeexplore.ieee.org/document/8073810
  4. Gupta BB, Badve OP. Taxonomy of DoS and DDoS attacks and desirable defense mechanism in a Cloud computing environment. Neural Computing and Applications. 2017;28(12):3655–3682. Available from: https://dx.doi.org/10.1007/s00521-016-2317-5
  5. Agrawal N, Tapaswi S. Defense schemes for variants of distributed denial-of-service (DDoS) attacks in cloud computing: A survey. Information Security Journal: A Global Perspective. 2017;26(2):61–73. Available from: https://dx.doi.org/10.1080/19393555.2017.1282995
  6. Zhang B, Zhang T, Yu Z. DDoS detection and prevention based on artificial intelligence techniques. 3rd IEEE International Conference on Computer and Communications (ICCC). 2017;p. 1276–1280. Available from: https://ieeexplore.ieee.org/document/8322748
  7. Somani G, Gaur MS, Sanghi D, Conti M, Rajarajan M, Buyya R. Combating DDoS Attacks in the Cloud: Requirements, Trends, and Future Directions. IEEE Cloud Computing. 2017;4:22–32. Available from: https://dx.doi.org/10.1109/mcc.2017.14
  8. Somani G, Gaur MS, Sanghi D, Conti M, Buyya R. Service resizing for quick DDoS mitigation in cloud computing environment. Annals of Telecommunications. 2017;72(5-6):237–252. Available from: https://dx.doi.org/10.1007/s12243-016-0552-5
  9. Alzahrani S, Hong L. A Survey of Cloud Computing Detection Techniques against DDoS Attacks. Journal of Information Security. 2018;09(01):45–69. Available from: https://dx.doi.org/10.4236/jis.2018.91005
  10. Khan MA. A survey of security issues for cloud computing. Journal of network and computer applications. 2016;71:11–29. Available from: https://www.sciencedirect.com/science/article/pii/S1084804516301060
  11. Fakeeh KA. An Overview of DDOS Attacks Detection and Prevention in the Cloud. International Journal of Applied Information Systems . 2016;11(7):25–34. Available from: https://www.ijais.org/archives/volume11/number7/952-2016451628
  12. Pillutla H, Arjunan A. Fuzzy self organizing maps-based DDoS mitigation mechanism for software defined networking in cloud computing. Journal of Ambient Intelligence and Humanized Computing. 2019;10(4):1547–1559. Available from: https://dx.doi.org/10.1007/s12652-018-0754-y
  13. Wani AR, Rana QP, Saxena U, Pandey N. Analysis and Detection of DDoS Attacks on Cloud Computing Environment using Machine Learning Techniques. Amity International Conference on Artificial Intelligence (AICAI). 2019;p. 870–875. Available from: https://ieeexplore.ieee.org/document/8701238
  14. Ahmed P, Memon S. A Secure News Web-Based Application for Multiple users Sharing Information Publically. Indian Journal of Science and Technology. 2019;12:11.
  15. Ahmed A, Khuhawar A, Kimlong N. OPAS: A Trusted Web-Based Online Property Advertising System. Indian Journal of Science and Technology. 2018;11:1–5.
  16. Panhwar MA, Khuhro SA, Mazhar T. Virtual machine optimization to achieve energy efficient optimum resource utilization in cloud data center. Indian Journal of Science and Technology. 2020;(13) 1423–1434. Available from: https://doi.org/10.17485/IJST/v13i13.211, 2020
  17. Ahmed A, Khuhawar A, Hayat S. FGEHF: Authenticated Web Based Application for Human Resource Management System. Indian Journal of Science and Technology. 2018;11:1–12.
  18. Rana K, Gulzar. Wireless ad hoc network: detection of malicious node by using neighbour-based authentication approach. International Journal of Wireless and Mobile Computing. 2018;14:16–24.
  19. Khuhro S, Ali. MobiGuard: A mechanism for protecting and controlling user’s personal data on android smartphones. Imperial Journal of Interdisciplinary Research (IJIR) 3. 2017;12:50–58.
  20. Panhwar M, Aamir. SACA: A Study of Symmetric and Asymmetric Cryptographic Algorithms. International Journal of Computer Science and Network Security . 2019;19:48–55.
  21. Panhwar MA, Khuhro SA, Pirzada N, Memon KA, Zhongliang D, Ain N. Security Solutions for Classified Attacks in WSNs. IJCSNS. 2019;19(6).


© 2020 Memon et al.This is an open-access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited. Published By Indian Society for Education and Environment (iSee).


Subscribe now for latest articles and news.