Security Scheme for Protecting Cloud Computing Services Against Bursty DDoS Attacks

In cloud computing, data and applications are maintained on remote servers and accessed via the Internet. Virtualised resources such as dynamic servers are operated through the Internet, which increases the economic benefits accrued to customers from software. Cloud computing reduces customer concer...

Full description

Saved in:
Bibliographic Details
Main Authors: Mazlina, Abdul Majid, Naser, Aws, Mohamad Fadli, Zolkipli, Khan, Nusrat Ullah
Format: Article
Language:English
Published: The International Association for Information, Culture, Human and Industry Technology (AICIT) 2015
Subjects:
Online Access:http://umpir.ump.edu.my/id/eprint/7335/1/fskkp-2014-mazlina-Security_Scheme_for_Protecting.pdf
http://umpir.ump.edu.my/id/eprint/7335/
https://www.researchgate.net/publication/306259719_Security_Scheme_for_Protecting_Cloud_Computing_Services_Against_Bursty_DDoS_Attacks
Tags: Add Tag
No Tags, Be the first to tag this record!
id my.ump.umpir.7335
record_format eprints
spelling my.ump.umpir.73352018-02-01T07:49:02Z http://umpir.ump.edu.my/id/eprint/7335/ Security Scheme for Protecting Cloud Computing Services Against Bursty DDoS Attacks Mazlina, Abdul Majid Naser, Aws Mohamad Fadli, Zolkipli Khan, Nusrat Ullah T Technology (General) QA75 Electronic computers. Computer science In cloud computing, data and applications are maintained on remote servers and accessed via the Internet. Virtualised resources such as dynamic servers are operated through the Internet, which increases the economic benefits accrued to customers from software. Cloud computing reduces customer concerns about software licenses, hardware, and overall system maintenance. Connections between web services are typically enabled using the simple object access protocol (SOAP), and extensible markup language (XML) or hypertext transport protocol (HTTP) is used to construct SOAP messages. Denial of service (DoS) and distributed DoS (DDoS) are two major problems affecting cloud computing services, and it is a challenge to resolve them completely. The identity of the perpetrators of these acts is usually difficult to ascertain especially when the attacks are carried out using spoofed IP addresses. Consequently, differentiating genuine packets from the packets sent by hackers is difficult. The addresses are spoofed with the intention of causing harm to cloud service provider communication channels. Distinguishing legitimate messages from illegitimate messages is an important step towards solving the problem of DDoS attacks. Modulo and CLASSIE methods effectively detect and reduce spoofing attacks using unique rulesets. In this paper, we propose using modulo packet marking and a method called reconstruct and drop (RAD) to differentiate and discard malicious packets. The proposed method improves the detection and filtering of DDoS attacks. Further, the results of comparisons conducted indicate that the proposed method requires fewer bits than Huffman code and its performance is better than that of cloud protector. The International Association for Information, Culture, Human and Industry Technology (AICIT) 2015 Article PeerReviewed application/pdf en http://umpir.ump.edu.my/id/eprint/7335/1/fskkp-2014-mazlina-Security_Scheme_for_Protecting.pdf Mazlina, Abdul Majid and Naser, Aws and Mohamad Fadli, Zolkipli and Khan, Nusrat Ullah (2015) Security Scheme for Protecting Cloud Computing Services Against Bursty DDoS Attacks. International Journal on Advances in Information Sciences and Service Sciences, 7 (1). pp. 39-45. ISSN 2233-9345 https://www.researchgate.net/publication/306259719_Security_Scheme_for_Protecting_Cloud_Computing_Services_Against_Bursty_DDoS_Attacks
institution Universiti Malaysia Pahang
building UMP Library
collection Institutional Repository
continent Asia
country Malaysia
content_provider Universiti Malaysia Pahang
content_source UMP Institutional Repository
url_provider http://umpir.ump.edu.my/
language English
topic T Technology (General)
QA75 Electronic computers. Computer science
spellingShingle T Technology (General)
QA75 Electronic computers. Computer science
Mazlina, Abdul Majid
Naser, Aws
Mohamad Fadli, Zolkipli
Khan, Nusrat Ullah
Security Scheme for Protecting Cloud Computing Services Against Bursty DDoS Attacks
description In cloud computing, data and applications are maintained on remote servers and accessed via the Internet. Virtualised resources such as dynamic servers are operated through the Internet, which increases the economic benefits accrued to customers from software. Cloud computing reduces customer concerns about software licenses, hardware, and overall system maintenance. Connections between web services are typically enabled using the simple object access protocol (SOAP), and extensible markup language (XML) or hypertext transport protocol (HTTP) is used to construct SOAP messages. Denial of service (DoS) and distributed DoS (DDoS) are two major problems affecting cloud computing services, and it is a challenge to resolve them completely. The identity of the perpetrators of these acts is usually difficult to ascertain especially when the attacks are carried out using spoofed IP addresses. Consequently, differentiating genuine packets from the packets sent by hackers is difficult. The addresses are spoofed with the intention of causing harm to cloud service provider communication channels. Distinguishing legitimate messages from illegitimate messages is an important step towards solving the problem of DDoS attacks. Modulo and CLASSIE methods effectively detect and reduce spoofing attacks using unique rulesets. In this paper, we propose using modulo packet marking and a method called reconstruct and drop (RAD) to differentiate and discard malicious packets. The proposed method improves the detection and filtering of DDoS attacks. Further, the results of comparisons conducted indicate that the proposed method requires fewer bits than Huffman code and its performance is better than that of cloud protector.
format Article
author Mazlina, Abdul Majid
Naser, Aws
Mohamad Fadli, Zolkipli
Khan, Nusrat Ullah
author_facet Mazlina, Abdul Majid
Naser, Aws
Mohamad Fadli, Zolkipli
Khan, Nusrat Ullah
author_sort Mazlina, Abdul Majid
title Security Scheme for Protecting Cloud Computing Services Against Bursty DDoS Attacks
title_short Security Scheme for Protecting Cloud Computing Services Against Bursty DDoS Attacks
title_full Security Scheme for Protecting Cloud Computing Services Against Bursty DDoS Attacks
title_fullStr Security Scheme for Protecting Cloud Computing Services Against Bursty DDoS Attacks
title_full_unstemmed Security Scheme for Protecting Cloud Computing Services Against Bursty DDoS Attacks
title_sort security scheme for protecting cloud computing services against bursty ddos attacks
publisher The International Association for Information, Culture, Human and Industry Technology (AICIT)
publishDate 2015
url http://umpir.ump.edu.my/id/eprint/7335/1/fskkp-2014-mazlina-Security_Scheme_for_Protecting.pdf
http://umpir.ump.edu.my/id/eprint/7335/
https://www.researchgate.net/publication/306259719_Security_Scheme_for_Protecting_Cloud_Computing_Services_Against_Bursty_DDoS_Attacks
_version_ 1643665606107463680
score 13.211869