IRMA-International.org: Creator of Knowledge
Information Resources Management Association
Advancing the Concepts & Practices of Information Resources Management in Modern Organizations

Information Theory-Based DDoS Attack Detection in Cloud Computing: A Systematic Survey of Approaches, Challenges, and Future Directions

Information Theory-Based DDoS Attack Detection in Cloud Computing: A Systematic Survey of Approaches, Challenges, and Future Directions
View Sample PDF
Author(s): Mohammad Alarqan (School of Computer Sciences, Universiti Sains Malaysia, Malaysia), Bahari Belaton (School of Computer Sciences, Universiti Sains Malaysia, Malaysia), Ammar Almomani (Higher Colleges of Technology, UAE), Mohammad Alauthman (University of Petra, Jordan), Mohammed Azmi Al-Betar (Ajman University, UAE)and Varsha Arya (Hong Kong Metropolitan University, Hong Kong & Center for Interdisciplinary Research, University of Petroleum and Energy Studies (UPES), Dehradun, India & UCRD, Chandigarh University, Chandigarh, India)
Copyright: 2025
Volume: 15
Issue: 1
Pages: 38
Source title: International Journal of Cloud Applications and Computing (IJCAC)
Editor(s)-in-Chief: B. B. Gupta (Asia University, Taichung City, Taiwan)
DOI: 10.4018/IJCAC.369817

Purchase


Abstract

Distributed denial of service (DDoS) attacks have emerged as a critical challenge for cloud computing, impacting service availability and raising concerns among providers. Despite cloud computing's scalable and flexible architecture, its vulnerabilities make it an attractive target for attackers. This paper presents a comprehensive survey of DDoS attacks in cloud environments, focusing on detection mechanisms leveraging information theory. Key contributions include an analysis of cloud computing characteristics exploited by attackers, a taxonomy of DDoS attacks, and a discussion of effective anomaly detection approaches. Solutions based on information theory, encompassing detection parameters, metrics, and validation techniques, are reviewed for their ability to enhance security with high accuracy and low computational costs. This survey aims to guide researchers and practitioners in developing advanced defenses for cloud applications. Open issues and future research directions are identified to inspire further innovation in mitigating DDoS attacks.

Related Content

Sanjay P. Ahuja, Inan Kaddour. © 2025. 35 pages.
Ana Kundai Muchandigona. © 2025. 28 pages.
Sarvesh Chand. © 2025. 19 pages.
Mohamed Arif Al Ali, Mohammad Mohammad Khan. © 2025. 27 pages.
Mohammad Alarqan, Bahari Belaton, Ammar Almomani, Mohammad Alauthman, Mohammed Azmi Al-Betar, Varsha Arya. © 2025. 38 pages.
Muhamad Raihan, Heny Kurniawati. © 2025. 30 pages.
Nesreen Otoum, Ali Al Maqousi, Mohammad Alauthman, Ammar Almomani. © 2025. 27 pages.
Body Bottom