Enhancing Cloud Security by Integrating Data Masking Techniques with AWS for Effective DDoS Prevention
Keywords:
Cloud security, DDoS prevention, Data masking, AWS, Threat detectionAbstract
Cloud computing has transformed how organizations store, process, and manage data, yet it introduces specific security challenges, especially in protecting against Distributed Denial of Service (DDoS) attacks. This paper proposes an integrated approach to enhance cloud security by combining data masking techniques with Amazon Web Services (AWS) for DDoS prevention. Through comprehensive experimentation and performance evaluation, we demonstrate the efficacy of data masking in protecting sensitive information while AWS DDoS prevention mechanisms effectively detect and mitigate attacks, ensuring the availability and integrity of online services. The integration of these techniques offers a holistic solution to cybersecurity, addressing both data protection and infrastructure resilience. Our findings address the importance of proactive defense strategies in mitigating the risk of DDoS attacks and highlight the potential implications for the industry in strengthening cloud security posture.
Downloads
References
Jyoti Swaroop and Sangeeta Sabharwal, “DDoS Attack Detection and Prevention in AWS Using Machine Learning",2020.
Jieying Bai and Bo Wu, "Design and Implementation of DDoS Detection and Prevention System Based on AWS",2021.
Samaher Alghamdi and Saleh Alnaeli, "Data Masking Techniques for Cloud Security: A Review",2020.
Rishi Anand and Preeti Sharma, "DDoS Protection in AWS: A Survey",2021.
Xuefeng Xu, Zhihong Tian, Hailong Feng, and Feng Liu,"DDoS Attack Detection and Defense in Cloud Computing: A Survey",2022.
S. S. Hussaini and M. T. Alresheedi ,"A Review of DDoS Attack Detection and Mitigation Techniques in Cloud Computing", 2021.
F. A. Alasiri and B. Alshahrani,"A Survey on DDoS Attacks and Mitigation Techniques in Cloud Computing",2021
A. Alghamdi and A. Alhadhrami "A Survey of DDoS Attack Prevention Techniques in Cloud Computing",2021.
Douligeris, C., & Mitrokotsa, A. "DDoS attacks and defense mechanisms: Classification and state-of-the-art." Comput. Netw. 2004, 44, 643–666.
Snehi, M., & Bhandari, A. "Vulnerability retrospection of security solutions for software-defined Cyber–Physical System against DDoS and IoT-DDoS attacks." Comput. Sci. Rev. 2021, 40, 100371.
Bhardwaj, A., Mangat, V., Vig, R., Halder, S., & Conti, M. "Distributed denial of service attacks in cloud: State-of-the-art of scientific and commercial solutions." Comput. Sci. Rev. 2021, 39, 100332.
Mishra, A., Gupta, N., & Gupta, B.B. "Defense mechanisms against DDoS attack based on entropy in SDN-cloud using POX controller." Telecommun. Syst. 2021, 77, 47–62.
Banitalebi Dehkordi, A., Soltanaghaei, M., & Boroujeni, F.Z. "The DDoS attacks detection through machine learning and statistical methods in SDN." J. Supercomput. 2021, 77, 2383–2415.
Amaizu, G.C., Nwakanma, C.I., Bhardwaj, S., Lee, J.M., & Kim, D.S. "Composite and efficient DDoS attack detection framework for B5G networks." Comput. Netw. 2021, 188, 107871.
Kumar, P., Kumar, R., Gupta, G.P., & Tripathi, R. "A Distributed framework for detecting DDoS attacks in smart contract-based Blockchain-IoT Systems by leveraging Fog computing." Trans. Emerg. Telecommun. Technol. 2021, 32, e4112.
Shohani, R.B., Mostafavi, S., & Hakami, V. "A statistical model for early detection of DDoS attacks on random targets in SDN." Wirel. Pers. Commun. 2021, 120, 379–400.
Gadallah, W.G., Omar, N.M., & Ibrahim, H.M. "Machine learning-based distributed denial of service attacks detection technique using new features in software-defined networks." Int. J. Comput. Netw. Inf. Secur. 2021, 13, 15–27.
Smys, S., Bestak, R., Palanisamy, R., & Kotuliak, I. (Eds.) Computer Networks and Inventive Communication Technologies: Proceedings of Fourth ICCNCT 2021. Springer, Singapore, 2021.
H. Almutairi, H. Alshalan, and M. A. Alshammari,"A Survey on DDoS Attacks and Their Detection and Mitigation Techniques in Cloud Computing",2021.
M. Alqahtani, M. Alenazi, and S. Al-Riyami ,"A Comprehensive Survey of DDoS Attack Mitigation Techniques in Cloud Computing: A Review", 2021.
F. Al-ahmad, A. Al-ahmad, and A. Alhalabi ,"A Review of DDoS Attack Detection and Mitigation Techniques in Cloud Computing",2022.
S. S. Al-Khafaji, S. J. Al-Haddad, and M. M. Al-Rubaye, "Mitigating DDoS Attacks in AWS Cloud Computing",2021.3
S. J. Al-Haddad and S. S. Al-Khafaji, "Enhancing Security in AWS Cloud Using DDoS Mitigation Techniques",2021.
T. Almarabeh, A. Yaseen, and R. Alzoubi, "DDoS Mitigation as a Service: An Overview," in Proceedings of the 2022 4th International Conference on Computer Science and Technologies in Education (CSTE 2022), 2022.
F. A. R. Alwabel and A. M. Alaa, "Protecting Web Applications Against DDoS Attacks Using AWS," in Proceedings of the 2022 3rd International Conference on Smart Grids and Energy Systems (SGES 2022), 2022.
A. Alsaggaf and S. Ahmed, "Towards Secure and Privacy-Preserving Machine Learning in IoT Networks with DDoS Prevention Using AWS," in Proceedings of the 2022 1st International Conference on Computational Intelligence in Internet of Things (CIoT 2022), 2022.
Downloads
Published
How to Cite
Issue
Section
License

This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
All papers should be submitted electronically. All submitted manuscripts must be original work that is not under submission at another journal or under consideration for publication in another form, such as a monograph or chapter of a book. Authors of submitted papers are obligated not to submit their paper for publication elsewhere until an editorial decision is rendered on their submission. Further, authors of accepted papers are prohibited from publishing the results in other publications that appear before the paper is published in the Journal unless they receive approval for doing so from the Editor-In-Chief.
IJISAE open access articles are licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. This license lets the audience to give appropriate credit, provide a link to the license, and indicate if changes were made and if they remix, transform, or build upon the material, they must distribute contributions under the same license as the original.