Protection Against DDoS and Data Modification Attack in Computational Grid Cluster Environment

Full Text (PDF, 547KB), PP.12-18

Views: 0 Downloads: 0

Author(s)

Basappa B. Kodada 1,* Gaurav Prasad 1 Alwyn R. Pais 1

1. Dept. of Computer Science & Engg - CEC, Bantwal, 2Dept. of Computer Engineering - NITK Surathkal

* Corresponding author.

DOI: https://doi.org/10.5815/ijcnis.2012.07.02

Received: 29 Nov. 2011 / Revised: 2 Feb. 2012 / Accepted: 11 Apr. 2012 / Published: 8 Jul. 2012

Index Terms

Grid Security, Cluster Security, Denial of Service, Sync flood, ARP Poisoning

Abstract

In the past decades, focus of computation has shifted to high performance computing like Grid Computing and Cloud Computing. In Grid computing, grid server is responsible for managing the all resources like processor, memory and CPU cycles. Grids are basically networks that pool resources, CPU cycles, storage or data from many different nodes used to solve the complex or scientific problem. However in this case, security is a major concern. Even most grid security researches focus on user authentication, authorization and secure communication. This paper presents DDoS and Data Modification attack scenario and also provides the solution to prevent it. In case of data modification attack, it shows how easy to read/forward/modify the data exchanged between a cluster head node and computing nodes. Therefore this paper provides the solution to protect the grid computing environment against Data Modification and DDOS attack.

Cite This Paper

Basappa B. Kodada, Gaurav Prasad, Alwyn R. Pais, "Protection Against DDoS and Data Modification Attack in Computational Grid Cluster Environment ", International Journal of Computer Network and Information Security(IJCNIS), vol.4, no.7, pp.12-18, 2012. DOI:10.5815/ijcnis.2012.07.02

Reference

[1]Madhu Chetty, Rajkumar Buyya, "WEAVING COMPUTATIONAL GRIDS: HOW ANALOGOUS ARE THEY WITH ELECTRICAL GRIDS?", IEEE 2002.
[2]Albeaus Bayucan, Robert L. Henderson, CasimirLesiak, Bhroam Mann, Tom Proett, Dave Tweten, "Portable Batch System", Numerical Aerospace Simulation Systems Division, NASA Ames Research Center, Moffett Field, CA, 1999.
[3]F. Berman, G. Fox and T. Hey (eds.), "Grid Computing: Making the Global Infrastructure a Reality". Wiley, 2003
[4]M. Cosnard and A. Merzky, "Meta- and Grid- Computing", in Proceedings of the 8th International Euro-Par Confrence,August 2002, PP.861-862.
[5]Shanshan Song, Kai Hwang and Yu-Kwong Kwok, "Trusted Grid Computing with Security Binding and Trust Integration", Internet and Grid Computing Laboratory, University of Southern California, EEB-212, 3740 McClintock Avenue, Journal of Grid Computing (2005) 3: 5373
[6]Yuri Demchenko, "White collar Attacks on Web Services and Grids", Grid Security threats analysis and Grid Security Incident data model definition, Draft Version 0.2, August 12, 2004.
[7]J. Mirkovic, J. Martin and P. Reiher, "A Taxonomy of DDoS Attacks and DDoS Defense Mechanisms", ACM Computer Communications Review, Vol.34, No. 2, April 2004.
[8]N. Jiancheng, L. Zhishu, G. Zhonghe,S. Jirong, "Threat analysis and Prevention for grid and web security services", SNPD, pp. 526-531, 2007.
[9]http://www.sun.com/service/sungrid/index.jsp
[10]L. Feinstein, D. Schnackenberg, R. Balupari, and D. Kindred. "Statistical approaches to DDoS attack Detection and response". In Proc of DARPA Information Survivability Conference and Exposition, 2003
[11]S.Yu, W. Zhou, "Entropy-based Collaborative Detection of DDoS attacks on Community Networks", In Proc. of IEEE international conference on pervasive computing and Communications, 2008.
[12]Avinash D., Radhesh M., Alwyn R. Pais, "Throttling DDoS Attacks using Discrete Logarithm Problem", SECRYPT 2010, July 26-28, 2010 Athens, Greece.