Abstract:Abstract-With the growing popularity of cloud computing, the exploitation of possible vulnerabilities grows at the same pace; the distributed nature of the cloud makes it an attractive target for potential intruders. Despite security issues delaying its adoption, cloud computing has already become an unstoppable force; thus, security mechanisms to ensure its secure adoption are an immediate need. Here, we focus on intrusion detection and prevention systems (IDPSs) to defend against the intruders. In this paper… Show more
“…3. The extent of collaborative environments like cloud computing (Bhushan & Gupta, 2018;Joshi et al, 2012;Mishra et al, 2021;Xiao & Xiao, 2012; and IoT (Chui et al, 2019;Cvitić et al, 2021;Evans, 2011;Kolias et al, 2017;Marr, 2021;Munshi et al, 2020;Sambandam et al, 2018;Zargar et al, 2011) present more and more new avenues for attackers to exploit, like the IoT botnets that include dedicated systems as well as mobile devices, simple home appliances, and IoV-based automotive, etc. DDoS-for-hire services have also increased due to such simple targets since these devices lack significantly in terms of security.…”
Section: Open Challenges and Future Research Directionsmentioning
The demand for Internet security has escalated in the last two decades because the rapid proliferation in the number of Internet users has presented attackers with new detrimental opportunities. One of the simple yet powerful attack, lurking around the Internet today, is the Distributed Denial-of-Service (DDoS) attack. The expeditious surge in the collaborative environments, like IoT, cloud computing and SDN, have provided attackers with countless new avenues to benefit from the distributed nature of DDoS attacks. The attackers protect their anonymity by infecting distributed devices and utilizing them to create a bot army to constitute a large-scale attack. Thus, the development of an effective as well as efficient DDoS defense mechanism becomes an immediate goal. In this exposition, we present a DDoS threat analysis along with a few novel ground-breaking defense mechanisms proposed by various researchers for numerous domains. Further, we talk about popular performance metrics that evaluate the defense schemes. In the end, we list prevalent DDoS attack tools and open challenges.
“…3. The extent of collaborative environments like cloud computing (Bhushan & Gupta, 2018;Joshi et al, 2012;Mishra et al, 2021;Xiao & Xiao, 2012; and IoT (Chui et al, 2019;Cvitić et al, 2021;Evans, 2011;Kolias et al, 2017;Marr, 2021;Munshi et al, 2020;Sambandam et al, 2018;Zargar et al, 2011) present more and more new avenues for attackers to exploit, like the IoT botnets that include dedicated systems as well as mobile devices, simple home appliances, and IoV-based automotive, etc. DDoS-for-hire services have also increased due to such simple targets since these devices lack significantly in terms of security.…”
Section: Open Challenges and Future Research Directionsmentioning
The demand for Internet security has escalated in the last two decades because the rapid proliferation in the number of Internet users has presented attackers with new detrimental opportunities. One of the simple yet powerful attack, lurking around the Internet today, is the Distributed Denial-of-Service (DDoS) attack. The expeditious surge in the collaborative environments, like IoT, cloud computing and SDN, have provided attackers with countless new avenues to benefit from the distributed nature of DDoS attacks. The attackers protect their anonymity by infecting distributed devices and utilizing them to create a bot army to constitute a large-scale attack. Thus, the development of an effective as well as efficient DDoS defense mechanism becomes an immediate goal. In this exposition, we present a DDoS threat analysis along with a few novel ground-breaking defense mechanisms proposed by various researchers for numerous domains. Further, we talk about popular performance metrics that evaluate the defense schemes. In the end, we list prevalent DDoS attack tools and open challenges.
“…V. RELATED WORK Some basic concepts about remote detection, context sharing, and agent-based cyber-security frameworks were already explored in the past [6]- [8]. In many cases, legacy security appliances are used and their output is correlated; the duplication at the local and global level introduces redundancy and also communication overhead.…”
The definition of elastic network services that can be orchestrated at run-time brings unprecedented agility and dynamicity in network operation, but also complicates security management. As a matter of fact, cyber-security appliances are still largely stuck to traditional paradigms, based on relatively static topologies and the security perimeter model. The uptake of service-oriented architectures and microservices is now suggesting to compose security services by orchestrating monitoring, inspection, and enforcement capabilities, which are natively implemented in each elementary component (virtual functions, software-defined network equipment).In this paper, we describe and evaluate a novel framework for monitoring, inspection and enforcement that provides a broad and heterogeneous security context for centralized analytics, correlation and detection. Our work represents the preliminary step towards the creation of true Security-as-a-Service (SecaaS) paradigms in virtualized environments, through programmatic composition of common capabilities available in each virtual function.
“…The complete scenario is revealed when relationships are created from different network traces. Several works like [16,14] using different approaches have exposed intrusion detection systems (IDS) that are collaborative or distributed as a solution to detect possible attacks (such as, to detect a distributed denial of service (DDoS)). Collaborative or distributed IDSs can observe that different hosts located at different networks are sending network packets to the final common target.…”
Communications systems are growing in use and in popularity. While their interactions are becoming more numerous, trust those interactions now becomes a priority. In this paper, we focus on trust management systems based on observations of trustee behaviors. Based on a formal testing methodology, we propose a formal distributed network monitoring approach to analyze the packets exchanged between the trustor, trustee and other points of observation in order to prove the trustee is acting in a trustworthy manner. Based on formal "trust properties", the monitored systems behaviors provide a verdict of trust by analyzing and testing those properties. Finally, our methodology is applied to a real industrial DNS use case scenario.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.