Simulation-Based Study of Distributed Denial of Service Attacks Counteract in the Cloud Services

نویسنده

  • WAEL ALOSAIMI
چکیده

Network availability is threatened by the traditional Denial of Service (DoS) and Distributed Denial of Service (DDoS) attacks. The risk is much increased with the emergence of the new computing paradigm of cloud computing. In this era, DDoS attacks can threaten the cloud sustainability by hitting its pricing model exploiting the cloud scalability feature. Therefore, a new phenomenon is emerged as a result of launching DDoS attacks against the cloud customers. It is called Economic Denial of Sustainability (EDoS). It is no more than an economic version of DDoS attack sharing its mechanism but different in the final aim. In order to defeat DDoS and EDoS attacks, the filtering firewalls can play main role in this regard. This paper is an extended version of a previous work that invented by the authors which introduced a new technique to mitigate the impacts of such attacks depending on the firewall features in managing a verification process to maintain the targeted system. The proposed framework is known as Enhanced DDoSMitigation System (Enhanced DDoS-MS). The firewalls characteristics are evaluated using OPNET simulation tool. The results showed that the firewall is effective in mitigating the DDoS impacts by limiting the response time, throughput, server load, and the traffic sent and received under attack. The paper also suggests using an active test bed for evaluating the proposed framework in a real manner. Key-words: cloud computing, Firewall, Distributed Denial of Service attacks, DDoS, Economic Denial of Sustainability, EDoS. WSEAS TRANSACTIONS on COMPUTER RESEARCH Wael Alosaimi, Mazin Alshamrani, Khalid Al-Begain E-ISSN: 2415-1521 19 Volume 4, 2016 The paper is organised as the following: an overview of cloud computing will be presented in the first section. After that, Denial of Service attack will be defined, Distributed Denial of Service attacks will be classified into two main types, and the Economic Denial of sustainability concept will be explained. The proposed framework will be described after that and its evaluation will be presented in terms of the simulation setup and the achieved results.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

HF-Blocker: Detection of Distributed Denial of Service Attacks Based On Botnets

Abstract—Today, botnets have become a serious threat to enterprise networks. By creation of network of bots, they launch several attacks, distributed denial of service attacks (DDoS) on networks is a sample of such attacks. Such attacks with the occupation of system resources, have proven to be an effective method of denying network services. Botnets that launch HTTP packet flood attacks agains...

متن کامل

RESCUE: Reputation based Service for Cloud User Environment

Exceptional characteristics of Cloud computing has replaced all traditional computing. With reduced resource management and without in-advance investment, it has been victorious in making the IT world to migrate towards it. Microsoft announced its office package as Cloud, which can prevent people moving from Windows to Linux. As this drift is escalating in an exponential rate, the cloud environ...

متن کامل

Neural Network Based Protection of Software Defined Network Controller against Distributed Denial of Service Attacks

Software Defined Network (SDN) is a new architecture for network management and its main concept is centralizing network management in the network control level that has an overview of the network and determines the forwarding rules for switches and routers (the data level). Although this centralized control is the main advantage of SDN, it is also a single point of failure. If this main contro...

متن کامل

Detecting Denial of Service Message Flooding Attacks in SIP based Services

Increasing the popularity of SIP based services (VoIP, IPTV, IMS infrastructure) lead to concerns about its ‎security. The main signaling protocol of next generation networks and VoIP systems is Session Initiation Protocol ‎‎(SIP). Inherent vulnerabilities of SIP, misconfiguration of its related components and also its implementation ‎deficiencies cause some security concerns in SIP based infra...

متن کامل

DoS-Resistant Attribute-Based Encryption in Mobile Cloud Computing with Revocation

Security and privacy are very important challenges for outsourced private data over cloud storages. By taking Attribute-Based Encryption (ABE) for Access Control (AC) purpose we use fine-grained AC over cloud storage. In this paper, we extend previous Ciphertext Policy ABE (CP-ABE) schemes especially for mobile and resource-constrained devices in a cloud computing environment in two aspects, a ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2016