Details

PROTECTING CLOUD SERVICE PROVIDERS AGAINST DENIAL OF SERVICE ATTACKS

Ms. C. Janani

II year ME (CSE), Shree Venkateshwara Hi-Tech Engg College, Gobi

Dr. T. Senthil Prakash

Professor & HOD, Shree Venkateshwara Hi-Tech Engg College, Gobi

Ms. K. SriSathiya

II year ME (CSE), Shree Venkateshwara Hi-Tech Engg College, Gobi

110-118

Vol: 6, Issue: 1, 2016

Receiving Date: 2015-12-10 Acceptance Date:

2016-01-07

Publication Date:

2016-02-10

Download PDF

Abstract

Cloud Computing allows customers to access cloud resources and services. On-demand, selfservice and pay-by-use business model are adapted for the cloud resource sharing process. Service level agreements (SLA) regulate the cost for the services that are provided for the customers. Cloud data centers are employed to share data values to the users. Denial-of-Service (DoS) attack is an attempt by attacker to prevent legitimate users from using resources. Distributed Denial of Service (DDoS) Attacks are generated in a “many to one” dimension. In DDoS attack model Large number of compromised host are gathered to send useless service requests, packets at the same time .DoS and DDoS attacks initiates the service degradation, availability and cost problems under cloud service providers. Brute-force attacks are raised against through specific periodic, pulsing and low-rate traffic patterns. Rate-controlling, time-window, worst-case threshold and pattern-matching are adapted to discriminate the legitimate and attacker activities. Stealthy attack patterns are raised against applications running in the cloud. Slowly-Increasing- Polymorphic DDoS Attack Strategy (SIPDAS) can be applied to initiate application vulnerabilities. SIPDAS degrades the service provided by the target application server running in the cloud. Polymorphic attacks changes the message sequence at every successive infection to avoid signature detection process. Slowly-increasing polymorphic behavior induces enough overloads on the target system. XML-based DoS (XDoS) attacks to the web-based systems are applied as the testing environment for the attack detection process.

Keywords: Cloud Computing ; Rate-controlling ; Environment ; Adapted

References

  1. M. C. Mont, K. McCorry, N. Papanikolaou, and S. Pearson, “Security and privacy governance in cloud computing via SLAS and a policy orchestration service,” in Proc. 2nd Int. Conf. Cloud Comput. Serv. Sci., 2012, pp. 670–674.
  2. S. Malek and S. Salvatore, “Detecting masqueraders: A comparison of one-class bag-ofwords user behavior modeling techniques,” in Proc. 2nd Int. Workshop Managing Insider Security Threats, Morioka, Iwate, Japan. Jun. 2010, pp. 3–13.
  3. A. S. Sodiya, O. Folorunso, S. A. Onashoga, and P. O. Ogundeyi, “An improved semi-global alignment algorithm for masquerade detection,” Int. J. Netw. Security, vo1. 12, no. 3, pp. 211– 220, May 2011.
  4. Yongdong Wu, Zhigang Zhao, Feng Bao and Robert H. Deng, “Software Puzzle: A Countermeasure to Resource-Inflated Denial-of-Service Attacks”, IEEE Transactions On Information Forensics And Security, Vol. 10, No. 1, January 2015
  5. Hisham A. Kholidy, Fabrizio Baiardi and Salim Hariri, “DDSGA: A Data-Driven SemiGlobal Alignment Approach for Detecting Masquerade Attacks”, IEEE Transactions On Dependable And Secure Computing, Vol. 12, No. 2, March/April 2015
  6. Subrat Kumar Dash, K. S. Reddy, and K. A. Pujari, “Adaptive Naive Bayes method for masquerade detection”, Security Commun. Netw., vol. 4, no. 4, pp. 410–417, 2011.
  7. Guojun Wang, Felix Musau, Song Guo and Muhammad Bashir Abdullahi, “Neighbor Similarity Trust against Sybil Attack in P2P E-Commerce”, IEEE Transactions On Parallel And Distributed Systems, Vol. 26, No. 3, March 2015
  8. X. Xu, X. Guo, and S. Zhu, “A queuing analysis for low-rate DoS attacks against application servers,” in Proc. IEEE Int. Conf. Wireless Commun., Netw. Inf. Security, 2010, pp. 500–504.
  9. L. Wang, Z. Li, Y. Chen, Z. Fu, and X. Li, “Thwarting zero-day polymorphic worms with network-level length-based signature generation,” IEEE/ACM Trans. Netw., vol. 18, no. 1, pp. 53–66, Feb. 2010.
  10. A. Chonka, Y. Xiang, W. Zhou, and A. Bonti, “Cloud security defense to protect cloud computing against HTTP-DOS and XMLDoS attacks,” J. Netw. Comput. Appl., vol. 34, no. 4, pp. 1097–1107, Jul. 2011.
  11. D. Petcu, C. Craciun, M. Neagul, S. Panica, B. Di Martino, S. Venticinque, M. Rak, and R. Aversa, “Architecturing a sky computing platform,” in Proc. Int. Conf. Towards Serv.-Based Int., 2011, vol. 6569, pp. 1-13.
Back

Disclaimer: All papers published in IJRST will be indexed on Google Search Engine as per their policy.

We are one of the best in the field of watches and we take care of the needs of our customers and produce replica watches of very good quality as per their demands.