Minimizing The Denial of Service Attack By Using The Cloud Information Framework

Authors(3) :-G. Dhana Sekar, M.Vidhyasree, S. Radhika

Due to the close correlation with individual’s physical features and status, the adoption of Cyber-Physical Social Systems (CPSSs) has been inevitably hindered by users’ privacy concerns. The success of the Cloud Computing paradigm is owing to its on-demand, self-service, and pay-by-use nature. Attacks involve not solely the standard of the delivered service, but conjointly the service maintenance prices in terms of resource consumption. Specifically, the longer the detection delay is, the higher the prices to be incurred. Therefore, a selected attention has to be procured stealthy DoS attacks. They aim at minimizing their visibility, and at identical time, they will be as harmful as the brute-force attacks. They’re subtle attacks tailored to leverage the worst-case performance of the target system through specific periodic, pulsing, and low-rate traffic patterns. In this paper, we have a tendency to propose a method to orchestrate stealthy attack patterns, that exhibit a slowly-increasing-intensity trend designed to bring down the most monetary value to the cloud customer, whereas respecting the work size and therefore the service arrival rate obligatory by the detection mechanisms. We have a tendency to describe each how to apply the projected strategy, and its effects on the target system deployed within the cloud.

Authors and Affiliations

G. Dhana Sekar
Assistant Professor, Department of CSE, Sri Venkateswara College of Engineering And Technology, Chittoor, Andhra Pradesh, India
Student, Department of CSE, Sri Venkateswara College of Engineering And Technology , Chittoor, Andhra Pradesh, India
S. Radhika
Student, Department of CSE, Sri Venkateswara College of Engineering And Technology , Chittoor, Andhra Pradesh, India

Cloud computing, stealthy attack patterns, stealthy DoS attacks.

  1. M. C. Mont, K. McCorry, N. Papanikolaou, S. Pearson, "Security and privacy governance in cloud computing via SLAS and a policy orchestration service," In Proc. 2nd Int. Conf. Cloud Comput. Serv. Sci., 2012, pp. 670–674.
  2. F. Cheng, C. Meinel,"Intrusion Detection in the Cloud," in Proc. IEEE Int. Conf. Dependable, Autonom. Secure Comput. Dec. 2009, pp. 729–734.
  3. C. Metz. (2009, Oct.),"DDoS attack rains down on Amazon Cloud OnlineAvailable: http://www.theregister.
  4. K. Lu, D. Wu, J. Fan, S. Todorovic, A. Nucci,"Robust and efficient detection of DDoS attacks for large-scale internet," Comput. Netw. Vol. 51, No. 18, pp. 5036–5056, 2007.
  5. H. Sun, J. C. S. Lui, D. K. Yau,"Defending against low-rate TCP attacks: Dynamic detection and protection," In Proc. 12th IEEE Int. Conf. Netw. Protocol, 2004, pp. 196-205.
  6. A. Kuzmanovic, E. W. Knightly,"Low-rate TCP-Targeted denial of service attacks: The shrew Vs. the mice and elephants," In Proc. Int. Conf. Appl., Technol., Archit., Protocols Comput. Commun. 2003, pp. 75–86.
  7. M. Guirguis, A. Bestavros, I. Matta, Y. Zhang,"Reduction of quality (RoQ) attacks on internet end-systems," In Proc. IEEE Int. Conf. Comput. Commun. Mar. 2005, pp. 1362– 1372.
  8. X. Xu, X. Guo, S. Zhu,"A queuing analysis for low-rate DoS attacks against application servers," In Proc. IEEE Int. Conf. Wireless Commun., Netw. Inf. Security, 2010, pp. 500–504.
  9. L. Wang, Z. Li, Y. Chen, Z. Fu, X. Li,"Thwarting zeroday polymorphic worms with network-level length-based signature generation," IEEE/ACM Trans. Netw., Vol. 18, No. 1, pp. 53–66, Feb. 2010.
  10. A. Chonka, Y. Xiang, W. Zhou, A. Bonti,"Cloud security defense to protect cloud computing against HTTP-DOS and XMLDoS attacks," J. Netw. Comput. Appl., Vol. 34, No. 4, pp. 1097–1107, Jul. 2011.
  11. D. Petcu, C. Craciun, M. Neagul, S. Panica, B. Di Martino, S. Venticinque, M. Rak, R. Aversa,"Architecturing a sky computing platform," In Proc. Int. Conf. Towards Serv.- Based Int., 2011, Vol. 6569, pp. 1-13.
  12. U. Ben-Porat, A. Bremler-Barr, H. Levy,"Evaluating the vulnerability of network mechanisms to sophisticated DDoS attacks," In Proc. IEEE Int. Conf. Comput. Commun., 2008, pp. 2297–2305.
  13. S. Antonatos, M. Locasto, S. Sidiroglou, A. D. Keromytis, E. Markatos,"Defending against next generation through network/ endpoint collaboration and interaction," In Proc. IEEE 3rd Eur. Int. Conf. Comput. Netw. Defense, 2008, Vol. 30, pp. 131–141.
  14. R. Smith, C. Estan, S. Jha,"Backtracking algorithmic complexity attacks against a NIDS," In Proc. Annu. Comput. Security Appl. Conf., Dec. 2006, pp. 89–98.
  15. C. Castelluccia, E. Mykletun, G. Tsudik,"Improving secure server performance by re-balancing SSL/TLS handshakes," in Proc. ACM Symp. Inf., Apr. 2005, pp. 26–34.
  16. M. C. Mont, K. McCorry, N. Papanikolaou, and S. Pearson. Security and Privacy Governance in Cloud Computing via SLAs and a Policy Orchestration Service. In Proc. of the 2th Int. Conf. on Cloud Computingand Services Science, 2012, pp. 670-674.
  17. F. Cheng and C. Meinel. Intrusion Detection in the Cloud. In Proc. Of the IEEE Int. Conf. on Dependable, Autonomic and Secure Computing, Dec. 2009, pp. 729-734.
  18. C. Metz. DDoS attack rains down on Amazon Cloud. Available at: n bitbucket outage/S, 26 Oct. 2009.
  19. K. Lu, D. Wu, J. Fan, S. Todorovic, and A. Nucci. Robust and efficient detection of DDoS attacks for large-scale internet. In Computer Networks, vol. 51, no. 18, 2007, pp. 5036-5056.
  20. H. Sun, John C. S. Lui, and D. K. Yau. Defending against low-rate tcp attacks: Dynamic detection and protection. In Proc. of the 12th IEEE Int.Conf. On Network Protocols, 2004, pp. 196-205.

Publication Details

Published in : Volume 3 | Issue 4 | March-April 2018
Date of Publication : 2018-04-30
License:  This work is licensed under a Creative Commons Attribution 4.0 International License.
Page(s) : 479-484
Manuscript Number : CSEIT1833419
Publisher : Technoscience Academy

ISSN : 2456-3307

Cite This Article :

G. Dhana Sekar, M.Vidhyasree, S. Radhika, "Minimizing The Denial of Service Attack By Using The Cloud Information Framework", International Journal of Scientific Research in Computer Science, Engineering and Information Technology (IJSRCSEIT), ISSN : 2456-3307, Volume 3, Issue 4, pp.479-484, March-April-2018.
Journal URL :

Article Preview