Intrusion detection system- An efficient way to thwart against Dos/DDos attack in the cloud environment

R. Aishwarya, Dr.S. Malliga
{"title":"Intrusion detection system- An efficient way to thwart against Dos/DDos attack in the cloud environment","authors":"R. Aishwarya, Dr.S. Malliga","doi":"10.1109/ICRTIT.2014.6996163","DOIUrl":null,"url":null,"abstract":"One of the emerging and glooming technologies in the IT is Cloud computing where the information is permanently stored in the third party cloud servers and cached temporarily on clients that include different devices like desktops, entertainment centers, table computers, notebooks, wall computers, sensors, etc. Internet connection is the basic requirement for accessing the cloud. Virtualization technology is another technology which goes along with the cloud environment which is used most widely to reduce the cost purchasing the hardware infrastructures in organizations. Henceforth, the Cloud Computing Systems can be easily intruded by various types of cyber attacks including Denial of Serv-ice (DoS) attack and Distributed Denial of Service (DDoS) attack which utilize the entire resources like CPU, Memory, etc and makes the server to starve. This creates a major impact reducing the efficiency of the virtual machines. In the proposed method, attack can be overcome by Transmission Control Protocol (TCP) Mitigation Strategy which uses the SYN Cookie to prevent the attack in the cloud to prevent the attack in which the server ignores the connection packets when it does not receive the correct Acknowledgement (ACK) from the client which requested the connection. The server here has rules to be check whether it is a legitimate client or the spoofed one using the first layer of security for hop count filtering mechanism and second layer of security is encoding the sequence number of the SYN packet so that only a legitimate client can decode it. Additionally security is also provided for the data packets using the Message Authentication Code (MAC) and thus client is authenticated.","PeriodicalId":422275,"journal":{"name":"2014 International Conference on Recent Trends in Information Technology","volume":"416 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2014-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"21","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2014 International Conference on Recent Trends in Information Technology","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICRTIT.2014.6996163","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 21

Abstract

One of the emerging and glooming technologies in the IT is Cloud computing where the information is permanently stored in the third party cloud servers and cached temporarily on clients that include different devices like desktops, entertainment centers, table computers, notebooks, wall computers, sensors, etc. Internet connection is the basic requirement for accessing the cloud. Virtualization technology is another technology which goes along with the cloud environment which is used most widely to reduce the cost purchasing the hardware infrastructures in organizations. Henceforth, the Cloud Computing Systems can be easily intruded by various types of cyber attacks including Denial of Serv-ice (DoS) attack and Distributed Denial of Service (DDoS) attack which utilize the entire resources like CPU, Memory, etc and makes the server to starve. This creates a major impact reducing the efficiency of the virtual machines. In the proposed method, attack can be overcome by Transmission Control Protocol (TCP) Mitigation Strategy which uses the SYN Cookie to prevent the attack in the cloud to prevent the attack in which the server ignores the connection packets when it does not receive the correct Acknowledgement (ACK) from the client which requested the connection. The server here has rules to be check whether it is a legitimate client or the spoofed one using the first layer of security for hop count filtering mechanism and second layer of security is encoding the sequence number of the SYN packet so that only a legitimate client can decode it. Additionally security is also provided for the data packets using the Message Authentication Code (MAC) and thus client is authenticated.
入侵检测系统——一种在云环境中阻止Dos/DDos攻击的有效方法
云计算是IT领域新兴且前景黯淡的技术之一,它将信息永久存储在第三方云服务器中,并临时缓存在客户端上,这些客户端包括不同的设备,如台式机、娱乐中心、台式电脑、笔记本电脑、壁式电脑、传感器等。互联网连接是访问云的基本要求。虚拟化技术是伴随云环境而来的另一种技术,它被广泛用于降低组织中购买硬件基础设施的成本。从此以后,云计算系统很容易被各种类型的网络攻击入侵,包括拒绝服务(DoS)攻击和分布式拒绝服务(DDoS)攻击,这些攻击利用CPU,内存等整个资源,使服务器饿死。这对降低虚拟机的效率产生了重大影响。在该方法中,可以通过TCP (Transmission Control Protocol)缓解策略克服攻击,该策略使用SYN Cookie在云中防止攻击,以防止服务器在未收到请求连接的客户端正确的ACK (Acknowledgement)时忽略连接数据包的攻击。这里的服务器有规则来检查它是合法的客户端还是被欺骗的客户端,使用第一层安全的跳数过滤机制,第二层安全编码SYN包的序列号,以便只有合法的客户端才能解码它。此外,还使用消息认证码(MAC)为数据包提供安全性,从而对客户端进行身份验证。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信