DoS Attack Prevention Using Rule-Based Sniffing Technique and Firewall in Cloud Computing

Nowadays, we are entering an era where the internet has become a necessary infrastructure and support that can be applied as a means of regular communication and data service. In these services, cloud-based on servers has an essential role as it can serve numerous types of devices that are interconn...

Full description

Bibliographic Details
Main Authors: Fidele Kagiraneza Alexis, Hartanto Agus
Format: Article
Language:English
Published: EDP Sciences 2019-01-01
Series:E3S Web of Conferences
Subjects:
Online Access:https://www.e3s-conferences.org/articles/e3sconf/pdf/2019/51/e3sconf_icenis2019_21004.pdf
_version_ 1818321100914819072
author Fidele Kagiraneza Alexis
Hartanto Agus
author_facet Fidele Kagiraneza Alexis
Hartanto Agus
author_sort Fidele Kagiraneza Alexis
collection DOAJ
description Nowadays, we are entering an era where the internet has become a necessary infrastructure and support that can be applied as a means of regular communication and data service. In these services, cloud-based on servers has an essential role as it can serve numerous types of devices that are interconnected with several protocols. Unfortunately, internet cloud servers become the main target of attacks such as Denial of Service (DoS), Distributed Denial of Service (DDoS). These attacks have illegal access that could interfere in service functions. Sniffing techniques are typically practiced by hackers and crackers to tap data that passes through the internet network. In this paper, sniffing technique aims to identify packets that are moving across the network. This technique will distinguish packet on the routers or bridges through a sniffer tool known as snort connected to a database containing the attack pattern. If the sniffing system encounters strange patterns and recognizes them as attacks, it will notify to the firewall to separate the attacker's original Internet Protocol (IP) address. Then, communication from the attacker's host to the target will be discontinued. Consequently, the identified attack activity will stop working, and the service will proceed to run.
first_indexed 2024-12-13T10:35:32Z
format Article
id doaj.art-fbf040827ced4b2fb18bf15fd5eaf0cf
institution Directory Open Access Journal
issn 2267-1242
language English
last_indexed 2024-12-13T10:35:32Z
publishDate 2019-01-01
publisher EDP Sciences
record_format Article
series E3S Web of Conferences
spelling doaj.art-fbf040827ced4b2fb18bf15fd5eaf0cf2022-12-21T23:50:45ZengEDP SciencesE3S Web of Conferences2267-12422019-01-011252100410.1051/e3sconf/201912521004e3sconf_icenis2019_21004DoS Attack Prevention Using Rule-Based Sniffing Technique and Firewall in Cloud ComputingFidele Kagiraneza AlexisHartanto Agus0Master of Information System, School of Postgraduate Studies Diponegoro UniversityNowadays, we are entering an era where the internet has become a necessary infrastructure and support that can be applied as a means of regular communication and data service. In these services, cloud-based on servers has an essential role as it can serve numerous types of devices that are interconnected with several protocols. Unfortunately, internet cloud servers become the main target of attacks such as Denial of Service (DoS), Distributed Denial of Service (DDoS). These attacks have illegal access that could interfere in service functions. Sniffing techniques are typically practiced by hackers and crackers to tap data that passes through the internet network. In this paper, sniffing technique aims to identify packets that are moving across the network. This technique will distinguish packet on the routers or bridges through a sniffer tool known as snort connected to a database containing the attack pattern. If the sniffing system encounters strange patterns and recognizes them as attacks, it will notify to the firewall to separate the attacker's original Internet Protocol (IP) address. Then, communication from the attacker's host to the target will be discontinued. Consequently, the identified attack activity will stop working, and the service will proceed to run.https://www.e3s-conferences.org/articles/e3sconf/pdf/2019/51/e3sconf_icenis2019_21004.pdfsecuritysniffing and firewalldenial of service attack prevention
spellingShingle Fidele Kagiraneza Alexis
Hartanto Agus
DoS Attack Prevention Using Rule-Based Sniffing Technique and Firewall in Cloud Computing
E3S Web of Conferences
security
sniffing and firewall
denial of service attack prevention
title DoS Attack Prevention Using Rule-Based Sniffing Technique and Firewall in Cloud Computing
title_full DoS Attack Prevention Using Rule-Based Sniffing Technique and Firewall in Cloud Computing
title_fullStr DoS Attack Prevention Using Rule-Based Sniffing Technique and Firewall in Cloud Computing
title_full_unstemmed DoS Attack Prevention Using Rule-Based Sniffing Technique and Firewall in Cloud Computing
title_short DoS Attack Prevention Using Rule-Based Sniffing Technique and Firewall in Cloud Computing
title_sort dos attack prevention using rule based sniffing technique and firewall in cloud computing
topic security
sniffing and firewall
denial of service attack prevention
url https://www.e3s-conferences.org/articles/e3sconf/pdf/2019/51/e3sconf_icenis2019_21004.pdf
work_keys_str_mv AT fidelekagiranezaalexis dosattackpreventionusingrulebasedsniffingtechniqueandfirewallincloudcomputing
AT hartantoagus dosattackpreventionusingrulebasedsniffingtechniqueandfirewallincloudcomputing