Multi-Layered Attack Recognition (MLAR) Model to Protect Cloud From EDOS Attacks

Author(s):  
Yashika Arora
Keyword(s):  
Author(s):  
Khalid Al-Begain ◽  
Michal Zak ◽  
Wael Alosaimi ◽  
Charles Turyagyenda

The chapter presents current security concerns in the Cloud Computing Environment. The cloud concept and operation raise many concerns for cloud users since they have no control of the arrangements made to protect the services and resources offered. Additionally, it is obvious that many of the cloud service providers will be subject to significant security attacks. Some traditional security attacks such as the Denial of Service attacks (DoS) and distributed DDoS attacks are well known, and there are several proposed solutions to mitigate their impact. However, in the cloud environment, DDoS becomes more severe and can be coupled with Economical Denial of Sustainability (EDoS) attacks. The chapter presents a general overview of cloud security, the types of vulnerabilities, and potential attacks. The chapter further presents a more detailed analysis of DDoS attacks' launch mechanisms and well-known DDoS defence mechanisms. Finally, the chapter presents a DDoS-Mitigation system and potential future research directions.


2018 ◽  
pp. 1511-1554
Author(s):  
Khalid Al-Begain ◽  
Michal Zak ◽  
Wael Alosaimi ◽  
Charles Turyagyenda

The chapter presents current security concerns in the Cloud Computing Environment. The cloud concept and operation raise many concerns for cloud users since they have no control of the arrangements made to protect the services and resources offered. Additionally, it is obvious that many of the cloud service providers will be subject to significant security attacks. Some traditional security attacks such as the Denial of Service attacks (DoS) and distributed DDoS attacks are well known, and there are several proposed solutions to mitigate their impact. However, in the cloud environment, DDoS becomes more severe and can be coupled with Economical Denial of Sustainability (EDoS) attacks. The chapter presents a general overview of cloud security, the types of vulnerabilities, and potential attacks. The chapter further presents a more detailed analysis of DDoS attacks' launch mechanisms and well-known DDoS defence mechanisms. Finally, the chapter presents a DDoS-Mitigation system and potential future research directions.


2017 ◽  
Vol 7 (1.5) ◽  
pp. 202 ◽  
Author(s):  
Suneetha Bulla ◽  
B. Basaveswara Rao ◽  
K. Gangadhara Rao ◽  
K. Chandan

Cloud computing is that the one among the quickest making and rising development in IT trade on pay-as – you-go premise. Flexibility is that the one among the properties of the cloud computing, it exhibits the response for DDoS ambush and created new quite strike significantly EDoS assault .This paper displays the impact of EDoS assaults on the cloud computing services, touching on single category of service. A check demonstrate was made public, performed associated contrasted and an expositive lining model. The trial test-bed was directed on Amazon internet Services cloud platform, it catches the cloud edges and incorporates range of execution measurements and value measurements, as an instance, range of running cases on the cloud, latency or latency , usage of distributed computing assets, throughput, and also the caused value as a result of the assault. The outcomes square measure introduced and conclusions square measure talked concerning.


2020 ◽  
Vol 8 (5) ◽  
pp. 1236-1242

In advent of cloud environment, cloud operator is not a completely trusted to put on private information, because of lack of consumer to cloud control. To assurance privacy, documents sharer deploy their encipher documents. Encipher documents dispense to among consumers using CP-ABE scheme. But it is not completely safe in opposition to different assaults. The prior knowledge cannot offer any verification ability to cloud operator whether the user can decipher or not. Various invaders may obtain lot of document by initiate EDoS assaults. The consumer of cloud abides cost. To handle above issues, this article suggests a problem solving plan to safe encipher cloud repository from EDoS assaults and maintain supply utilization. It utilizes CP-ABE tactics in a black-box method furthermore accomplish impulsive entryway contract epithetical CP-ABE. We tend to present 2 mechanisms for various styles, observed via achievement and shield research.


Author(s):  
Ahmad Shawahna ◽  
Marwan Abu-Amara ◽  
Ashraf Mahmoud ◽  
Yahya Esmail Osais

Economic Denial of Sustainability (EDoS) is a latest threat in the cloud environment in which EDoS attackers continually request huge number of resources that includes virtual machines, virtual security devices, virtual networking devices, databases and so on to slowly exploit illegal traffic to trigger cloud-based scaling capabilities. As a result, the targeted cloud ends with a consumer bill that could lead to bankruptcy. This paper proposes an intelligent reactive approach that utilizes Genetic Algorithm and Artificial Neural Network (GANN) for classification of cloud server consumer to minimize the effect of EDoS attacks and will be beneficial to small and medium size organizations. EDoS attack encounters the illegal traffic so the work is progressed into two phases: Artificial Neural Network (ANN) is used to determine affected path and to detect suspected service provider out of the detected affected route which further consist of training and testing phase. The properties of every server are optimized by using an appropriate fitness function of Genetic Algorithm (GA) based on energy consumption of server. ANN considered these properties to train the system to distinguish between the genuine overwhelmed server and EDoS attack affected server. The experimental results show that the proposed Genetic and Artificial Neural Network (GANN) algorithm performs better compared to existing Fuzzy Entropy and Lion Neural Learner (FLNL) technique with values of precision, recall and f-measure are increased by 3.37%, 10.26% and 6.93% respectively.


Sign in / Sign up

Export Citation Format

Share Document