Defensive Cloud Service Providers Against Stealthy Denial of Service Strategy
Main Article Content
Abstract
Cloud Computing allows customers to access cloud resources and services. On-demand, self-service and pay-by-use business model are adapted for the cloud resource sharing process. Service level agreements (SLA) regulate the cost for the services that are provided for the customers. Cloud data centers are employed to share data values to the users. Denial-of-Service (DoS) attack is an attempt by attacker to prevent legitimate users from using resources. Distributed Denial of Service (DDoS) Attacks is generated in a “many to one” dimension. In DDoS attack model large number of compromised host are gathered to send useless service requests, packets at the same time .DoS and DDoS attacks initiates the service degradation, availability and cost problems under cloud service providers. Brute-force attacks are raised against through specific periodic, pulsing and low-rate traffic patterns. Ratecontrolling, time-window, worst-case threshold and pattern-matching are adapted to discriminate the legitimate and attacker activities. Stealthy attack patterns are raised against applications running in the cloud. Slowly-IncreasingPolymorphic DDoS Attack Strategy (SIPDAS) can be applied to initiate application vulnerabilities. SIPDAS degrades the service provided by the target application server running in the cloud. Polymorphic attacks changes the message sequence at every successive infection to avoid signature detection process. Slowly-increasing polymorphic behavior induces enough overloads on the target system. XML-based DoS (XDoS) attacks to the web-based systems are applied as the testing environment for the attack detection process we describe both how to apply the proposed strategy, and its effects on the target system deployed in the cloud.
Article Details

This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.
IJCERT Policy:
The published work presented in this paper is licensed under the Creative Commons Attribution 4.0 International (CC BY 4.0) license. This means that the content of this paper can be shared, copied, and redistributed in any medium or format, as long as the original author is properly attributed. Additionally, any derivative works based on this paper must also be licensed under the same terms. This licensing agreement allows for broad dissemination and use of the work while maintaining the author's rights and recognition.
By submitting this paper to IJCERT, the author(s) agree to these licensing terms and confirm that the work is original and does not infringe on any third-party copyright or intellectual property rights.
References
M. C. Mont, K. McCorry, N. Papanikolaou, and S. Pearson, ‚Security and privacy governance in cloud computing via SLAS and a policy orchestration service,‛ in Proc. 2nd Int. Conf. Cloud Comput. Serv. Sci., 2012, pp. 670–674.
S. Malek and S. Salvatore, ‚Detecting masqueraders: A comparison of one-class bagofwords user behavior modeling techniques,‛ in Proc. 2nd Int. Workshop Managing Insider Security Threats, Morioka, Iwate, Japan. Jun. 2010, pp. 3–13.
A. S. Sodiya, O. Folorunso, S. A. Onashoga, and P. O. Ogundeyi, ‚An improved semi-global alignment algorithm for masquerade detection,‛ Int. J. Netw. Security, vo1. 12, no. 3, pp. 211– 220, May 2011.
Yongdong Wu, Zhigang Zhao, Feng Bao and Robert H. Deng, ‚Software Puzzle: A Countermeasure to Resource-Inflated Denial-ofService Attacks‛, IEEE Transactions On Information Forensics And Security, Vol. 10, No. 1, January 2015
Hisham A. Kholidy, Fabrizio Baiardi and Salim Hariri, ‚DDSGA: A Data-Driven SemiGlobal Alignment Approach for Detecting Masquerade Attacks‛, IEEE Transactions On Dependable And Secure Computing, Vol. 12, No. 2, March/April 2015
Subrat Kumar Dash, K. S. Reddy, and K. A. Pujari, ‚Adaptive Naive Bayes method for masquerade detection‛, Security Commun. Netw., vol. 4, no. 4, pp. 410–417, 2011.
Guojun Wang, Felix Musau, Song Guo and Muhammad Bashir Abdullahi, ‚Neighbor Similarity Trust against Sybil Attack in P2P ECommerce‛, IEEE Transactions On Parallel And Distributed Systems, Vol. 26, No. 3, March 2015
X. Xu, X. Guo, and S. Zhu, ‚A queuing analysis for low-rate DoS attacks against application servers,‛ in Proc. IEEE Int. Conf. Wireless Commun., Netw. Inf. Security, 2010, pp. 500–504.
L. Wang, Z. Li, Y. Chen, Z. Fu, and X. Li, ‚Thwarting zero-day polymorphic worms with network-level length-based signature generation,‛ IEEE/ACM Trans. Netw., vol. 18, no. 1, pp. 53–66, Feb. 2010.
A. Chonka, Y. Xiang, W. Zhou, and A. Bonti, ‚Cloud security defense to protect cloud computing against HTTP-DOS and XMLDoS attacks,‛ J. Netw. Comput. Appl., vol. 34, no. 4, pp. 1097–1107, Jul. 2011.
D. Petcu, C. Craciun, M. Neagul, S. Panica, B. Di Martino, S. Venticinque, M. Rak, and R. Aversa, ‚Architecturing a sky computing platform,‛ in Proc. Int. Conf. Towards Serv.- Based Int., 2011, vol. 6569, pp. 1-13.