G. Sophia, Meera Gandhi, Jeppiar Nagar, Gandhi Salai
{"title":"云弹性系统的DDoS隐身检测机制","authors":"G. Sophia, Meera Gandhi, Jeppiar Nagar, Gandhi Salai","doi":"10.1109/ICICES.2017.8070740","DOIUrl":null,"url":null,"abstract":"Cloud computing is one of the recent trending technology. Cloud computing provides the user with multiple resources. The resources include storage, capacity, processing and so on. There are different types of services provided by the cloud, they are Infrastructure as a Service(IaaS), Software as a Service(SaaS) and Platform as a Service(Paas). The user need not invest large amount of money for the infrastructure that is need to develop a small scale industry. Instead the developer can make use of the resources provided but the cloud and can pay only for the services which they are using. The main functionality of Cloud is to provide multiple resources to the users. Storing the data in the Cloud one of the major advantage. The hacker or the Botmaster will try to access or try to gain information of the data which is stored in the Cloud, by sending multiple request to the system. When the number of request exceeds the servers limit, the server will not be able to process the incoming request and the server may crash. The main aim of the paper is to create a framework for Cloud resilience system, which have the ability to provide the service for the clients even when the system is flooded with multiple request. When the incoming request exceeds the limit then the server will not be able to process the request and may crash. Inorder to prevent the server from crashing, a Stealthy DDos Detection Mechanism has been introduced. In this mechanism, the server monitors the number of incoming request given by each individual user. The server is initially given a limited amount of capacity to process the request of a single IP address. When the server load increases it checks all the request given by each user, if the request given by an individual user exceeds the servers limit then all the request from that particular IP address is blocked and all the services which are provided to that IP address is also denied.","PeriodicalId":134931,"journal":{"name":"2017 International Conference on Information Communication and Embedded Systems (ICICES)","volume":"47 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2017-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":"{\"title\":\"Stealthy DDoS detecting mechanism for cloud resilience system\",\"authors\":\"G. Sophia, Meera Gandhi, Jeppiar Nagar, Gandhi Salai\",\"doi\":\"10.1109/ICICES.2017.8070740\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Cloud computing is one of the recent trending technology. Cloud computing provides the user with multiple resources. The resources include storage, capacity, processing and so on. There are different types of services provided by the cloud, they are Infrastructure as a Service(IaaS), Software as a Service(SaaS) and Platform as a Service(Paas). The user need not invest large amount of money for the infrastructure that is need to develop a small scale industry. Instead the developer can make use of the resources provided but the cloud and can pay only for the services which they are using. The main functionality of Cloud is to provide multiple resources to the users. Storing the data in the Cloud one of the major advantage. The hacker or the Botmaster will try to access or try to gain information of the data which is stored in the Cloud, by sending multiple request to the system. When the number of request exceeds the servers limit, the server will not be able to process the incoming request and the server may crash. The main aim of the paper is to create a framework for Cloud resilience system, which have the ability to provide the service for the clients even when the system is flooded with multiple request. When the incoming request exceeds the limit then the server will not be able to process the request and may crash. Inorder to prevent the server from crashing, a Stealthy DDos Detection Mechanism has been introduced. In this mechanism, the server monitors the number of incoming request given by each individual user. The server is initially given a limited amount of capacity to process the request of a single IP address. When the server load increases it checks all the request given by each user, if the request given by an individual user exceeds the servers limit then all the request from that particular IP address is blocked and all the services which are provided to that IP address is also denied.\",\"PeriodicalId\":134931,\"journal\":{\"name\":\"2017 International Conference on Information Communication and Embedded Systems (ICICES)\",\"volume\":\"47 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2017-02-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"2\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2017 International Conference on Information Communication and Embedded Systems (ICICES)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICICES.2017.8070740\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2017 International Conference on Information Communication and Embedded Systems (ICICES)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICICES.2017.8070740","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Stealthy DDoS detecting mechanism for cloud resilience system
Cloud computing is one of the recent trending technology. Cloud computing provides the user with multiple resources. The resources include storage, capacity, processing and so on. There are different types of services provided by the cloud, they are Infrastructure as a Service(IaaS), Software as a Service(SaaS) and Platform as a Service(Paas). The user need not invest large amount of money for the infrastructure that is need to develop a small scale industry. Instead the developer can make use of the resources provided but the cloud and can pay only for the services which they are using. The main functionality of Cloud is to provide multiple resources to the users. Storing the data in the Cloud one of the major advantage. The hacker or the Botmaster will try to access or try to gain information of the data which is stored in the Cloud, by sending multiple request to the system. When the number of request exceeds the servers limit, the server will not be able to process the incoming request and the server may crash. The main aim of the paper is to create a framework for Cloud resilience system, which have the ability to provide the service for the clients even when the system is flooded with multiple request. When the incoming request exceeds the limit then the server will not be able to process the request and may crash. Inorder to prevent the server from crashing, a Stealthy DDos Detection Mechanism has been introduced. In this mechanism, the server monitors the number of incoming request given by each individual user. The server is initially given a limited amount of capacity to process the request of a single IP address. When the server load increases it checks all the request given by each user, if the request given by an individual user exceeds the servers limit then all the request from that particular IP address is blocked and all the services which are provided to that IP address is also denied.