Trilateral Trust Based Defense Mechanism against DDoS Attacks in Cloud Computing Environment

被引:7
作者
Iyengar, N. Ch. S. N. [1 ]
Ganapathy, Gopinath [2 ]
机构
[1] VIT Univ, Sch Comp Sci & Engn, Vellore 632014, Tamil Nadu, India
[2] Technol Pk Bharathidasan Univ, Tiruchirappalli 620023, India
关键词
Cloud computing; DDoS; Data center; Cloud service provider; Momentary trust; Flash crowd; Mutual trust;
D O I
10.1515/cait-2015-0033
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Distributed Denial of Service (DDoS) in a Cloud leads to a high rate of overload conditions, which subverts the Data Center (DC) performance and ends up in resource unavailability. This work proposes a "Trilateral Trust mechanism" which helps in detecting different kinds of attack groups at different points of time. It is the direct trust based defense mechanism for segregating legitimate and attack groups from the vast number of incoming requestors. It is a hybrid mechanism of trusts that follows the zero trust approach initially and eventually supports both Mutual trust and Momentary trust. This combinatorial trust mechanism helps in detecting almost all kinds of overload conditions at a cautionary period. Detecting the high rate of an attack at an earlier moment of time could reduce the traffic impact towards DC. The simulation results and profit analysis proved that the mechanism proposed is deployable at an attack-prone DC for resource protection, which would eventually benefit the DC economically as well.
引用
收藏
页码:119 / 140
页数:22
相关论文
共 8 条
[1]  
ABDULRAHMAN A, 1997, P IEEE MAL INT C COM
[2]  
Eschenauer L, 2004, LECT NOTES COMPUT SC, V2845, P47
[3]   A multilevel thrust filtration defending mechanism against DDoS attacks in cloud computing environment [J].
Iyengar, N. Ch. Sriman Narayana ;
Ganapathy, Gopinath ;
Kumar, P.C. Mogan ;
Abraham, Ajith .
International Journal of Grid and Utility Computing, 2014, 5 (04) :236-248
[4]  
Jeyanthi N., 2012, International Journal of Communication Networks and Information Security, V4, P163
[5]   Escape-on-Sight: An Efficient and Scalable Mechanism for Escaping DDoS Attacks in Cloud Computing Environment [J].
Jeyanthi, N. ;
Iyengar, N. Ch. S. N. .
CYBERNETICS AND INFORMATION TECHNOLOGIES, 2013, 13 (01) :46-60
[6]  
Kannammal A, 2013, INT J COMMUNICATION, V5, P110
[7]   Incorporating Social Networks and User Opinions for Collaborative Recommendation: Local Trust Network based Method [J].
Liu, Bin ;
Yuan, Zheng .
PROCEEDINGS OF THE RECSYS'2010 ACM CHALLENGE ON CONTEXT-AWARE MOVIE RECOMMENDATION (CAMRA2010), 2010, :53-56
[8]  
Zacharia G., 1999, 3 INT C AUT AG AG 99