Chaotic Theory based Defensive Mechanism against Distributed Denial of Service Attack in Cloud Computing Environment

被引:0
作者
Iyengar, N. Ch. S. N. [1 ]
Ganapathy, Gopinath [2 ]
机构
[1] VIT Univ, Sch Engn & Comp Sci, Vellore 632014, Tamil Nadu, India
[2] Technol Pk Bharathidasan Univ, Tiruchirappalli 620023, India
来源
INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS | 2015年 / 9卷 / 09期
关键词
DDoS; Flash crowd; Cloud Computing; Chaos; Lyapunov's Stability;
D O I
10.14257/ijsia.2015.9.9.18
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Cloud computing is an advantageous technology, which allows any enterprises to shift their data towards Cloud Service Provider (CSP) end. This shift poses an essential necessity for data being available all the time with a considerable level of security. Availability is an important concern for any subscribers as their sensitive data are prone to attack threats. Resource and data availability are most important security measure. So, blocking the attack traffic towards Data Center (DC) improves availability, but passive outwitting leads to high false positive and negative rate. This affects the legitimate requestors being outwitted. So, the proposed chaotic theory based defense mechanism considers the stability state of traffic and detects the anomaly traffic condition. The anomaly traffic condition is just the passive way of diminishing the effect of overload, but classifying them appropriately and allowing the non-attack case of overload improves the availability and utilization and reduces the false case rates. Considering several cases of overload threats and allowing the legitimate overload case improves efficiency. The simulation results proved that the mechanism proposed is deployable at an attack-prone DC for resource protection, which would eventually benefit the DC economically as well.
引用
收藏
页码:197 / 211
页数:15
相关论文
共 18 条
[1]   Insider threat Detection using Log analysis and Event Correlation [J].
Ambre, Amruta ;
Shekokar, Narendra .
INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING TECHNOLOGIES AND APPLICATIONS (ICACTA), 2015, 45 :436-445
[2]  
Chonka Ashley, 2009, IEEE COMMUNICATIONS
[3]   A Genetic Algorithm (GA) based Load Balancing Strategy for Cloud Computing [J].
Dasgupta, Kousik ;
Mandal, Brototi ;
Dutta, Paramartha ;
Mondal, Jyotsna Kumar ;
Dam, Santanu .
FIRST INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE: MODELING TECHNIQUES AND APPLICATIONS (CIMTA) 2013, 2013, 10 :340-347
[4]   DDoS Attack Detection using Fast Entropy Approach on Flow-Based Network Traffic [J].
David, Jisa ;
Thomas, Ciza .
BIG DATA, CLOUD AND COMPUTING CHALLENGES, 2015, 50 :30-36
[5]  
Eschenauer L, 2004, LECT NOTES COMPUT SC, V2845, P47
[6]  
Iyengar N. Ch S. N., 2014, International Journal of Communication Networks and Information Security, V6, P233
[7]   An Effective Layered Load Balance Defensive Mechanism against DDoS Attacks in Cloud Computing Environment [J].
Iyengar, N. Ch. S. N. ;
Ganapathy, Gopinath .
INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2015, 9 (07) :17-35
[8]   Trilateral Trust Based Defense Mechanism against DDoS Attacks in Cloud Computing Environment [J].
Iyengar, N. Ch. S. N. ;
Ganapathy, Gopinath .
CYBERNETICS AND INFORMATION TECHNOLOGIES, 2015, 15 (02) :119-140
[9]   A multilevel thrust filtration defending mechanism against DDoS attacks in cloud computing environment [J].
Iyengar, N. Ch. Sriman Narayana ;
Ganapathy, Gopinath ;
Kumar, P.C. Mogan ;
Abraham, Ajith .
International Journal of Grid and Utility Computing, 2014, 5 (04) :236-248
[10]  
Jeyanthi N., 2012, International Journal of Communication Networks and Information Security, V4, P163