Controlling various network based ADoS Attacks in cloud computing environment : By Using Port Hopping Technique

  ijett-book-cover  International Journal of Engineering Trends and Technology (IJETT)          
  
© 2013 by IJETT Journal
Volume-4 Issue-5                      
Year of Publication : 2013
Authors : T.Siva , E.S.Phalguna Krishna

MLA 

T.Siva , E.S.Phalguna Krishna. "Controlling various network based ADoS Attacks in cloud computing environment : By Using Port Hopping Technique". International Journal of Engineering Trends and Technology (IJETT). V4(5):2099-2104 May 2013. ISSN:2231-5381. www.ijettjournal.org. published by seventh sense research group.

Abstract

Cloud computing security is sub - domain of computer securi ty, network security, and information security. It refers to a broad set of security policies, technologies, and flow controls deployed to protect data, applications, and the associated infrastructure resources of cloud computing. There are a number of sec urity issues/concerns associated with cloud computing .We provide security to cloud resources by Denial of Service (DoS) attacks a nd their related sub - domains. Application Denial of service (ADoS) attacks comes under DDOS attacks these are concentrate on S aaS in cloud computing. In this we present different types of cloud based DDOS Attacks and their solutions, also give most dangerous Application Do S attacks scenario and their remedy mechanisms, Introduce new port hopping i.e True Random Number Generation( TRNG) Based Port Hopping in cloud computing request/response environment. In previous port hopping by using Pseudo Random number Generation (PRNG) over comes the disadvantage of predict ion of the port hopping sequence and is periodic in nature . Finally ov ercome /prevent the ADOS attack by using TRNG .

References

[1] Zhang Fu, Marina Papatriantafilou, and Philippas Tsigas “ Mitigating Distribute d Denial of Service Attacks in Multiparty Applicationsin the Presence of Clock Drifts ” Ieee Transactions On Dependable And Secure Computing, Vol.9, No.3, May/June 2012 .
[2] https://cloudsecurityalliance.org/research/ctp/
[3] SETECS®, Inc. “ Security Architecture fo r Cloud Computing Environments” White Paper – February 1, 2011 .
[4] Anand Mukundan Bina Bhaskar “Security in Cloud Computing - Vulnerabilities, Challenges, Models and path ahead”
[5] IBM Research – Zurich Christian Cachin “ Protocols for Secure Cloud Computing ” Apr il 2011 .
[6] Stephen de Vries “A Corsaire White Paper:Application Denial of Service (DoS) Attacks”1 April 2004.
[7] G. Badishi, A. Herzberg, and I. Keidar, “ Keeping Denial - of - Service Attackers in the Dark ,” IEEE Trans. Dependable and Secure Computing, vol. 4, no. 3, pp. 191 - 204, July - Sept. 2007.
[8] H. Lee and V. Thing, “ Port Hopping for Resilient Networks ,” Proc. IEEE 60th Vehicular Technology Conf. (VTC2004 - Fall), vol. 5,pp. 3291 - 3295, 2004.
[9] Wang Xingyuan, Qin Xue, and Teng Lin “ A Novel True Random Number Generator B ased on Mouse Movement and a One - Dimensional Chaotic Map ” 26 October 2011 .

Keywords
Cloud computing, Denial of Service (DoS) attacks, Application DoS attacks, Port Hopping, Pseudo Random number Generation (PRNG), True Random Number Generation (TRNG).