DDTA-DDoS Defense Techniques and Attributes to Integrate Smart Grid and Cloud

IJCSEC Front Page
Smart Grid (SG) constitutes business and operational challenges for utility companies and energy suppliers and those are easily met by Cloud Computing (CC). From the distributed property of CC and SG it is unable to be avoided that the two methodologies will become integrated. Here I discuss about the opportunities and risks that CC gives to utility companies and energy suppliers, and consider what inseparable elements of CC may be capable of improving Distributed Denial of Service (DDoS) defense for SG. A prolonged literature survey is executed to identify which DDoS defense methods can be raised by CC and used to defend the SG. I propose that, when risks are suitably mitigated, the deployment of CC is known to be overall advantage, where its inseparable elements can be combined to make the SG highly secure and help in mitigation of a crippling DDoS attack.

Keywords:Smart Grid, Cloud Computing, Cyber Security, DDoS attack, DDTA


  1. S. Goel, S. F. Bush, and D. Bakken, IEEE Vision for Smart Grid Communications: 2030 and Beyond. IEEE, 2013.
  2. Y. Mo, T. H.-J. Kim, K. Brancik, D. Dickinson, H. Lee, A. Perrig, and B. Sinopoli, “Cyber-physical security of a smart grid infrastructure,” Proceedings of the IEEE, vol. 100, no. 1, pp. 195–209, 2012.
  3. R. E. Brown, “Impact of smart grid on distribution system design,” in Power and Energy Society General Meeting-Conversion and Delivery of Electrical Energy in the 21st Century, 2008 IEEE. IEEE, 2008, pp. 1–4.
  4. M. Yigit, V. C. Gungor, and S. Baktir, “Cloud computing for smart grid applications,” Computer Networks, vol. 70, pp. 312–329, 2014.
  5. X. Fang, D. Yang, and G. Xue, “Evolving smart grid information management cloudward: A cloud optimization perspective,” Smart Grid, IEEE Transactions on, vol. 4, no. 1, pp. 111–119, 2013.
  6. S. Goel, “Anonymity vs. security: The right balance for the smart grid,”Communications of the Association for Information Systems, vol. 36, no. 1, p. 2, 2015.
  7. D. Wei, Y. Lu, M. Jafari, P. M. Skare, and K. Rohde, “Protecting smart grid automation systems against cyberattacks,” Smart Grid, IEEE Transactions on, vol. 2, no. 4, pp. 782–795, 2011.
  8. J. Liu, Y. Xiao, S. Li, W. Liang, and C. Chen, “Cyber security and privacy issues in smart grids,” Communications Surveys & Tutorials, IEEE, vol. 14, no. 4, pp. 981–997, 2012.
  9. A. Wokutch, “The role of non-utility service providers in smart grid development: Should they be regulated, and if so, who can regulate them?” Journal of Telecommunications and High Technology Law, vol. 9, p. 531, 2011.
  10. S. Iyer, “Cyber security for smart grid, cryptography, and privacy,”International Journal of Digital Multimedia Broadcasting, vol. 2011, 2011.
  11. J. Mirkovic and P. Reiher, “A taxonomy of ddos attack and ddos defense mechanisms,” ACM SIGCOMM Computer Communication Review, vol. 34, no. 2, pp. 39–53, 2004.
  12. W. Wang and Z. Lu, “Cyber security in the smart grid: Survey and challenges,” Computer Networks, vol. 57, no. 5, pp. 1344–1371, 2013.
  13. A. Hahn, A. Ashok, S. Sridhar, and M. Govindarasu, “Cyber-physical security testbeds: Architecture, application, and evaluation for smart grid,” Smart Grid, IEEE Transactions on, vol. 4, no. 2, pp. 847–855, 2013.
  14. T. Karnwal, T. Sivakumar, and G. Aghila, “A comber approach to protect cloud computing against xml ddos and http ddos attack,” in Electrical, Electronics and Computer Science (SCEECS), 2012 IEEE Students’ Conference on. IEEE, 2012, pp. 1–5.
  15. A. G. Tartakovsky, B. L. Rozovskii, R. B. Blazek, and H. Kim, “A novel approach to detection of intrusions in computer networks via adaptive sequential and batch-sequential change-point detection methods,” Signal Processing, IEEE Transactions on, vol. 54, no. 9, pp. 3372–3382, 2006.
  16. Z. M. Fadlullah, M. M. Fouda, N. Kato, X. Shen, and Y. Nozaki, “An early warning system against malicious activities for smart grid communications,” Network, IEEE, vol. 25, no. 5, pp. 50–55, 2011.
  17. S. Goel, Y. Hong, V. Papakonstantinou, and D. Kloza, “Smart grid security,” SpringerBriefs in Cybersecurity, 2015.
  18. B. P. Rimal, E. Choi, and I. Lumb, “A taxonomy and survey of cloud computing systems,” in INC, IMS and IDC, 2009. NCM’09. Fifth International Joint Conference on. IEEE, 2009, pp. 44–51.
  19. E. Brynjolfsson, P. Hofmann, and J. Jordan, “Cloud computing and electricity: beyond the utility model,” Communications of the ACM, vol. 53, no. 5, pp. 32–34, 2010.
  20. M. T. Khorshed, A. S. Ali, and S. A. Wasimi, “A survey on gaps, threat remediation challenges and some thoughts for proactive attack detection in cloud computing,” Future Generation computer systems, vol. 28, no. 6, pp. 833–851, 2012.
  21. L. Zheng, S. Chen, Y. Hu, and J. He, “Applications of cloud computing in the smart grid,” in Artificial Intelligence, Management Science and Electronic Commerce (AIMSEC), 2011 2nd International Conference on. IEEE, 2011, pp. 203–206.
  22. D. S. Markovic, D. Zivkovic, I. Branovic, R. Popovic, and D. Cvetkovic, “Smart power grid and cloud computing,” Renewable and Sustainable Energy Reviews, vol. 24, pp. 566–577, 2013.
  23. G. C. Wilshusen, Information Security: Federal Guidance Needed to Address Control Issues with Implementing Cloud Computing. DIANE Publishing, 2010.
  24. F. Luo, Z. Y. Dong, Y. Chen, Y. Xu, K. Meng, and K. P. Wong, “Hybrid cloud computing platform: the next generation it backbone for smart grid,” in Power and Energy Society General Meeting. IEEE, 2012, pp. 1–7.
  25. Y. Dai, Y. Xiang, and G. Zhang, “Self-healing and hybrid diagnosis in cloud computing,” in Cloud computing. Springer, 2009, pp. 45–56.
  26. A. Bakshi and B. Yogesh, “Securing cloud from ddos attacks using intrusion detection system in virtual machine,” in Communication Soft-ware and Networks, 2010. ICCSN’10. Second International Conference on. IEEE, 2010, pp. 260–264.
  27. M. Darwish, A. Ouda, and L. F. Capretz, “Cloud-based ddos attacks and defenses,” in Information Society (i-Society), 2013 International Conference on. IEEE, 2013, pp. 67–71.
  28. T. Peng, C. Leckie, and K. Ramamohanarao, “Survey of network-based defense mechanisms countering the dos and ddos problems,” ACM Computing Surveys (CSUR), vol. 39, no. 1, p. 3, 2007.
  29. K. Park and H. Lee, “On the effectiveness of route-based packet filtering for distributed dos attack prevention in power-law internets,” in ACM SIGCOMM Computer Communication Review, vol. 31, no. 4. ACM, 2001, pp. 15–26.
  30. L. Spitzner, Honeypots: tracking hackers. Addison-Wesley Reading, 2003, vol. 1.
  31. S. Biedermann, M. Mink, and S. Katzenbeisser, “Fast dynamic extracted honeypots in cloud computing,” in Proceedings of the 2012 ACM Workshop on Cloud computing security workshop. ACM, 2012, pp. 13–18.
  32. G. Carl, G. Kesidis, R. R. Brooks, and S. Rai, “Denial-of-service attack-detection techniques,” Internet Computing, IEEE, vol. 10, no. 1, pp. 82–89, 2006.
  33. R. Mahajan, S. M. Bellovin, S. Floyd, J. Ioannidis, V. Paxson, and S. Shenker, “Controlling high bandwidth aggregates in the network,” ACM SIGCOMM Computer Communication Review, vol. 32, no. 3, pp. 62–73, 2002.
  34. T. M. Gil and M. Poletto, “Multops: a data-structure for bandwidth attack detection,” in USENIX Security Symposium, 2001.
  35. S. R. Ghanti and G. Naik, “Protection of server from syn flood attack,” Journal Impact Factor, vol. 5, no. 11, pp. 37–46, 2014.
  36. K. Choi, X. Chen, S. Li, M. Kim, K. Chae, and J. Na, “Intrusion detection of nsm based dos attacks using data mining in smart grid,” Energies, vol. 5, no. 10, pp. 4091–4109, 2012.
  37. T. Vissers, T. S. Somasundaram, L. Pieters, K. Govindarajan, and P. Hellinckx, “Ddos defense system for web services in a cloud environment,” Future Generation Computer Systems, vol. 37, pp. 37–45, 2014.
  38. A. Chonka, Y. Xiang, W. Zhou, and A. Bonti, “Cloud security defence to protect cloud computing against http-dos and xml-dos attacks,” Journal of Network and Computer Applications, vol. 34, no. 4, pp. 1097–1107, 2011.
  39. A. C. Snoeren, C. Partridge, L. A. Sanchez, C. E. Jones, F. Tchakountio,S. T. Kent, and W. T. Strayer, “Hash-based ip traceback,” in ACM SIGCOMM Computer Communication Review, vol. 31, no. 4. ACM, 2001, pp. 3–14.
  40. M. Sung and J. Xu, “Ip traceback-based intelligent packet filtering: a novel technique for defending against internet ddos attacks,” Parallel and Distributed Systems, IEEE Transactions on, vol. 14, no. 9, pp. 861– 872, 2003.
  41. A. Mitrokotsa and C. Douligeris, “Denial-of-service attacks,” Network Security: Current Status and Future Directions, pp. 117–134, 2007.
  42. C. Douligeris and A. Mitrokotsa, “Ddos attacks and defense mecha-nisms: classification and state-of-the-art,” Computer Networks, vol. 44, no. 5, pp. 643–666, 2004.
  43. M. Randles, D. Lamb, and A. Taleb-Bendiab, “A comparative study into distributed load balancing algorithms for cloud computing,” in Ad-vanced Information Networking and Applications Workshops (WAINA), 2010 IEEE 24th International Conference on. IEEE, 2010, pp. 551– 556.