Online Submission!

Open Journal Systems

PERFORMANCE ANALYSIS OF DIFFERENT TYPES OF NETWORK ATTACKS IN THE CLOUD ENVIRONMENT

V. Jagadeeswari, V.M. Sivagami

Abstract


In recent years, cloud computing has gained importance for provision of services and storage of data in the Internet. However the significant challenges in securing the cloud environment from different types of attacks has upsurge. The Existing system focused only on the DOS attack using the pro_validation Method based on the SLA policies. The limitation with this is lagging of users privacy with such SLA Policies. Hence, the main contribution of the proposed work is to thwart the external attacks which can exploit technical and operational vulnerabilities to attack a cloud service provider or tenants in order to gain access over the confidential data. In this proposed system different insider and external attack behaviors are analysed and discussed how these attacks are detected & counteracted by the proposed  AFC Scanner method which acts as a primary scanning system for files resides in the cloud based on the signature sets and the major entropy based attack detection & prevention  technique for mitigating the external attacks like SYN Flood(DDOS), which are the major attacks in the network transmission. Index Terms—Cloud security, AFC Scanner, malicious insider, External Attack, SYN Flood (DDOS) Attack.

Full Text:

PDF

References


L. Youseff, M. Butrico, and D. Da Silva, “Towards a unified ontology of cloud computing,” in Proc. 2008 Grid Computing EnvironmentsWorkshop.

Amazon Inc., “Amazon elastic compute cloud (Amazon EC2),” 2011.Available: http://aws.amazon.com/ec2/

“Windows Azure.” Available: http://www.windowsazure.com/en-us/

J. E. Smith and R. Nair, “The architecture of virtual machines,” IEEE Internet Comput., May 2005.

Armbrust.M (2009), ‘Above the Clouds: A Berkeley View of Cloud Computing’. In: EECS Department, University of California,Berkeley.

Cker Chiueh.T and Hsu.F.-H RAD (2012) ,” A compile-time solution to buffer overflow attacks”, In ICDCS'01.

Duncan.A.J, Creese.S, and Goldsmith.M (2012), “Insider attacks in cloud computing”, IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), 25-27 June 2012, pp. 857-862.

Garfinkel.T and Rosenblum.M (2009) introduced, “A virtual machine introspection based architecture for intrusion detection” , Netw. Distrib. Syst.Security Symp. ,pages 65-70.

Kayaalp , M. Schmitt, T. Nomani, J.Ponomarev, D., Abu Ghazaleh, (2015), "Signature-Based Protection from Code Reuse Attacks", Computers, IEEE Transactions on, On page(s): 533 - 546 Volume: 64, Issue: 2.

Riquet.D, Grimaud.G and Hauspie.M (2014), "Large-scale coordinated attacks: Impact on the cloud security", Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, pp. 561-562.

Takabi.H, Joshi.J.B.D, and Ahn.J.I (2013) introduced, “Security and privacy challenges in cloud computing environments”,

IEEE Security Privacy, vol. 8, no. 6.

Vijay Varadharajan, Senior Member, Udaya Tupakula (2014), “Security as a Service Model for Cloud Environment”, International Journal of Information and Education Technology, Vol. 4.

Yu.C (2013) introduced, “Protecting the security and privacy of the virtual machine through privilege separation,” Int. Conf. Comput. Sci. Electron. Eng. ,pages 67-72.

Zhang.Y (2012) introduced, “Cross-VM side channels and their use to extract private keys”, ACM Comput. Commun. Security Conf. ,pages 35-40.




DOI: http://dx.doi.org/10.6084/ijact.v0i0.524

Refbacks

  • There are currently no refbacks.




Copyright (c) 2016 An International Journal of Advanced Computer & Engineering Technology