Security Scheme for Protecting Cloud Computing Services Against Bursty DDoS Attacks

In cloud computing, data and applications are maintained on remote servers and accessed via the Internet. Virtualised resources such as dynamic servers are operated through the Internet, which increases the economic benefits accrued to customers from software. Cloud computing reduces customer concer...

Full description

Bibliographic Details
Main Authors: Mazlina, Abdul Majid, Naser, Aws, Mohamad Fadli, Zolkipli, Khan, Nusrat Ullah
Format: Article
Language:English
Published: The International Association for Information, Culture, Human and Industry Technology (AICIT) 2015
Subjects:
Online Access:http://umpir.ump.edu.my/id/eprint/7335/1/fskkp-2014-mazlina-Security_Scheme_for_Protecting.pdf
_version_ 1825821926286688256
author Mazlina, Abdul Majid
Naser, Aws
Mohamad Fadli, Zolkipli
Khan, Nusrat Ullah
author_facet Mazlina, Abdul Majid
Naser, Aws
Mohamad Fadli, Zolkipli
Khan, Nusrat Ullah
author_sort Mazlina, Abdul Majid
collection UMP
description In cloud computing, data and applications are maintained on remote servers and accessed via the Internet. Virtualised resources such as dynamic servers are operated through the Internet, which increases the economic benefits accrued to customers from software. Cloud computing reduces customer concerns about software licenses, hardware, and overall system maintenance. Connections between web services are typically enabled using the simple object access protocol (SOAP), and extensible markup language (XML) or hypertext transport protocol (HTTP) is used to construct SOAP messages. Denial of service (DoS) and distributed DoS (DDoS) are two major problems affecting cloud computing services, and it is a challenge to resolve them completely. The identity of the perpetrators of these acts is usually difficult to ascertain especially when the attacks are carried out using spoofed IP addresses. Consequently, differentiating genuine packets from the packets sent by hackers is difficult. The addresses are spoofed with the intention of causing harm to cloud service provider communication channels. Distinguishing legitimate messages from illegitimate messages is an important step towards solving the problem of DDoS attacks. Modulo and CLASSIE methods effectively detect and reduce spoofing attacks using unique rulesets. In this paper, we propose using modulo packet marking and a method called reconstruct and drop (RAD) to differentiate and discard malicious packets. The proposed method improves the detection and filtering of DDoS attacks. Further, the results of comparisons conducted indicate that the proposed method requires fewer bits than Huffman code and its performance is better than that of cloud protector.
first_indexed 2024-03-06T11:48:54Z
format Article
id UMPir7335
institution Universiti Malaysia Pahang
language English
last_indexed 2024-03-06T11:48:54Z
publishDate 2015
publisher The International Association for Information, Culture, Human and Industry Technology (AICIT)
record_format dspace
spelling UMPir73352018-02-01T07:49:02Z http://umpir.ump.edu.my/id/eprint/7335/ Security Scheme for Protecting Cloud Computing Services Against Bursty DDoS Attacks Mazlina, Abdul Majid Naser, Aws Mohamad Fadli, Zolkipli Khan, Nusrat Ullah T Technology (General) QA75 Electronic computers. Computer science In cloud computing, data and applications are maintained on remote servers and accessed via the Internet. Virtualised resources such as dynamic servers are operated through the Internet, which increases the economic benefits accrued to customers from software. Cloud computing reduces customer concerns about software licenses, hardware, and overall system maintenance. Connections between web services are typically enabled using the simple object access protocol (SOAP), and extensible markup language (XML) or hypertext transport protocol (HTTP) is used to construct SOAP messages. Denial of service (DoS) and distributed DoS (DDoS) are two major problems affecting cloud computing services, and it is a challenge to resolve them completely. The identity of the perpetrators of these acts is usually difficult to ascertain especially when the attacks are carried out using spoofed IP addresses. Consequently, differentiating genuine packets from the packets sent by hackers is difficult. The addresses are spoofed with the intention of causing harm to cloud service provider communication channels. Distinguishing legitimate messages from illegitimate messages is an important step towards solving the problem of DDoS attacks. Modulo and CLASSIE methods effectively detect and reduce spoofing attacks using unique rulesets. In this paper, we propose using modulo packet marking and a method called reconstruct and drop (RAD) to differentiate and discard malicious packets. The proposed method improves the detection and filtering of DDoS attacks. Further, the results of comparisons conducted indicate that the proposed method requires fewer bits than Huffman code and its performance is better than that of cloud protector. The International Association for Information, Culture, Human and Industry Technology (AICIT) 2015 Article PeerReviewed application/pdf en http://umpir.ump.edu.my/id/eprint/7335/1/fskkp-2014-mazlina-Security_Scheme_for_Protecting.pdf Mazlina, Abdul Majid and Naser, Aws and Mohamad Fadli, Zolkipli and Khan, Nusrat Ullah (2015) Security Scheme for Protecting Cloud Computing Services Against Bursty DDoS Attacks. International Journal on Advances in Information Sciences and Service Sciences, 7 (1). pp. 39-45. ISSN 2233-9345. (Published) https://www.researchgate.net/publication/306259719_Security_Scheme_for_Protecting_Cloud_Computing_Services_Against_Bursty_DDoS_Attacks
spellingShingle T Technology (General)
QA75 Electronic computers. Computer science
Mazlina, Abdul Majid
Naser, Aws
Mohamad Fadli, Zolkipli
Khan, Nusrat Ullah
Security Scheme for Protecting Cloud Computing Services Against Bursty DDoS Attacks
title Security Scheme for Protecting Cloud Computing Services Against Bursty DDoS Attacks
title_full Security Scheme for Protecting Cloud Computing Services Against Bursty DDoS Attacks
title_fullStr Security Scheme for Protecting Cloud Computing Services Against Bursty DDoS Attacks
title_full_unstemmed Security Scheme for Protecting Cloud Computing Services Against Bursty DDoS Attacks
title_short Security Scheme for Protecting Cloud Computing Services Against Bursty DDoS Attacks
title_sort security scheme for protecting cloud computing services against bursty ddos attacks
topic T Technology (General)
QA75 Electronic computers. Computer science
url http://umpir.ump.edu.my/id/eprint/7335/1/fskkp-2014-mazlina-Security_Scheme_for_Protecting.pdf
work_keys_str_mv AT mazlinaabdulmajid securityschemeforprotectingcloudcomputingservicesagainstburstyddosattacks
AT naseraws securityschemeforprotectingcloudcomputingservicesagainstburstyddosattacks
AT mohamadfadlizolkipli securityschemeforprotectingcloudcomputingservicesagainstburstyddosattacks
AT khannusratullah securityschemeforprotectingcloudcomputingservicesagainstburstyddosattacks