PROTECTING CLOUD SERVICE PROVIDERS AGAINST DENIAL OF SERVICE ATTACKS
Ms. C. Janani
II year ME (CSE), Shree Venkateshwara Hi-Tech Engg College, Gobi
Dr. T. Senthil Prakash
Professor & HOD, Shree Venkateshwara Hi-Tech Engg College, Gobi
Ms. K. SriSathiya
II year ME (CSE), Shree Venkateshwara Hi-Tech Engg College, Gobi
Receiving Date:
2015-12-10
Acceptance Date:
2016-01-07
Publication Date:
2016-02-10
Download PDF
Abstract
Cloud Computing allows customers to access cloud resources and services. On-demand, selfservice and pay-by-use business model are adapted for the cloud resource sharing process. Service level
agreements (SLA) regulate the cost for the services that are provided for the customers. Cloud data
centers are employed to share data values to the users. Denial-of-Service (DoS) attack is an attempt by
attacker to prevent legitimate users from using resources. Distributed Denial of Service (DDoS) Attacks
are generated in a “many to one” dimension. In DDoS attack model Large number of compromised host
are gathered to send useless service requests, packets at the same time .DoS and DDoS attacks initiates
the service degradation, availability and cost problems under cloud service providers.
Brute-force attacks are raised against through specific periodic, pulsing and low-rate traffic
patterns. Rate-controlling, time-window, worst-case threshold and pattern-matching are adapted to
discriminate the legitimate and attacker activities. Stealthy attack patterns are raised against applications
running in the cloud. Slowly-Increasing- Polymorphic DDoS Attack Strategy (SIPDAS) can be applied to
initiate application vulnerabilities. SIPDAS degrades the service provided by the target application
server running in the cloud. Polymorphic attacks changes the message sequence at every successive
infection to avoid signature detection process. Slowly-increasing polymorphic behavior induces enough
overloads on the target system. XML-based DoS (XDoS) attacks to the web-based systems are applied as
the testing environment for the attack detection process.
Keywords:
Cloud Computing ; Rate-controlling ; Environment ; Adapted
References
- M. C. Mont, K. McCorry, N. Papanikolaou, and S. Pearson, “Security and privacy governance in cloud computing via SLAS and a policy orchestration service,” in Proc. 2nd Int. Conf. Cloud Comput. Serv. Sci., 2012, pp. 670–674.
- S. Malek and S. Salvatore, “Detecting masqueraders: A comparison of one-class bag-ofwords user behavior modeling techniques,” in Proc. 2nd Int. Workshop Managing Insider Security Threats, Morioka, Iwate, Japan. Jun. 2010, pp. 3–13.
- A. S. Sodiya, O. Folorunso, S. A. Onashoga, and P. O. Ogundeyi, “An improved semi-global alignment algorithm for masquerade detection,” Int. J. Netw. Security, vo1. 12, no. 3, pp. 211– 220, May 2011.
- Yongdong Wu, Zhigang Zhao, Feng Bao and Robert H. Deng, “Software Puzzle: A Countermeasure to Resource-Inflated Denial-of-Service Attacks”, IEEE Transactions On Information Forensics And Security, Vol. 10, No. 1, January 2015
- Hisham A. Kholidy, Fabrizio Baiardi and Salim Hariri, “DDSGA: A Data-Driven SemiGlobal Alignment Approach for Detecting Masquerade Attacks”, IEEE Transactions On Dependable And Secure Computing, Vol. 12, No. 2, March/April 2015
- Subrat Kumar Dash, K. S. Reddy, and K. A. Pujari, “Adaptive Naive Bayes method for masquerade detection”, Security Commun. Netw., vol. 4, no. 4, pp. 410–417, 2011.
- Guojun Wang, Felix Musau, Song Guo and Muhammad Bashir Abdullahi, “Neighbor Similarity Trust against Sybil Attack in P2P E-Commerce”, IEEE Transactions On Parallel And Distributed Systems, Vol. 26, No. 3, March 2015
- X. Xu, X. Guo, and S. Zhu, “A queuing analysis for low-rate DoS attacks against application servers,” in Proc. IEEE Int. Conf. Wireless Commun., Netw. Inf. Security, 2010, pp. 500–504.
- L. Wang, Z. Li, Y. Chen, Z. Fu, and X. Li, “Thwarting zero-day polymorphic worms with network-level length-based signature generation,” IEEE/ACM Trans. Netw., vol. 18, no. 1, pp. 53–66, Feb. 2010.
- A. Chonka, Y. Xiang, W. Zhou, and A. Bonti, “Cloud security defense to protect cloud computing against HTTP-DOS and XMLDoS attacks,” J. Netw. Comput. Appl., vol. 34, no. 4, pp. 1097–1107, Jul. 2011.
- D. Petcu, C. Craciun, M. Neagul, S. Panica, B. Di Martino, S. Venticinque, M. Rak, and R. Aversa, “Architecturing a sky computing platform,” in Proc. Int. Conf. Towards Serv.-Based Int., 2011, vol. 6569, pp. 1-13.
Back