Details

PROTECTING CLOUD SERVICE PROVIDERS AGAINST DENIAL OF SERVICE ATTACKS

Ms. C. Janani

II year ME (CSE), Shree Venkateshwara Hi-Tech Engg College, Gobi

Dr. T. Senthil Prakash

Professor & HOD, Shree Venkateshwara Hi-Tech Engg College, Gobi

Ms. K. SriSathiya

II year ME (CSE), Shree Venkateshwara Hi-Tech Engg College, Gobi

110-118

Vol: 6, Issue: 1, 2016

Receiving Date: 2015-12-10 Acceptance Date:

2016-01-07

Publication Date:

2016-02-10

Download PDF

Abstract

Cloud Computing allows customers to access cloud resources and services. On-demand, selfservice and pay-by-use business model are adapted for the cloud resource sharing process. Service level agreements (SLA) regulate the cost for the services that are provided for the customers. Cloud data centers are employed to share data values to the users. Denial-of-Service (DoS) attack is an attempt by attacker to prevent legitimate users from using resources. Distributed Denial of Service (DDoS) Attacks are generated in a “many to one” dimension. In DDoS attack model Large number of compromised host are gathered to send useless service requests, packets at the same time .DoS and DDoS attacks initiates the service degradation, availability and cost problems under cloud service providers. Brute-force attacks are raised against through specific periodic, pulsing and low-rate traffic patterns. Rate-controlling, time-window, worst-case threshold and pattern-matching are adapted to discriminate the legitimate and attacker activities. Stealthy attack patterns are raised against applications running in the cloud. Slowly-Increasing- Polymorphic DDoS Attack Strategy (SIPDAS) can be applied to initiate application vulnerabilities. SIPDAS degrades the service provided by the target application server running in the cloud. Polymorphic attacks changes the message sequence at every successive infection to avoid signature detection process. Slowly-increasing polymorphic behavior induces enough overloads on the target system. XML-based DoS (XDoS) attacks to the web-based systems are applied as the testing environment for the attack detection process.

Keywords: Cloud Computing ; Rate-controlling ; Environment ; Adapted

References

  1. M. C. Mont, K. McCorry, N. Papanikolaou, and S. Pearson, “Security and privacy governance in cloud computing via SLAS and a policy orchestration service,” in Proc. 2nd Int. Conf. Cloud Comput. Serv. Sci., 2012, pp. 670–674.
  2. S. Malek and S. Salvatore, “Detecting masqueraders: A comparison of one-class bag-ofwords user behavior modeling techniques,” in Proc. 2nd Int. Workshop Managing Insider Security Threats, Morioka, Iwate, Japan. Jun. 2010, pp. 3–13.
  3. A. S. Sodiya, O. Folorunso, S. A. Onashoga, and P. O. Ogundeyi, “An improved semi-global alignment algorithm for masquerade detection,” Int. J. Netw. Security, vo1. 12, no. 3, pp. 211– 220, May 2011.
  4. Yongdong Wu, Zhigang Zhao, Feng Bao and Robert H. Deng, “Software Puzzle: A Countermeasure to Resource-Inflated Denial-of-Service Attacks”, IEEE Transactions On Information Forensics And Security, Vol. 10, No. 1, January 2015
  5. Hisham A. Kholidy, Fabrizio Baiardi and Salim Hariri, “DDSGA: A Data-Driven SemiGlobal Alignment Approach for Detecting Masquerade Attacks”, IEEE Transactions On Dependable And Secure Computing, Vol. 12, No. 2, March/April 2015
  6. Subrat Kumar Dash, K. S. Reddy, and K. A. Pujari, “Adaptive Naive Bayes method for masquerade detection”, Security Commun. Netw., vol. 4, no. 4, pp. 410–417, 2011.
  7. Guojun Wang, Felix Musau, Song Guo and Muhammad Bashir Abdullahi, “Neighbor Similarity Trust against Sybil Attack in P2P E-Commerce”, IEEE Transactions On Parallel And Distributed Systems, Vol. 26, No. 3, March 2015
  8. X. Xu, X. Guo, and S. Zhu, “A queuing analysis for low-rate DoS attacks against application servers,” in Proc. IEEE Int. Conf. Wireless Commun., Netw. Inf. Security, 2010, pp. 500–504.
  9. L. Wang, Z. Li, Y. Chen, Z. Fu, and X. Li, “Thwarting zero-day polymorphic worms with network-level length-based signature generation,” IEEE/ACM Trans. Netw., vol. 18, no. 1, pp. 53–66, Feb. 2010.
  10. A. Chonka, Y. Xiang, W. Zhou, and A. Bonti, “Cloud security defense to protect cloud computing against HTTP-DOS and XMLDoS attacks,” J. Netw. Comput. Appl., vol. 34, no. 4, pp. 1097–1107, Jul. 2011.
  11. D. Petcu, C. Craciun, M. Neagul, S. Panica, B. Di Martino, S. Venticinque, M. Rak, and R. Aversa, “Architecturing a sky computing platform,” in Proc. Int. Conf. Towards Serv.-Based Int., 2011, vol. 6569, pp. 1-13.
Back

Disclaimer: Indexing of published papers is subject to the evaluation and acceptance criteria of the respective indexing agencies. While we strive to maintain high academic and editorial standards, International Journal of Research in Science and Technology does not guarantee the indexing of any published paper. Acceptance and inclusion in indexing databases are determined by the quality, originality, and relevance of the paper, and are at the sole discretion of the indexing bodies.

We are one of the best in the field of watches and we take care of the needs of our customers and produce replica watches of very good quality as per their demands.
BOOSTERJP BOOSTERJP BOOSTERJP BOOSTERJP SUPERJP ELANG212 ELANG212 GORI77 GORI77 GORI77 GORI77 GORI77 WINSTRIKE69 WINSTRIKE69 WINSTRIKE69 WINSTRIKE69 CLAN4D CLAN4D DINAMIT4D DINAMIT4D VIRAL88 VIRAL88 SAMSONBET86 PAKONG86 JAGOAN86 LINABET69 KAPTENJACKPOT KAPTENJACKPOT GILAJP boosterjp boosterjp boosterjp boosterjp boosterjp boosterjp boosterjp boosterjp boosterjp boosterjp boosterjp BOOSTERJP BOOSTERJP BOOSTERJP BOOSTERJP WINSTRIKE69 WINSTRIKE69 WINSTRIKE69 WINSTRIKE69