A Novel Active Data Filtration for the Cloud based Architecture against Packet Flooding Attacks

Full Text (PDF, 374KB), PP.29-34

Views: 0 Downloads: 0

Author(s)

Shikha Vashisht 1,* Mandeep kaur 2

1. A Novel Active Data Filtration for the Cloud based Architecture against Packet Flooding Attacks

2. Chandigarh Group of Colleges, Landran, Mohali, India

* Corresponding author.

DOI: https://doi.org/10.5815/ijmecs.2015.12.04

Received: 16 Aug. 2015 / Revised: 12 Sep. 2015 / Accepted: 26 Oct. 2015 / Published: 8 Dec. 2015

Index Terms

Cloud computing, DDoS, EDoS attack, Service Provider (SP)

Abstract

The usage of remote servers network on the Internet to process data, store and manage, instead of using a local server or any computer” is called cloud computing. Cloud computing is that which totally based on resource sharing rather than any other device to handle applications. Today cloud computing is facing numerous challenges and one of those is Attack on the cloud environment. There are many types of hazardous attack on cloud, as the attack is always in wait for some important data or resource. The most common and most affective attack is Packet Flooding attack and there are many faces of packet flooding. EDoS Attack one of the most commonly and strong packet flood attack on the cloud to make the resources almost inaccessible to the user by flooding the unnecessary packet to the network or site more that its capacity. This paper deals with the analysis of EDoS and a mechanism is proposed to mitigate the EDoS by using filtration mechanism. The filtration is done on the basis of secure key Exchange which differentiate legitimate user from attacker. The simulation is done by cloud sim as well as Net-Beans and the performance is analyzed over time and data. Using filter the packet loss and time delay occurs in EDoS attack is much reduced.

Cite This Paper

Shikha Vashisht, Mandeep kaur, "A Novel Active Data Filtration for the Cloud based Architecture against Packet Flooding Attacks", International Journal of Modern Education and Computer Science (IJMECS), vol.7, no.12, pp.29-34, 2015. DOI:10.5815/ijmecs.2015.12.04

Reference

[1]A. Belenky and N. Ansari, “Tracing Multiple Attackers with Deterministic Packet Marking (DPM),” IEEE Pacific Rim Conference on Communications, Computers and Signal Processing, 2003, pp.49-52.
[2]A.M. Lonea, D.E. Popescu, H. Tianfield, “Detecting DDoS Attacks in Cloud Computing Environment,” INT J COMPUT COMMUN, ISSN 1841-9836 8(1):70-78, February, 2013.
[3]Ayesha Malik, Muhammad Mohsin Nazir “Security Framework for Cloud Computing Environment,” A ReviewJournal of Emerging Trends in Computing and Information Sciences vol. 3, No. 3, March 2012.
[4]C. Douligeris and A. Mitrokotsa, “DDoS attacks and defense mechanisms: Classification and state-of-the-art,” Computer Networks: the Int. J. Computer and Telecommunications Networking, Vol. 44, No. 5, April 2004, pp. 643–666.
[5]Gehana Booth, Andrew Soknacki, and Anil Somayaji, “Cloud Security:Attack and Current Defence”, 8th Annual symposium on information Assurance(ASIA’13), June 4-5,2013, Albay, NY.
[6]Lanjuan Yang, Tao Zhang. Jinyu Song, Jinshuang Wang and Ping Chen, “Defence of DDoS attack for cloud computing”, In Computer Science and Automation engineering, 2012 IEEE International Conference on volume 2, pages 626-629, 2012.
[7]Linlin Wu and Rajkumar Buyya, “Service Level Agreement (SLA) in Utility Computing Systems,” Technical Report, CLOUDS-TR-2010-5, Cloud Computing and Distributed Systems Laboratory, The University of Melbourne, Australia, September 3, 2010.
[8]M. Naresh Kumar, P. Sujatha, V. Kalba, R. Nagori, A.K. Katukojwala, and M. Kumar, “mitigating Economic Denial of sustainibilty on cloud computing using In-Cloud Scrubber service,” In proc. of the 4th International Conference on Computational Intelligence and Communication Network(CICN),2012.
[9]M.H. Squalli, F. Al-Haidari, and K. Salah, “EDoS shield: a two steps mitigation technique against EDoS Attack in cloud computing,” In Utility and cloud computing(UCC),2011 Fourth IEEE International Conference on, page 49-56, 2011.
[10]Nisha H. Bhahaduri, “Survey on DDoS Attack and its detection and defence approaches”, International Journal of science and modern engineering ISSN:23196386, volume 1, Feb 2013.
[11]P. A. R. Kumar and S. Selvakumar, "Distributed Denial-of-Service (DDoS) Threat in Collaborative Environment - A Survey on DDoS Attack Tools and Traceback Mechanisms," in Advance Computing Conference, 2009. IACC 2009. IEEE International, 2009, pp. 1275-1280.
[12]Rajkumar Buyya , Rajiv Ranjan and Rodrigo N. Calheiros “Modeling and Simulation of Scalable Cloud Computing Environments and the CloudSim Toolkit: Challenges and Opportunities,” Grid Computing and Distributed Systems (GRIDS) Laboratory Department of Computer Science and Software Engineering The University of Melbourne, Australia.
[13]S. Vivian Sandar and Sudhir Shenai, “Economic denial of Sustainability using Http and Xml”, International Journal of Computer Applications, 2012.
[14]R.Punitha , D. Vijaybabu, “ Data storage security in cloud by using jar files and hierarchal id based cryptography”, ISSN: 2278 – 1323 International Journal of Advanced Research in Computer Engineering & Technology (IJARCET) Volume 2, Issue 1, January 2013.
[15]S. K. Parsha, M. K. Pasha, “Enhancing Data Access Security in Cloud Computing using Hierarchical Identity Based Encryption (HIBE),” International Journal of Scientific & Engineering Research vol. 3, Issue 5, May-2012, ISSN 2229-5518.
[16]Stephen M. Specht and Ruby B. Lee, "Distributed Denial of Service: Taxonomies of Attacks, Tools, and Countermeasures," Proceedings of 7th International Conference on parallel and Distributed computing Systems, 2004 International Workshop on Security in Parallel and Distributed Systems, pp.543-550.
[17]S. Mukkamala, A.H. Sung,“Detecting denial of service attacks using support vector machines,” Proceedings of IEEE International Conference on Fuzzy Systems, 2003.
[18]V. Praveena, and N. Kiruthika, “New Mitigating Technique to Overcome DDOS Attack,” World Academy of Science, Engineering and Technology 45 2008, pp. 442-447.
[19]Upma Goyal, Gayatri Bhatti and Sandeep Mehmi, “A Dual Mechanism for defeating DDoS Attacks in Cloud Computing Model”, International Journal of Application or Innovation in Engineering & Management (IJAIEM), Volume 2, Issue 3, March 2013.
[20]Zuber A. Baing, Farid Binbeshr “Controlled virual resource access to mitigate Economic Denial of susrainibility Attack Against cloud infrastructures,” International confrerence on cloud computing and big data, 2013.