—Distributed denial of service (DDOS) attack constitutes one of the prominent cyber threats and a... more —Distributed denial of service (DDOS) attack constitutes one of the prominent cyber threats and among the hardest security problems in modern cyber world. This research work focuses on reviewing DDOS detection techniques and developing a numeric stable theoretical framework used for detecting various DDOS attacks in cloud. Main sections in the paper are devoted to review and analysis of algorithms used for detection of DDOS attacks. The framework theorized here deals with the variability calculation method in conjunction with sampling, searching methods to find a current state of a particular parameter under observation for detecting DDOS attacks. This way a solution is to build that measure the performance and conduct the monitoring framework to capture adversity related to DDOS attacks. The described algorithm intends to capture the current context value of the parameters that determine the reliability of the detection algorithm and the online pass algorithm helps to maintain the variability of those collected values thus maintaining numerical stability by doing robust statistical operations at endpoints of traffic in cloud based network.
— This paper explored the possible issues predominantly concerning the cloud computing security e... more — This paper explored the possible issues predominantly concerning the cloud computing security environment in context of recent DDOS attack trends. This paper also includes how attack vectors may be measured and observed continuously so that the new tactics of DDOS attackers and malicious act service providers are countered. It discusses the way thresholds may be calculated wrong to inherent nature of the DDOS attack floods in various quarters of cloud based network, and finally the way in which these thresholds can be more accurately computed in terms of detecting overload congestion approaching due to malicious flood of packets leading to denial of services and request calls to target resource in a cloud. 1. INTRODUCTION There is an established underground cyber criminal economy which works to achieve their private individual goals best known for their keen interest in spying or for competitive monetary gains, motives that are possible by the use of disruptive technologies like DDOS attack. Thus making the science of DDOS attacks ever evolving and growing in current context in such a manner that a continuous monitoring with sophisticated watchdog capabilities is required as these attacks continues to create online outrages, customer inconvenience and reputational damages across all industries and geographies. The best known victims of recent moves of these DDOS attacks[4],5] and those who have been successfully being able to mitigate such attacks can never get a sound sleep as it is apparent from current incidences of this attack globally. A recent attack on a cloud based online education site [1] was made target and DDOS attack leads to disruption of its services for more than business hours inspite of the fact that it had firewall protection with intrusion detection defense lines. The reason being that it was difficult to address as it was directed to the dedicated IP address rather than on the data centers as it was sourcing the malicious traffic that from diverse geographic sources. The attack became further intense with high sophistication tactics even after mitigation to secondary data center and were left with only one choice to either build a scrubbing center or hire a scrubbing center. As the primary work of the site is educational in nature, they were forced to get the services of the professional security experts and hire a scrubbing center [2].
—Distributed denial of service (DDOS) attack constitutes one of the prominent cyber threats and a... more —Distributed denial of service (DDOS) attack constitutes one of the prominent cyber threats and among the hardest security problems in modern cyber world. This research work focuses on reviewing DDOS detection techniques and developing a numeric stable theoretical framework used for detecting various DDOS attacks in cloud. Main sections in the paper are devoted to review and analysis of algorithms used for detection of DDOS attacks. The framework theorized here deals with the variability calculation method in conjunction with sampling, searching methods to find a current state of a particular parameter under observation for detecting DDOS attacks. This way a solution is to build that measure the performance and conduct the monitoring framework to capture adversity related to DDOS attacks. The described algorithm intends to capture the current context value of the parameters that determine the reliability of the detection algorithm and the online pass algorithm helps to maintain the variability of those collected values thus maintaining numerical stability by doing robust statistical operations at endpoints of traffic in cloud based network.
— This paper explored the possible issues predominantly concerning the cloud computing security e... more — This paper explored the possible issues predominantly concerning the cloud computing security environment in context of recent DDOS attack trends. This paper also includes how attack vectors may be measured and observed continuously so that the new tactics of DDOS attackers and malicious act service providers are countered. It discusses the way thresholds may be calculated wrong to inherent nature of the DDOS attack floods in various quarters of cloud based network, and finally the way in which these thresholds can be more accurately computed in terms of detecting overload congestion approaching due to malicious flood of packets leading to denial of services and request calls to target resource in a cloud. 1. INTRODUCTION There is an established underground cyber criminal economy which works to achieve their private individual goals best known for their keen interest in spying or for competitive monetary gains, motives that are possible by the use of disruptive technologies like DDOS attack. Thus making the science of DDOS attacks ever evolving and growing in current context in such a manner that a continuous monitoring with sophisticated watchdog capabilities is required as these attacks continues to create online outrages, customer inconvenience and reputational damages across all industries and geographies. The best known victims of recent moves of these DDOS attacks[4],5] and those who have been successfully being able to mitigate such attacks can never get a sound sleep as it is apparent from current incidences of this attack globally. A recent attack on a cloud based online education site [1] was made target and DDOS attack leads to disruption of its services for more than business hours inspite of the fact that it had firewall protection with intrusion detection defense lines. The reason being that it was difficult to address as it was directed to the dedicated IP address rather than on the data centers as it was sourcing the malicious traffic that from diverse geographic sources. The attack became further intense with high sophistication tactics even after mitigation to secondary data center and were left with only one choice to either build a scrubbing center or hire a scrubbing center. As the primary work of the site is educational in nature, they were forced to get the services of the professional security experts and hire a scrubbing center [2].
Uploads
Papers by Baldev SIngh