{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,17]],"date-time":"2025-10-17T14:11:21Z","timestamp":1760710281262,"version":"3.40.5"},"reference-count":23,"publisher":"IGI Global","issue":"3","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020,7,1]]},"abstract":"<p>Distributed denial of service (DDoS) attacks are some of the biggest threats to network performance and security today. With the advent of cloud computing, these attacks can be performed remotely on rented virtual machines (VMs), potentially increasing their capabilities and making them harder to trace and mitigate, and negatively affecting the cloud service provider as well. By analyzing packet transmission statistics, attacks can be detected on a virtual machine monitor (VMM) that controls the behavior of the VMs. This article proposes a solution to stop such detected attacks from the source, and analyses solutions proposed for a few different types of such attacks. The authors propose a model called selective cloud egress filter (SCEF) which implements specific modules to deal with detected attacks. If an attack is detected, the SCEF relays information to the VMM about which VMs are participating in the attack, allowing for specific corrective action.<\/p>","DOI":"10.4018\/ijcac.2020070104","type":"journal-article","created":{"date-parts":[[2020,6,11]],"date-time":"2020-06-11T14:29:12Z","timestamp":1591885752000},"page":"67-80","source":"Crossref","is-referenced-by-count":19,"title":["SCEF: A Model for Prevention of DDoS Attacks From the Cloud"],"prefix":"10.4018","volume":"10","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-6384-2294","authenticated-orcid":true,"given":"Ganeshayya Ishwarayya","family":"Shidaganti","sequence":"first","affiliation":[{"name":"Ramaiah Institute of Technology (Visvesvaraya Technological University), India"}]},{"given":"Amogh Shreedhar","family":"Inamdar","sequence":"additional","affiliation":[{"name":"Ramaiah Institute of Technology, India"}]},{"given":"Sindhuja V.","family":"Rai","sequence":"additional","affiliation":[{"name":"Ramaiah Institute of Technology, India"}]},{"given":"Anagha M.","family":"Rajeev","sequence":"additional","affiliation":[{"name":"Ramaiah Institute of Technology, India"}]}],"member":"2432","reference":[{"doi-asserted-by":"publisher","key":"IJCAC.2020070104-0","DOI":"10.1109\/COMST.2019.2934468"},{"doi-asserted-by":"publisher","key":"IJCAC.2020070104-1","DOI":"10.1007\/978-981-13-6031-2_34"},{"issue":"8","key":"IJCAC.2020070104-2","first-page":"1","article-title":"Efficient DDoS Attack Detection and Prevention Framework Using Two-Level Classification in Cloud Environment.","volume":"7","author":"A. A.Ali","year":"2018","journal-title":"International Journal of Computer Science and Mobile Computing"},{"doi-asserted-by":"publisher","key":"IJCAC.2020070104-3","DOI":"10.1007\/978-3-030-33582-3_66"},{"issue":"12","key":"IJCAC.2020070104-4","first-page":"187","article-title":"A Survey on Mitigation Techniques against DDoS Attacks on Cloud Computing Architecture.","volume":"28","author":"A.Bakr","year":"2019","journal-title":"International Journal of Advanced Science and Technology"},{"doi-asserted-by":"crossref","unstructured":"Bhosale, K. S., Nenova, M., & Iliev, G. (2017), The distributed denial of service attacks (DDoS) prevention mechanisms on application layer. In Proceedings of the 2017 13th International Conference on Advanced Technologies, Systems and Services in Telecommunications (TELSIKS) (pp. 136-139). Academic Press.","key":"IJCAC.2020070104-5","DOI":"10.1109\/TELSKS.2017.8246247"},{"doi-asserted-by":"publisher","key":"IJCAC.2020070104-6","DOI":"10.2991\/cmfe-15.2015.182"},{"key":"IJCAC.2020070104-7","first-page":"67","article-title":"Cloud-based DDoS attacks and defenses","author":"M.Darwish","year":"2013","journal-title":"International Conference on Information Society (i-Society 2013)"},{"issue":"8","key":"IJCAC.2020070104-8","article-title":"HoneyMesh: Preventing Distributed Denial of Service Attacks using Virtualized Honeypots.","volume":"4","author":"H. A.Deshpande","year":"2015","journal-title":"International Journal of Engineering Research & Technology"},{"doi-asserted-by":"crossref","unstructured":"Gupta, B. B., Joshi, R. C., and Misra, M. (2010), Distributed Denial of Service Prevention Techniques. International Journal of Computer and Electrical Engineering","key":"IJCAC.2020070104-9","DOI":"10.7763\/IJCEE.2010.V2.148"},{"doi-asserted-by":"crossref","unstructured":"He, Z., Zhang, T., & Lee, R. B. (2017), Machine Learning Based DDoS Attack Detection from Source Side in Cloud, 2017 IEEE 4th International Conference on Cyber Security and Cloud Computing (CSCloud), New York, NY, 2017, pp. 114-120.","key":"IJCAC.2020070104-10","DOI":"10.1109\/CSCloud.2017.58"},{"doi-asserted-by":"publisher","key":"IJCAC.2020070104-11","DOI":"10.1109\/ICCCI.2012.6158817"},{"key":"IJCAC.2020070104-12","first-page":"154","article-title":"Security Flaws of Operating System Against Live Device Attacks: A case study on live Linux distribution device","author":"M.Junaid Gul","year":"2019","journal-title":"2019 Sixth International Conference on Software Defined Systems (SDS)"},{"doi-asserted-by":"crossref","unstructured":"Karnwal, T., Sivakumar, T., & Aghila, G. (2012). A comber approach to protect cloud computing against XML DDoS and HTTP DDoS attack. In Proceedings of the2012 IEEE Students'Conference on Electrical, Electronics and Computer Science. IEEE Press.","key":"IJCAC.2020070104-13","DOI":"10.1109\/SCEECS.2012.6184829"},{"issue":"19","key":"IJCAC.2020070104-14","article-title":"DDoS Attack Prevention and Mitigation Techniques- A Review.","volume":"67","author":"D.Mahajan","year":"2013","journal-title":"International Journal of Computers and Applications"},{"doi-asserted-by":"publisher","key":"IJCAC.2020070104-15","DOI":"10.1109\/SDS.2018.8370441"},{"unstructured":"Oracle VirtualBox. (n.d.). Retrieved from https:\/\/www.virtualbox.org\/","key":"IJCAC.2020070104-16"},{"doi-asserted-by":"publisher","key":"IJCAC.2020070104-17","DOI":"10.1109\/FMEC.2019.8795312"},{"doi-asserted-by":"publisher","key":"IJCAC.2020070104-18","DOI":"10.1007\/s10586-017-1149-0"},{"unstructured":"Wikipedia. (n.d.). Denial of Service Attack. Retrieved from https:\/\/en.wikipedia.org\/wiki\/Denial-of-service_attack","key":"IJCAC.2020070104-19"},{"unstructured":"Wireshark. (n.d.). Retrieved from https:\/\/www.wireshark.org\/","key":"IJCAC.2020070104-20"},{"doi-asserted-by":"publisher","key":"IJCAC.2020070104-21","DOI":"10.1109\/SMARTCOMP.2017.7946998"},{"doi-asserted-by":"publisher","key":"IJCAC.2020070104-22","DOI":"10.1155\/2019\/4529757"}],"container-title":["International Journal of Cloud Applications and Computing"],"original-title":[],"language":"ng","link":[{"URL":"https:\/\/www.igi-global.com\/viewtitle.aspx?TitleId=256865","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,6]],"date-time":"2022-05-06T21:07:42Z","timestamp":1651871262000},"score":1,"resource":{"primary":{"URL":"https:\/\/services.igi-global.com\/resolvedoi\/resolve.aspx?doi=10.4018\/IJCAC.2020070104"}},"subtitle":[""],"short-title":[],"issued":{"date-parts":[[2020,7,1]]},"references-count":23,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2020,7]]}},"URL":"https:\/\/doi.org\/10.4018\/ijcac.2020070104","relation":{},"ISSN":["2156-1834","2156-1826"],"issn-type":[{"type":"print","value":"2156-1834"},{"type":"electronic","value":"2156-1826"}],"subject":[],"published":{"date-parts":[[2020,7,1]]}}}