Academia.edu no longer supports Internet Explorer.
To browse Academia.edu and the wider internet faster and more securely, please take a few seconds to upgrade your browser.
2015, Lecture Notes in Computer Science
…
8 pages
1 file
Distributed Denial of Service (DDoS) attack is a complex security challenge for growth of Cloud Computing. DDoS attack is very easy to apply, difficult to prevent and hard to identify because attacker can spoof the IP address of itself for hiding the identity of himself. In this paper, we present a Third Party Auditor (TPA) based efficient DDoS detection and prevention technique which has the strong identification factor based on these weaknesses. It has less overhead at the user end. Thus, we target various aspects of prevention of DDoS attack in the Cloud environment. Keywords: Cloud computing • DoS attack • DDoS attack • Third party auditor (TPA) • Dempster shafer theory (DST)
Iran Journal of Computer Science, 2019
Distributed denial of service (DDoS) attack is one of the prominent risk factors for the development of cloud service. It is a very hard task for novice cloud users to identify the real source of DDoS attack because the attacker spoofs the Internet Protocol and Media Access Control addresses. To address this problem, we propose a third party auditor-based packet traceback approach. The method uses Weibull distribution for analyzing the source of the DDoS attack. The approach provides an efficient and fruitful solution because of its strong identification factor. The identification factor depends on the weaknesses left by the intruder. We analyze the traffic pattern to generate attack alert for different cloud users. The advantage of this approach is that it reduces the overhead on the cloud user. With the help of Weibull distribution, we can easily obtain the availability, reliability and median life of DDoS defense in the cloud environment. To demonstrate our approach, we implement an application based on Hadoop and MapReduce framework. We tested this application based on various parameters. Our method has shown the tremendous improvement over the other state of the art methods. The experimental results are included to show the effectiveness of the proposed method for DDoS attack prevention and mitigation.
Cloud computing is a distributive and scalable computing architecture. It provides sharing of data and other resources which are accessible from any part of the world for a very low cost. However, Security is one major concern for such computing environment. Distributed Denial of Service (DDoS) is an attack that consumes all the cloud resources may have making it unavailable to other general users. This paper identifies characteristics of DDoS attack and provides an Intrusion Detection System (IDS) tool based on Snort to detect DDoS. The proposed tool will alert the network administrator regarding any attack for any possible resources and the nature of the attack. Also, it suspends the attacker for some time to allow the network admin to implement a fall back plan. As Snort is an open source system, modifying different parameters of the system showed a significant aid in not only detection of DDoS, but also reduction the time for the down time of the network. The proposed tool helps minimize the effect of DDoS by detecting the attack at very early stage and by altering with various parameters which facilitates easy diagnose of the problem.
Cluster Computing, 2019
Distributed denial of service (DDoS) attack is one of the prominent risk factors for the development of cloud service. It is a very hard task for novice cloud users to identify the real source of DDoS attack because of the attacker spoofs the internet protocol (IP) and media access control (MAC) addresses. To address this problem, we propose a third party auditor (TPA) based packet traceback approach. The method uses Weibull distribution for analyzing the source of the DDoS attack. The approach provides an efficient and fruitful solution because of its strong identification factor. The identification factor depends upon the weaknesses left by the intruder. We analyze the traffic pattern to generate attack alert for different cloud users. The advantage of this approach is that it reduces the overhead on the cloud user. With the help of Weibull distribution, we can easily obtain the availability, reliability and median life of DDoS defense in the cloud environment. To demonstrate our approach, we implement an application based on Hadoop and MapReduce framework. We tested this application based on various parameters. Our method has shown the tremendous improvement over the other state of the art methods. The experimental results are included to show the effectiveness of the proposed method for DDoS attack prevention and mitigation.
International Journal of Advanced Computer Science and Applications
Cloud computing (CC) is an advanced technology that provides data sharing and access to computing resources. The cloud deployment model represents the exact type of cloud environment based on ownership, size, and accessibility rights, and also describes the purpose and nature of the cloud. Since all processes today are computerized, consumers need a lot amount of data and cache size. The security of the cloud is ensured in many levels, but the scope of intrusions makes it necessary to understand the factors that affect cloud security. CC-certified users rely on third parties for their other important security issues in third-party computing clouds. A DDoS attack is an attack-type in which it is not necessary to send a large number of packets to the server, which makes it impossible for legitimate users to access them. In this research work, a DDoS attack was launched and a tool for launching a DDoS attack was discussed. In this research, DDoS attacks were rejected using three different SNORT rules. In this research, rules predefined for detecting DDoS attacks on SNORT profiles detect and prevent DDoS attacks, but because they block certain legitimate requests and generate false alarms, this should be the subject of future research.
2015
Cloud is turning into a prevalent computing platform. Certainly, a question arises on the off chance that we can crush the scandalous DDoS attacks in a cloud environment. A DDoS attack can collapse the whole system in a Cloud Server environment, however in case of cloud it is not that powerful but still to some extend disturbs the normal activity of the system. At the point when a DDoS attack occurs in a client environment, we devote the idle resources of the cloud to clone adequate Intrusion Prevention Systems for the exploited client in order to rapidly channel out attack packets and ensure the QoS (Quality of Service) for benign users simultaneously. In the proposed model we deploy multiple Intrusion Prevention System (IPS) to screen client activity and filter the requests in light of the conduct and forward to the corresponding servers through cloud server. Each server would have certain space designated in the cloud server. The IPS's continually monitor the activity of the users to counteract DDoS attacks.
Journal of Theoretical and Applied Information Technology , 2022
Distributed Denial of services (DDOS) attacks are one of the most famous attacks that affect the availability of a service making it a serious problem especially when it comes to cloud computing as it is becoming a bigger part of our lives. Throughout this paper, we first discussed the DDOS types, categories, and approaches in terms of the targeted area of the cloud or the intensity of the attacks whether it's the normal DDOS, the Low-rate DDOS, or Economic-DOS (EDOS). We then presented a comparative analysis between the recent studies discussing the DDOS attacks in cloud. Prevention of DDOS in cloud computing is the first step in the defense mechanism followed by detection and mitigation. The prevention of the DDOS attacks is the foremost important step in protecting the cloud from DDOS which is achieved through challengeresponse, hidden servers, and restrictive access approaches. We also provided a summary of the recent studies discussing the different prevention techniques, approaches, and frameworks. The main purpose of this paper is to provide a road map of the current situation of DDOS attacks and how they take place, why they take place and its prevention techniques in cloud computing environment focusing on the true protective prevention stage.
In the today's world cloud computing has become a very prominent technology in field of research and business. It can be realized as assimilated technology of parallel computing, network storage technology, grid computing, distributed computing and other modern existing technologies. According to our comprehensive approach we know that cloud computing provides resources and services to their clients on behalf of their demands. These cloud services are sometimes abjured due to receiving a huge amount of requests. This type of retraction in service providence of cloud environment is also considered as Denial of service attack in cloud environment. DDoS attack is the enhanced form of DOS attack. In this paper the author is going to represent a framework for recognizing and analyzing this attack with the help of multi agent system. Here the author describes the integration of the results achieved by the Intrusion detection agents (IDA), existing inside virtual machine of cloud system with a method of data fusion in front-end. At the time of attack the IDA generates alert signals which will be stored inside the My sql database residing in Cloud synthesizing unit (CSU). The author propose a quantitative approach to explore the alerts yielded by IDA using Dempester Shapher Theory operation having three valued logic and Fault tree Analysis described for various flooding attacks. Finally we combine the results achieved by various IDAs.
International Journal of Electrical and Computer Engineering (IJECE), 2019
In the communication age, the Internet has growing very fast and most industries rely on it. An essential part of Internet, Web applications like online booking, e-banking, online shopping, and e-learning plays a vital role in everyday life. Enhancements have been made in this domain, in which the web servers depend on cloud location for resources. Many organizations around the world change their operations and data storage from local to cloud platforms for many reasons especially the availability factor. Even though cloud computing is considered a renowned technology, it has many challenges, the most important one is security. One of the major issue in the cloud security is Distributed Denial of Service attack (DDoS), which results in serious loss if the attack is successful and left unnoticed. This paper focuses on preventing and detecting DDoS attacks in distributed and cloud environment. A new framework has been suggested to alleviate the DDoS attack and to provide availability ...
Cloud Computing is a distributed scenario that centralizes server resources on a platform which is scalable as to provide on demand services. Cloud service providers (CSP's) offer cloud platforms for their clients to use and generate their web services, much like internet service providers offer costumers high speed broadband to access the internet. As one of the very important security problems in the current Internet, is denial-of-service (DoS) attack for all time attempts the network as well as provide the solution to reduce the execution time over the network. The objective of this work is to provide security in cloud computing network. My proposed work uses cloud guard framework. This framework we use two types of filter one is traceback and another is hop-count filter which is implemented on the nodes to discontinue the victim from serving services to authenticated users. The proposed work will identify the attack over in the network. This filter will identify the malicious activity in the network. The proposed framework is implemented using OPNET MODELER & its results show its effectiveness.
Los bordes y est{eticas del tango actual, 2022
Межитов А.З., Эльдаров Э.М. Туристический брендинг как фактор устойчивого развития Ногайской степи // Степи Северной Евразии: материалы X международного симпозиума. Оренбург: ИС УрО РАН, 2024. С. 832-837.
Revista Estudos Feministas
British Journal of Religious Education , 2016
Nationalism and Ethnic Politics, 2009
Horticultura Brasileira, 2014
Complex Analysis and Operator Theory, 2015
FABICIB, 2005
Malignant tumours, 2021
Department of Biotechnology, Centennial College, 2022