Author
Listed:
- Mohammad Alarqan
(School of Computer Sciences, Universiti Sains Malaysia, Malaysia)
- Bahari Belaton
(School of Computer Sciences, Universiti Sains Malaysia, Malaysia)
- Ammar Almomani
(Higher Colleges of Technology, UAE)
- Mohammad Alauthman
(University of Petra, Jordan)
- Mohammed Azmi Al-Betar
(Ajman University, UAE)
- Varsha Arya
(Hong Kong Metropolitan University, Hong Kong & Center for Interdisciplinary Research, University of Petroleum and Energy Studies (UPES), Dehradun, India & UCRD, Chandigarh University, Chandigarh, India)
Abstract
Distributed denial of service (DDoS) attacks have emerged as a critical challenge for cloud computing, impacting service availability and raising concerns among providers. Despite cloud computing's scalable and flexible architecture, its vulnerabilities make it an attractive target for attackers. This paper presents a comprehensive survey of DDoS attacks in cloud environments, focusing on detection mechanisms leveraging information theory. Key contributions include an analysis of cloud computing characteristics exploited by attackers, a taxonomy of DDoS attacks, and a discussion of effective anomaly detection approaches. Solutions based on information theory, encompassing detection parameters, metrics, and validation techniques, are reviewed for their ability to enhance security with high accuracy and low computational costs. This survey aims to guide researchers and practitioners in developing advanced defenses for cloud applications. Open issues and future research directions are identified to inspire further innovation in mitigating DDoS attacks.
Suggested Citation
Mohammad Alarqan & Bahari Belaton & Ammar Almomani & Mohammad Alauthman & Mohammed Azmi Al-Betar & Varsha Arya, 2025.
"Information Theory-Based DDoS Attack Detection in Cloud Computing: A Systematic Survey of Approaches, Challenges, and Future Directions,"
International Journal of Cloud Applications and Computing (IJCAC), IGI Global, vol. 15(1), pages 1-38, January.
Handle:
RePEc:igg:jcac00:v:15:y:2025:i:1:p:1-38
Download full text from publisher
Corrections
All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:igg:jcac00:v:15:y:2025:i:1:p:1-38. See general information about how to correct material in RePEc.
If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.
We have no bibliographic references for this item. You can help adding them by using this form .
If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.
For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Journal Editor (email available below). General contact details of provider: https://www.igi-global.com .
Please note that corrections may take a couple of weeks to filter through
the various RePEc services.