PERFORMANCE ANALYSIS OF DIFFERENT TYPES OF NETWORK ATTACKS IN THE CLOUD ENVIRONMENT
AbstractIn recent years, cloud computing has gained importance for provision of services and storage of data in the Internet. However the significant challenges in securing the cloud environment from different types of attacks has upsurge. The Existing system focused only on the DOS attack using the pro_validation Method based on the SLA policies. The limitation with this is lagging of users privacy with such SLA Policies. Hence, the main contribution of the proposed work is to thwart the external attacks which can exploit technical and operational vulnerabilities to attack a cloud service provider or tenants in order to gain access over the confidential data. In this proposed system different insider and external attack behaviors are analysed and discussed how these attacks are detected & counteracted by the proposedÂ AFC Scanner method which acts as a primary scanning system for files resides in the cloud based on the signature sets and the major entropy based attack detection & preventionÂ technique for mitigating the external attacks like SYN Flood(DDOS), which are the major attacks in the network transmission. Index Termsâ€”Cloud security, AFC Scanner, malicious insider, External Attack, SYN Flood (DDOS) Attack.
L. Youseff, M. Butrico, and D. Da Silva, â€œTowards a unified ontology of cloud computing,â€ in Proc. 2008 Grid Computing EnvironmentsWorkshop.
Amazon Inc., â€œAmazon elastic compute cloud (Amazon EC2),â€ 2011.Available: http://aws.amazon.com/ec2/
â€œWindows Azure.â€ Available: http://www.windowsazure.com/en-us/
J. E. Smith and R. Nair, â€œThe architecture of virtual machines,â€ IEEE Internet Comput., May 2005.
Armbrust.M (2009), â€˜Above the Clouds: A Berkeley View of Cloud Computingâ€™. In: EECS Department, University of California,Berkeley.
Cker Chiueh.T and Hsu.F.-H RAD (2012) ,â€ A compile-time solution to buffer overflow attacksâ€, In ICDCS'01.
Duncan.A.J, Creese.S, and Goldsmith.M (2012), â€œInsider attacks in cloud computingâ€, IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), 25-27 June 2012, pp. 857-862.
Garfinkel.T and Rosenblum.M (2009) introduced, â€œA virtual machine introspection based architecture for intrusion detectionâ€ , Netw. Distrib. Syst.Security Symp. ,pages 65-70.
Kayaalp , M. Schmitt, T. Nomani, J.Ponomarev, D., Abu Ghazaleh, (2015), "Signature-Based Protection from Code Reuse Attacks", Computers, IEEE Transactions on, On page(s): 533 - 546 Volume: 64, Issue: 2.
Riquet.D, Grimaud.G and Hauspie.M (2014), "Large-scale coordinated attacks: Impact on the cloud security", Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, pp. 561-562.
Takabi.H, Joshi.J.B.D, and Ahn.J.I (2013) introduced, â€œSecurity and privacy challenges in cloud computing environmentsâ€,
IEEE Security Privacy, vol. 8, no. 6.
Vijay Varadharajan, Senior Member, Udaya Tupakula (2014), â€œSecurity as a Service Model for Cloud Environmentâ€, International Journal of Information and Education Technology, Vol. 4.
Yu.C (2013) introduced, â€œProtecting the security and privacy of the virtual machine through privilege separation,â€ Int. Conf. Comput. Sci. Electron. Eng. ,pages 67-72.
Zhang.Y (2012) introduced, â€œCross-VM side channels and their use to extract private keysâ€, ACM Comput. Commun. Security Conf. ,pages 35-40.
The submitter hereby warrants that the Work (collectively, the “Materials”) is original and that he/she is the author of the Materials. To the extent the Materials incorporate text passages, figures, data or other material from the works of others, the undersigned has obtained any necessary permissions. Where necessary, the undersigned has obtained all third party permissions and consents to grant the license above and has all copies of such permissions and consents.
The submitter represents that he/she has the power and authority to make and execute this assignment. The submitter agrees to indemnify and hold harmless the COMPUSOFT from any damage or expense that may arise in the event of a breach of any of the warranties set forth above. For authenticity, validity and originality of the research paper the author/authors will be totally responsible.