Simulating DDoS Attacks in Cloud Computing: Resource Implications and Analysis
This study explores DDoS attack simulations on cloud computing services, specifically focusing on the interactions between malicious clients and resource controllers. It utilizes EC2, S3, and front-end nodes to analyze the performance impact of traffic bursts. By modeling attack scenarios, we examine how different node controllers (CLC, CC) respond to overwhelming traffic, evaluate resource measurement, and enhance security protocols. The findings aim to provide insights into mitigating risks associated with DDoS attacks in cloud environments, ensuring more resilient service operations.
Simulating DDoS Attacks in Cloud Computing: Resource Implications and Analysis
E N D
Presentation Transcript
DDoS Attack Simulation (3) Leases Resources Malicious Client ClC & CC Node Controllers DDoS Attacks Target System (1) Services (2) Simulation Scenario Cloud Computing -> Service Cloud Computing -> CLC & CC in Cloud Computing Cloud Resource Measurement & Analysis Target Cloud System ClC & CC Node Controllers
Client1 EC2ools S3 Tools Front-end Node Users, Key-pairs, Image Metadata CLC Walrus Cluster A Cluster B CC SC SC CC NC NC Each Node
Target System DDoS Attack Source System Traffic (a) Traffic Src (b) Tg Cloud Burst Attack Traffic Traffic Time Time Tg