Papers

Title: Cloud Security Countermeasures against Distributed Denial of Service Attacks
Year of Publication: 2015
Publisher: International Journal of Computer Systems (IJCS)
ISSN: 2394-1065
Series: Volume 2, Number 11
Authors: Priyanka Porwal, Ankit Kumar

Citation:

Priyanka Porwal, Ankit Kumar, "Cloud Security Countermeasures against Distributed Denial of Service Attacks", International Journal of Computer Systems (IJCS), 2(11):494-499, November 2015. BibTeX

@article{key:article,
	author = {Priyanka Porwal, Ankit Kumar},
	title = {Article: Cloud Security Countermeasures against Distributed Denial of Service Attacks},
	journal = {International Journal of Computer Systems (IJCS)},
	year = {2015},
	volume = {2},
	number = {11},
	pages = {494-499},
	month = {November}
	
}

>

Abstract

Cloud Computing is a distributed scenario that centralizes server resources on a platform which is scalable as to provide on demand services. Cloud service providers (CSP’s) offer cloud platforms for their clients to use and generate their web services, much like internet service providers offer costumers high speed broadband to access the internet. As one of the very important security problems in the current Internet, is denial-of-service (DoS) attack for all time attempts the network as well as provide the solution to reduce the execution time over the network. The objective of this work is to provide security in cloud computing network. My proposed work uses cloud guard framework. This framework we use two types of filter one is traceback and another is hop-count filter which is implemented on the nodes to discontinue the victim from serving services to authenticated users. The proposed work will identify the attack over in the network. This filter will identify the malicious activity in the network. The proposed framework is implemented using OPNET MODELER & its results show its effectiveness.

References

[1] Joshi B., Vijayan, A.S. ; Joshi, B.K., “Securing Cloud Computing Environment Against DDoS Attacks 2012 international conference on computer communication and informatics(ICCCI-2012),pp: 1-5, 2012.
[2] M. Kumar, A. Panwar, and A. Jain, "An Analysis of TCP SYN Flooding Attack and Defense Mechanism, " International Journal of Engineering Research & Technology (lJERT), vol. I, no. 5, pp. 1-6, 2012.
[3] Marwan Darwish, Abdelkader Ouda, Luiz Fernando Capretz , “Cloud-based DDoS Attacks and Defenses”, pages;: 67 - 71 978-1-908320-13/1/2013 IEEE
[4] H. Wang, C. Jin, and K. G. Shin, "Defense Against Spoofed IP Traffic Using Hop-Count Filtering, " IEEE/ACM Transactions on Networking, vol. 1 5, no. I, pp. 40-53, Feb. 2007.
[5] Can We Beat DDoS Attacks in Clouds? Shui Yu, Senior Member, IEEE, Yonghong Tian, Senior Member, IEEE, Song Guo, Senior Member, IEEE, and Dapeng Oliver Wu, Fellow, IEEE 2012
[6] A.Belenky and N.Ansari (2003), ‘Tracing multiple attackers with deterministic packet marking (DPM)’, Proceedings of IEEE Pacific Rim conference on communications, computers and signal processing, Vol. 1, pp. 49–52.
[7] Priyanka porwal,Parvez mahmood khan and Dhruba shankar ray, “Cloud Computing Security Threats and Countermeasures” in IJIESM, Volume 2, Issue 4, April 2014.
[8] A.Chonka W. Zhou and Y.Xiang (2008a), ‘Protecting web services with service oriented traceback architecture’, Proceedings of the IEEE eighth international conference on computer and information technology, pp. 706-711.
[9] A.Chonka, W.Zhou and Y.Xiang (2008b), ‘Protecting web services from DDoS attacks by SOTA’, Proceedings of the IEEE fifth international conference on information technology and applications, pp. 1-6.
[10] A.Chonka, W.Zhou and Y.Xiang (2009a), ‘Defending grid web services from X-DoS Attacks by SOTA’, Proceedings of the third IEEE international workshop on web and pervasive security (WPS 2009), pp. 1-6.
[11] A Comber Approach to Protect Cloud Computing against XML DDoS and HTTP DDoS attack 2012 IEEE Students’ Conference on Electrical, Electronics and Computer Science.
[12] Cloud Security Alliance https://cloudsecurityalliance.org/research/topthreats
[13] Europe Network and Information Security Agency; see http://www.enisa.europa.eu/act/rm/files/deliverables/cloudcomputing- risk-assessment
[14] Chonka A, et al. Cloud security defence to protect cloud computing against HTTP-DoS and XML-DoS attacks. J Network Comput Appl (2010), doi:10.1016/j.jnca.2010.
[15] Palvinder Singh Mann, Dinesh Kumar “A Reactive Defense Mechanism based on an Analytical Approach to Mitigate DDoS Attacks and Improve Network Performance” International Journal of Computer Applications, January 2011.
[16] http://www.google.co.in/imgres?imgurl=http://www.wittenborgonline.com/file.php/1/pictures/network/ddos_attack.gif&imgrefurl.
[17] N. Venkatesu, et al., "An Effective Defense Against Distributed Denial of Service in GRID," in Emerging Trends in Engineering and Technology, 2008. ICETET '08. First International Conference on, 2008, pp. 373-378.
[18] Wikipedia,“Cloudcomputing,”http://en.wikipedia.org/wiki/Cloud_computing.
[19] Distributed Denial of Service Prevention Techniques B. B. Gupta, Student Member, IEEE, R. C. Joshi, and Manoj Misra, Member, IEEE International Journal of Computer and Electrical Engineering, Vol. 2, No. 2, April, 2010, pp: 1793-8163
[20] Danish Jamil et al. “Security Issues In Cloud Computing And Countermeasures”, In International Journal of Engineering Science and Technology (IJEST).
[21] Jitendra Amangi, “Cloud Computing: Emergence, Relevance and Future in India”, In International Journal of Computer Systems, Volume 01– Issue 02, November, pp: 68-71, 2014.
[22] Vijay.G.R, Dr.A.Rama Mohan Reddy , “Security Issue Analysis in Cloud Computing Environment” International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622Vol. 3, Issue 1, January -February 2013, pp.854-857.
[23] S.Subashini and V. Kavitha ,A survey on security issues in service delivery models of cloud computing., Journal of Network and Computer Applications, Vol. 34, No. 1, Jul, 2010.
[24] Mona Jammal and Nouf Alghamdi, "Increasing the Business Value through Cloud Computing Usage", In International Journal of Computer Systems, Volume 2, Issue 11, November, 2015, pages: 475-480.
[25] Sai Krishna Reddy Palwai, Pranit Kumar Pandey, Sandeep CVS, "Security Enhancement for Multi-party ‘learning’ in Cloud Platform", In International Journal of Computer Systems, Volume 2, Issue 10, October, 2015, pages: 427-430.
[26] Jon Marler, “Securing the Cloud: Addressing Cloud Computing Security Concerns with Private Cloud,” Rackspace Knowledge Centre, March 27, 2011, Article Id:1638. http://www.rackspace.com/knowledge_center/private-cloud/securing-the-cloud-addressing-cloud-computingsecurity-concerns-with-private-cloud

Keywords

Cloud Computing, DDoS, Cloud Guard, Pop, Botnet, TCPack, UDP, Network Security.