INFORMATION CHANGE THE WORLD

International Journal of Wireless and Microwave Technologies(IJWMT)

ISSN: 2076-1449 (Print), ISSN: 2076-9539 (Online)

Published By: MECS Press

IJWMT Vol.8, No.1, Jan. 2018

Energy Aware Supervised Pattern Attack Recognition Technique for Mitigation of EDoS Attacks in Cloud Platform

Full Text (PDF, 744KB), PP.42-49


Views:50   Downloads:1

Author(s)

Preeti Daffu, Amanpreet Kaur

Index Terms

SPART (Supervised Pattern Attack Recognition Technique);EDoS (Economic Denial of Sustainability);DDoS (Distributed Denial of Service)

Abstract

Cloud computing is a rapidly growing technology in this new era. Cloud is a platform where users get charged on the basis of the services and resources they have used. It enables its users to access the cloud resources from the remote locations i.e. from anywhere at any time. It needs only a working internet connection to access the cloud services. Cloud users have always been victim to the security issues and attacks which leads to the data loss. The data is not saved on the hard disk of the computer so it is highly prone to security risks. Identifying the attacks on cloud platform is a difficult task because everything on cloud is in virtual form. EDoS (Economic Denial of Sustainability) attack is a form of DDoS attacks; carried out for a long span of time and intended to put a financial burden and cause economical loss to the users of cloud. Such attacks do not exhaust the bandwidth of the user; their main aim is to put a huge financial loss or burden on the user. A technique named as SPART (Supervised Pattern Attack Recognition Technique) implemented to mitigate the EDoS attacks in cloud computing which consumes lesser energy as compared to the existing models. The experimental results have shown the less energy consumption in proposed model.

Cite This Paper

Preeti Daffu, Amanpreet Kaur," Energy Aware Supervised Pattern Attack Recognition Technique for Mitigation of EDoS Attacks in Cloud Platform", International Journal of Wireless and Microwave Technologies(IJWMT), Vol.8, No.1, pp. 42-49, 2018.DOI: 10.5815/ijwmt.2018.01.05

Reference

[1]Al-Haidari, F., M. Sqalli, and K. Salah. 2015 "Evaluation of the Impact of EDoS Attacks Against Cloud Computing Services." Arabian Journal for Science and Engineering, 40(3): 773-785.

[2]Al-Haidari, F., Sqalli, M.H. and Salah, K., 2012, June. Enhanced edos-shield for mitigating edos attacks originating from spoofed ip addresses. In Trust, Security and Privacy in Computing and Communications (TrustCom), 2012 IEEE 11th International Conference on : 1167-1174. IEEE.

[3]Alzamil, Ibrahim. "Simulation of Cloud Computing Eco-Efficient Data Centre."

[4]Bala, A., Bansal, M. and Singh, J., 2009, December. Performance analysis of MANET under blackhole attack. In Networks and Communications, 2009. NETCOM'09. First International Conference on 1:141-145 IEEE.

[5]Baig, Zubair A., and Binbeshr Farid 2013. "Controlled Virtual Resource Access to Mitigate Economic Denial of Sustainability (EDoS) Attacks against Cloud Infrastructures." Cloud Computing and Big Data (CloudCom-Asia), International Conference: 346-353, IEEE.

[6]Baig, Zubair A., Sait S.M. and Binbeshr F. 2016. "Controlled Access to Cloud Resources for Mitigating Economic Denial of Sustainability (EDoS) Attacks." Computer Networks. 97: 31-47.

[7]Bakshi, A. and Yogesh, B., 2010, February. "Securing cloud from ddos attacks using intrusion detection system in virtual machine." In Communication Software and Networks, ICCSN'10. Second International Conference on : 260-264, IEEE. 

[8]Bhandari, N.H. 2013. "Survey on DDoS Attacks and its Detection & Defence Approaches." International Journal of Science and Modern Engineering (IJISME) ISSN, 2(7): 2319-6386.

[9]Booth, G., Soknacki, A. and Somayaji, A., 2013, June. "Cloud Security: Attacks and Current Defenses." 8th Annual Symposium on Information Assurance (ASIA’13): 56. 

[10]Chaudhary, A., Kumar, A. and Tiwari, V.N., 2014, February. A reliable solution against Packet dropping attack due to malicious nodes using fuzzy Logic in MANETs. In Optimization, Reliabilty, and Information Technology (ICROIT), 2014 International Conference on :178-181. IEEE.

[11]Chonka, A., Xiang, Y., Zhou, W. and Bonti, A., 2011. "Cloud security defence to protect cloud computing against HTTP-DoS and XML-DoS attacks." Journal of Network and Computer Applications, 34(4): 1097-1107.

[12]Gupta, G.K. and Singh, M.J., 2010. Truth of D-DoS Attacks in MANET. Global Journal of Computer Science and Technology, 10(15): 15-22.

[13]Harb, L.M., Tantawy, M. and Elsoudani, M., 2013, January. Performance of mobile ad hoc networks under attack. In Computer Applications Technology (ICCAT), 2013 International Conference on IEEE, 27(12): 1201-1206.

[14]Liu, H., 2010, October. A new form of DOS attack in a cloud and its avoidance mechanism. In Proceedings of the 2010 ACM workshop on Cloud computing security workshop:65-76, ACM.

[15]Lo, C.C., Huang, C.C. and Ku, J., 2010, September. A cooperative intrusion detection system framework for cloud computing networks. In Parallel processing workshops (ICPPW), 2010 39th international conference on : 280-284. IEEE.

[16]Morein, W.G., Stavrou, A., Cook, D.L., Keromytis, A.D., Misra, V. and Rubenstein, D., 2003, October. Using graphic turing tests to counter automated ddos attacks against web servers. In Proceedings of the 10th ACM conference on Computer and communications security: 8-19. ACM.

[17]Naresh Kumar, M., Sujatha, P., Kalva, V., Nagori, R., Katukojwala, A.K. and Kumar, M., 2012, November. Mitigating economic denial of sustainability (edos) in cloud computing using in-cloud scrubber service. In Computational Intelligence and Communication Networks (CICN), 2012 Fourth International Conference on: 535-539. IEEE.

[18]Shakshuki, E.M., Kang, N. and Sheltami, T.R., 2013. EAACK—a secure intrusion-detection system for MANETs. Industrial Electronics, IEEE Transactions on, 60(3): 1089-1098.

[19]Sqalli, M.H., Al-Haidari, F. and Salah, K., 2011, December. Edos-shield-a two-steps mitigation technique against edos attacks in cloud computing. In Utility and Cloud Computing (UCC), 2011 Fourth IEEE International Conference on: 49-56. IEEE.

[20]Zunnurhain, K. and Vrbsky, S.V., 2010, December. Security attacks and solutions in clouds. In Proceedings of the 1st international conference on cloud computing : 145-156.