A comprehensive review of vulnerabilities and AI-enabled defense against DDoS attacks for securing cloud services

IF 13.3 1区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Computer Science Review Pub Date : 2024-08-01 DOI:10.1016/j.cosrev.2024.100661
Surendra Kumar , Mridula Dwivedi , Mohit Kumar , Sukhpal Singh Gill
{"title":"A comprehensive review of vulnerabilities and AI-enabled defense against DDoS attacks for securing cloud services","authors":"Surendra Kumar ,&nbsp;Mridula Dwivedi ,&nbsp;Mohit Kumar ,&nbsp;Sukhpal Singh Gill","doi":"10.1016/j.cosrev.2024.100661","DOIUrl":null,"url":null,"abstract":"<div><p>The advent of cloud computing has made a global impact by providing on-demand services, elasticity, scalability, and flexibility, hence delivering cost-effective resources to end users in pay-as-you-go manner. However, securing cloud services against vulnerabilities, threats, and modern attacks remains a major concern. Application layer attacks are particularly problematic because they can cause significant damage and are often difficult to detect, as malicious traffic can be indistinguishable from normal traffic flows. Moreover, preventing Distributed Denial of Service (DDoS) attacks is challenging due to its high impact on physical computer resources and network bandwidth. This study examines new variations of DDoS attacks within the broader context of cyber threats and utilizes Artificial Intelligence (AI)-based approaches to detect and prevent such modern attacks. The conducted investigation determines that the current detection methods predominantly employ collectively, hybrid, and single Machine Learning (ML)/Deep Learning (DL) techniques. Further, the analysis of diverse DDoS attacks and their related defensive strategies is vital in safeguarding cloud infrastructure against the detrimental consequences of DDoS attacks. This article offers a comprehensive classification of the various types of cloud DDoS attacks, along with an in-depth analysis of the characterization, detection, prevention, and mitigation strategies employed. The article presents, an in-depth analysis of crucial performance measures used to assess different defence systems and their effectiveness in a cloud computing environment. This article aims to encourage cloud security researchers to devise efficient defence strategies against diverse DDoS attacks. The survey identifies and elucidates the research gaps and obstacles, while also providing an overview of potential future research areas.</p></div>","PeriodicalId":48633,"journal":{"name":"Computer Science Review","volume":"53 ","pages":"Article 100661"},"PeriodicalIF":13.3000,"publicationDate":"2024-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Computer Science Review","FirstCategoryId":"94","ListUrlMain":"https://www.sciencedirect.com/science/article/pii/S1574013724000455","RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"COMPUTER SCIENCE, INFORMATION SYSTEMS","Score":null,"Total":0}
引用次数: 0

Abstract

The advent of cloud computing has made a global impact by providing on-demand services, elasticity, scalability, and flexibility, hence delivering cost-effective resources to end users in pay-as-you-go manner. However, securing cloud services against vulnerabilities, threats, and modern attacks remains a major concern. Application layer attacks are particularly problematic because they can cause significant damage and are often difficult to detect, as malicious traffic can be indistinguishable from normal traffic flows. Moreover, preventing Distributed Denial of Service (DDoS) attacks is challenging due to its high impact on physical computer resources and network bandwidth. This study examines new variations of DDoS attacks within the broader context of cyber threats and utilizes Artificial Intelligence (AI)-based approaches to detect and prevent such modern attacks. The conducted investigation determines that the current detection methods predominantly employ collectively, hybrid, and single Machine Learning (ML)/Deep Learning (DL) techniques. Further, the analysis of diverse DDoS attacks and their related defensive strategies is vital in safeguarding cloud infrastructure against the detrimental consequences of DDoS attacks. This article offers a comprehensive classification of the various types of cloud DDoS attacks, along with an in-depth analysis of the characterization, detection, prevention, and mitigation strategies employed. The article presents, an in-depth analysis of crucial performance measures used to assess different defence systems and their effectiveness in a cloud computing environment. This article aims to encourage cloud security researchers to devise efficient defence strategies against diverse DDoS attacks. The survey identifies and elucidates the research gaps and obstacles, while also providing an overview of potential future research areas.

查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
全面评述漏洞和人工智能防御 DDoS 攻击以确保云服务安全
云计算的出现产生了全球性影响,它提供按需服务、弹性、可扩展性和灵活性,从而以 "即用即付 "的方式为终端用户提供具有成本效益的资源。然而,如何确保云服务免受漏洞、威胁和现代攻击仍然是一个主要问题。应用层攻击问题尤为严重,因为它们可能造成重大损害,而且往往难以检测,因为恶意流量可能与正常流量无法区分。此外,由于分布式拒绝服务(DDoS)攻击对物理计算机资源和网络带宽的影响很大,因此预防这种攻击具有挑战性。本研究在更广泛的网络威胁背景下研究了 DDoS 攻击的新变化,并利用基于人工智能 (AI) 的方法来检测和预防此类现代攻击。调查发现,目前的检测方法主要采用集体、混合和单一的机器学习(ML)/深度学习(DL)技术。此外,对各种 DDoS 攻击及其相关防御策略的分析对于保护云基础设施免受 DDoS 攻击的不利影响至关重要。本文对各种类型的云 DDoS 攻击进行了全面分类,并对所采用的特征描述、检测、预防和缓解策略进行了深入分析。文章深入分析了用于评估不同防御系统及其在云计算环境中有效性的关键性能指标。本文旨在鼓励云安全研究人员针对各种 DDoS 攻击制定高效的防御策略。调查确定并阐明了研究差距和障碍,同时还概述了未来潜在的研究领域。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
Computer Science Review
Computer Science Review Computer Science-General Computer Science
CiteScore
32.70
自引率
0.00%
发文量
26
审稿时长
51 days
期刊介绍: Computer Science Review, a publication dedicated to research surveys and expository overviews of open problems in computer science, targets a broad audience within the field seeking comprehensive insights into the latest developments. The journal welcomes articles from various fields as long as their content impacts the advancement of computer science. In particular, articles that review the application of well-known Computer Science methods to other areas are in scope only if these articles advance the fundamental understanding of those methods.
期刊最新文献
Image processing and artificial intelligence for apple detection and localization: A comprehensive review A systematic review on security aspects of fog computing environment: Challenges, solutions and future directions A survey of deep learning techniques for detecting and recognizing objects in complex environments Intervention scenarios and robot capabilities for support, guidance and health monitoring for the elderly Resilience of deep learning applications: A systematic literature review of analysis and hardening techniques
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1