Denial of Service Strategy Over Outsourced Encrypted Data in Cloud Computing

Authors

  • S. Lakshmi Prasanna  Department of Computer Applications, Rayalaseema Institute of Information and Management Sciences, Tirupathi, Andhra Pradesh, India
  • P. V. Ramesh  Department of Computer Applications, Rayalaseema Institute of Information and Management Sciences, Tirupathi, Andhra Pradesh, India

Keywords:

Cloud Computing, sophisticated attacks strategy, low-rate attacks, intrusion detection.

Abstract

The success of the Cloud Computing paradigm is because of its on-demand, self-service, and pay-by-use nature. According to this paradigm, the results of Denial of Service (DoS) attacks involve not solely the standard of the delivered service, but conjointly the service maintenance prices in terms of resource consumption. Specifically, the longer the detection delay is, the higher the prices to be incurred. Therefore, a specific attention has to be got concealed DoS attacks. They aim at minimizing their visibility, and at identical time, they'll be as harmful as the brute-force attacks. they're refined attacks tailored to leverage the worst-case performance of the target system through specific periodic, pulsing, and low-rate traffic patterns. In this paper, we have a tendency to propose a technique to orchestrate concealed attack patterns, that exhibit a slowly-increasing-intensity trend designed to intercommunicate the utmost monetary value to the cloud customer, whereas respecting the duty size and therefore the service arrival rate obligatory by the detection mechanisms. we describe each how to apply the projected strategy, and its effects on the target system deployed within the cloud.

References

  1. M. C. Mont, K. McCorry, N. Papanikolaou, and S. Pearson. Security and Privacy Governance in Cloud Computing via SLAs and a Policy Orchestration Service. In Proc. of the 2th Int. Conf. on Cloud Computingand Services Science, 2012, pp. 670-674.
  2. F. Cheng and C. Meinel. Intrusion Detection in the Cloud. In Proc. Of the IEEE Int. Conf. on Dependable, Autonomic and Secure Computing, Dec. 2009, pp. 729-734.
  3. C. Metz. DDoS attack rains down on Amazon Cloud. Available at: http://www.theregister.co.uk/2009/10/05/amazon bitbucket outage/S, 26 Oct. 2009.
  4. K. Lu, D. Wu, J. Fan, S. Todorovic, and A. Nucci. Robust and efficient detection of DDoS attacks for large-scale internet. In Computer Networks, vol. 51, no. 18, 2007, pp. 5036-5056.
  5. H. Sun, John C. S. Lui, and D. K. Yau. Defending against low-rate tcp attacks: Dynamic detection and protection. In Proc. of the 12th IEEE Int.Conf. on Network Protocols, 2004, pp. 196-205.
  6. A. Kuzmanovic and E. W. Knightly. Low-rate TCP-Targeted denial of service attacks: the shrew vs. the mice and elephants. In Proc. of the Int. Conf. on Applications, technologies, architectures, and protocols forcomputer communications, 2003, pp. 75-86.
  7. M. Guirguis, A. Bestavros, I. Matta, and Y. Zhang. Reduction of Quality (RoQ) Attacks on Internet End-Systems. In Proc. of the IEEE Int. Con.on Computer Communications (INFOCOM), pp. 1362-1372, Mar. 2005.
  8. XiaodongXu, Xiao Guo, and Shirui Zhu. A queuing analysis for low-rate DoS attacks against application servers. In Proc. of the IEEE Int. Conf. onWireless Communications, Networking and Information Security, 2010, pp. 500-504.
  9. Lanjia Wang, Zhichun Li, Yan Chen, Zhi Fu, Xing Li. Thwarting Zero- Day Polymorphic Worms With Network-Level Length-Based Signature Generation. In IEEE/ACM Transactions on Networking, 2010, pp. 53-66.
  10. A. Chonka, Y. Xiang, W. Zhou, and A. Bonti. Cloud security defense to protect cloud computing against HTTP-DOS and XML-DoS attacks. In Journal of Network and Computer Applications, vol. 34, no. 4, July 2011, pp. 1097-1107.
  11. D. Petcu, C. Craciun, M. Neagul, S. Panica, B. Di Martino, S. Venticinque, M. Rak, and R. Aversa. Architecturing a Sky Computing Platform. In Proc. of the Int. Conf. on Towards a service-based Internet, LNCS, vol. 6569, 2011, pp. 1-13.
  12. U. Ben-Porat, A. Bremler-Barr, and H. Levy. Evaluating the Vulnerability of Network Mechanisms to Sophisticated DDoS Attacks. In Proc. Of the IEEE Int. Conf. on Computer Communications (INFOCOM), 2008, pp. 2297-2305.
  13. S. Antonatos, M. Locasto, S. Sidiroglou, A. D. Keromytis, and E. Markatos. Defending against next generation through network/endpoint collaboration and interaction. In Proc. of the IEEE Int. Conf. on ComputerNetwork Defense, LNCS, vol. 30, 2008, pp. 131-141.
  14. R. Smith, C. Estan, and S. Jha. Backtracking Algorithmic Complexity Attacks Against a NIDS. In Proc. of the Annual Computer SecurityApplications Conference, Dec. 2006, pp. 89-98.
  15. C. Castelluccia, E. Mykletun, and G. Tsudik. Improving Secure Server Performance by Re-balancing SSL/TLS Handshakes. In Proc. of the ACMSymposium on Information, Apr. 2005, pp. 26-34.

Downloads

Published

2018-04-30

Issue

Section

Research Articles

How to Cite

[1]
S. Lakshmi Prasanna, P. V. Ramesh, " Denial of Service Strategy Over Outsourced Encrypted Data in Cloud Computing, IInternational Journal of Scientific Research in Computer Science, Engineering and Information Technology(IJSRCSEIT), ISSN : 2456-3307, Volume 3, Issue 4, pp.1187-1190, March-April-2018.