scholarly journals A Client Bootstrapping Protocol for DoS Attack Mitigation on Entry Point Services in the Cloud

2020 ◽  
Vol 2020 ◽  
pp. 1-12
Author(s):  
Hussain M. J. Almohri ◽  
Mohammad Almutawa ◽  
Mahmoud Alawadh ◽  
Karim Elish

This paper presents a client bootstrapping protocol for proxy-based moving target defense system for the cloud. The protocol establishes the identity of prospective clients who intend to connect to web services behind obscure proxy servers in a cloud-based network. In client bootstrapping, a set of initial line of defense services receive new client requests, execute an algorithm to assign them to a proxy server, and reply back with the address of the chosen proxy server. The bootstrapping protocol only reveals one proxy address to each client, maintaining the obscurity of the addresses for other proxy servers. Hiding the addresses of proxy servers aims to lower the likelihood that a proxy server becomes the victim of a denial-of-service (DoS) attack. Existing works address this problem by requiring the solution of computationally intensive puzzles from prospective clients. This solution slows the progression of attacks as well as new clients. This paper presents an alternative idea by observing that limited capacity of handling initial network requests is the primary cause of denial-of-service attacks. Thus, the suggested alternative is to utilize cost-effective high-capacity networks to handle client bootstrapping, thus thwarting attacks on the initial line of defense. The prototype implementation of the protocol using Google’s firebase demonstrates the proof of concept for web services that receive network requests from clients on mobile devices.

2000 ◽  
Vol 122 (4) ◽  
pp. 450-459 ◽  
Author(s):  
C. W. Wang ◽  
L. Berhan ◽  
A. M. Sastry

Applications for porous fibrous materials range from electrochemical substrates to web reinforcement in polymeric composite materials. The details of local load transfer are studied in a class of cost-effective, stochastic fibrous networks used in battery applications, which form the substrate for a composite electrode. The connectivity of these materials is quantitatively related to modulus and strength, and detailed results of different simulations approaches in approximating material construction are discussed. In Part I, we discuss microscale assumptions, including beam type, nodal connections and equivalence of models to more physically realistic models. Simulation of large networks is computationally intensive, and show low-strain, nonlinear behavior even when comprised of elastic elements when failure criteria (here, strength-of-materials) are applied to produce sequential rupture of beams and nodes. Strategies for effective simulation of these materials requires detailed analysis of the simplest assumptions which can be made at the microscale which produce acceptably realistic response. We show that simple Euler-Bernoulli beam elements can be used to effectively model such materials, even when segment lengths in a network are very small. Moreover, connections comprised of simple torsion springs produce realistic behavior, and can mimic more realistic junctures by adaptation of the linear solution to a compliant zone model. In Part II of this work, we demonstrate the effect of model selection on full network behavior, and also discuss issues of connectivity at the scale of the porous material rather than element-by-element. This work points toward use of simple constructions to model complex behavior, and may ultimately provide insight into modeling of a large class of porous materials. [S0094-4289(00)01704-7]


2020 ◽  
Vol 1 (2) ◽  
pp. 1-5
Author(s):  
Bibek Naha ◽  
Siddhartha Banerjee ◽  
Sayanti Mondal

Cloud Computing is one of the most nurtured as well as debated topic in today’s world. Billions of data of various fields ranging from personal users to large business enterprises reside in Cloud. Therefore, availability of this huge amount of data and services is of immense importance. The DOS (Denial of Service) attack is a well-known threat to the availability of data in a smaller premise. Whenever, it’s a Cloud environment this simple DOS attack takes the form of DDOS (Distributed Denial of Service) attack. This paper provides a generic insight into the various kinds of DOS as well as DDOS attacks. Moreover, a handful of countermeasures have also been depicted here. In a nutshell, it aims at raising an awareness by outlining a clear picture of the Cloud availability issues.Our paper gives a comparative study of different techniques of detecting DOS.


2017 ◽  
Vol 7 (1.1) ◽  
pp. 230
Author(s):  
C. Vasan Sai Krishna ◽  
Y. Bhuvana ◽  
P. Pavan Kumar ◽  
R. Murugan

In a typical DoS attack, the attacker tries to bring the server down. In this case, the attacker sends a lot of bogus queries to the server to consume its computing power and bandwidth. As the server’s bandwidth and computing power are always greater than attacker’s client machine, He seeks help from a group of connected computers. DDoS attack involves a lot of client machines which are hijacked by the attacker (together called as botnet). As the server handles all these requests sent by the attacker, all its resources get consumed and it cannot provide services. In this project, we are more concerned about reducing the computing power on the server side by giving the client a puzzle to solve. To prevent such attacks, we use client puzzle mechanism. In this mechanism, we introduce a client-side puzzle which demands the machine to perform tasks that require more resources (computation power). The client’s request is not directly sent to the server. Moreover, there will be an Intermediate Server to monitor all the requests that are being sent to the main server. Before the client’s request is sent to the server, it must solve a puzzle and send the answer. Intermediate Server is used to validate the answer and give access to the client or block the client from accessing the server.


Author(s):  
Budi Jaya ◽  
Y Yuhandri ◽  
S Sumijan

Denial of Service (DoS) attacks are one of the most common attacks on website, networks, routers and servers, including on router mikrotik. A DoS attack aims to render a network router unable to service requests from authorized users. The result will disrupt the operational activities of the organization and cause material and non-material losses. In this study, a simulation and analysis of DoS attacks using the Live Forensics method were carried out and the router security enhancement from rectangular software and hardware. From the research results obtained digital evidence of DoS attacks in the form of IP addresses and attacker activity logs. In addition, the increase in router security in terms of software by using Firewall Filter and Firewall Raw has proven effective in preventing attacks. While improving router security in terms of hardware by setting a reset button on the router and firewall devices is also very necessary so that the router can avoid physical attacks by irresponsible persons


2021 ◽  
Vol 2021 ◽  
pp. 1-14
Author(s):  
Xinzhi Feng ◽  
Yang Yang ◽  
Xiaozhong Qi ◽  
Chunming Xu ◽  
Ze Ji

In recent years, the research of the network control system under the event triggering mechanism subjected to network attacks has attracted foreign and domestic scholars’ wide attention. Among all kinds of network attacks, denial-of-service (DoS) attack is considered the most likely to impact the performance of NCS significantly. The existing results on event triggering do not assess the occurrence of DoS attacks and controller changes, which will reduce the control performance of the addressed system. Aiming at the network control system attacked by DoS, this paper combines double-ended elastic event trigger control, DoS attack, and quantitative feedback control to study the stability of NCS with quantitative feedback of DoS attack triggered by a double-ended elastic event. Simulation examples show that this method can meet the requirements of control performance and counteract the known periodic DoS attacks, which save limited resources and improve the system’s antijamming ability.


Author(s):  
J R E Wright ◽  
G E Payne

The Mediterranean migrant crisis has resulted in the highest population displacement since the Second World War. In 2016 alone, over one million made the journey across the sea. Since 2013 over 15,000 have died as a result of this journey. Small vessels such as wooden fishing boats and RIBs are commonly used by smugglers as transport. These are often unseaworthy and filled with numbers of passengers far exceeding their intended capacity. When failure occurs, rescues are typically conducted by the nearest available vessel. These vessels are often ill-equipped for a large-scale Search and Rescue (SAR) operation making it highly dangerous for all involved.  The size and quantity of lifeboats available are often insufficient for the large numbers of people to be rescued; as a result, repeat journeys are required, making the rescue process slow, inefficient and hazardous. This paper outlines a novel solution to this problem. A concept design is presented for a rapidly expandable lifeboat capable of holding large numbers of passengers, whilst still fitting into the operational envelope of common davits. The unique inflatable design can be deployed quickly from a range of vessels and aeroplanes offering an immediate platform from which disembarkation onto a suitable vessel can be achieved. CONOPS are outlined along with the required capabilities of the design. Drop stitch technology is identified as a viable means of manufacturing the large inflatable platforms. Finally, the paper discusses an alternative solution, retrofitting existing enclosed lifeboats with the solution to offer a more cost-effective alternative.  


2020 ◽  
Vol 202 ◽  
pp. 15019
Author(s):  
RB Sularto ◽  
Suryono ◽  
Monica Puspa Dewi ◽  
Kagirenza Alexis Fidele

The presence of computer program equipment intended to ensure the security of the operation of a business or company is surely an inevitability. This tool is a form of the presence of adequate supervision in overcoming deviant behavior (crime) in the midst of changes that occur in society. Routine Activitist Theory analysis has reminded that losses that occur in society such as financial chaos in the Indonesian banking sector can be traced through the identification of attacks on Denial of Service. As well as a combination of other factors in the form of identification is carried out on the motivated offender and the appropriate target (suitable target).


Sign in / Sign up

Export Citation Format

Share Document