Simulation-Based Study of Distributed Denial of Service Attacks Counteract in the Cloud Services
نویسنده
چکیده
Network availability is threatened by the traditional Denial of Service (DoS) and Distributed Denial of Service (DDoS) attacks. The risk is much increased with the emergence of the new computing paradigm of cloud computing. In this era, DDoS attacks can threaten the cloud sustainability by hitting its pricing model exploiting the cloud scalability feature. Therefore, a new phenomenon is emerged as a result of launching DDoS attacks against the cloud customers. It is called Economic Denial of Sustainability (EDoS). It is no more than an economic version of DDoS attack sharing its mechanism but different in the final aim. In order to defeat DDoS and EDoS attacks, the filtering firewalls can play main role in this regard. This paper is an extended version of a previous work that invented by the authors which introduced a new technique to mitigate the impacts of such attacks depending on the firewall features in managing a verification process to maintain the targeted system. The proposed framework is known as Enhanced DDoSMitigation System (Enhanced DDoS-MS). The firewalls characteristics are evaluated using OPNET simulation tool. The results showed that the firewall is effective in mitigating the DDoS impacts by limiting the response time, throughput, server load, and the traffic sent and received under attack. The paper also suggests using an active test bed for evaluating the proposed framework in a real manner. Key-words: cloud computing, Firewall, Distributed Denial of Service attacks, DDoS, Economic Denial of Sustainability, EDoS. WSEAS TRANSACTIONS on COMPUTER RESEARCH Wael Alosaimi, Mazin Alshamrani, Khalid Al-Begain E-ISSN: 2415-1521 19 Volume 4, 2016 The paper is organised as the following: an overview of cloud computing will be presented in the first section. After that, Denial of Service attack will be defined, Distributed Denial of Service attacks will be classified into two main types, and the Economic Denial of sustainability concept will be explained. The proposed framework will be described after that and its evaluation will be presented in terms of the simulation setup and the achieved results.
منابع مشابه
HF-Blocker: Detection of Distributed Denial of Service Attacks Based On Botnets
Abstract—Today, botnets have become a serious threat to enterprise networks. By creation of network of bots, they launch several attacks, distributed denial of service attacks (DDoS) on networks is a sample of such attacks. Such attacks with the occupation of system resources, have proven to be an effective method of denying network services. Botnets that launch HTTP packet flood attacks agains...
متن کاملRESCUE: Reputation based Service for Cloud User Environment
Exceptional characteristics of Cloud computing has replaced all traditional computing. With reduced resource management and without in-advance investment, it has been victorious in making the IT world to migrate towards it. Microsoft announced its office package as Cloud, which can prevent people moving from Windows to Linux. As this drift is escalating in an exponential rate, the cloud environ...
متن کاملNeural Network Based Protection of Software Defined Network Controller against Distributed Denial of Service Attacks
Software Defined Network (SDN) is a new architecture for network management and its main concept is centralizing network management in the network control level that has an overview of the network and determines the forwarding rules for switches and routers (the data level). Although this centralized control is the main advantage of SDN, it is also a single point of failure. If this main contro...
متن کاملDetecting Denial of Service Message Flooding Attacks in SIP based Services
Increasing the popularity of SIP based services (VoIP, IPTV, IMS infrastructure) lead to concerns about its security. The main signaling protocol of next generation networks and VoIP systems is Session Initiation Protocol (SIP). Inherent vulnerabilities of SIP, misconfiguration of its related components and also its implementation deficiencies cause some security concerns in SIP based infra...
متن کاملDoS-Resistant Attribute-Based Encryption in Mobile Cloud Computing with Revocation
Security and privacy are very important challenges for outsourced private data over cloud storages. By taking Attribute-Based Encryption (ABE) for Access Control (AC) purpose we use fine-grained AC over cloud storage. In this paper, we extend previous Ciphertext Policy ABE (CP-ABE) schemes especially for mobile and resource-constrained devices in a cloud computing environment in two aspects, a ...
متن کامل