scispace - formally typeset
Proceedings ArticleDOI

TCP/IP header classification for detecting spoofed DDoS attack in Cloud environment

TLDR
The goal of this paper is to analyse and compare the TCP/IP packet header features of incoming traffic that identifies remote hosts according to their Operating System to detect the true source of a packet during spoofed DDoS attack.
Abstract
Spoofing of IP is a key attribute of Distributed Denial of Service (DDoS) attack that consumes Cloud resources and network bandwidth within a short period of time. This is costly to both the providers and users of Cloud. Cloud computing offers a metered service, which uses pay-per use. Therefore providing a high available Cloud will improve the Cloud provider's reputation and financial proceeds. To the Cloud users, it solely depends on the provider for its resources therefore it must always be available as contained in the service level agreement (SLA). The goal of this paper is to analyse and compare the TCP/IP packet header features of incoming traffic that identifies remote hosts according to their Operating System. This is used to detect the true source of a packet during spoofed DDoS attack. Our solution further analyses the observed final TTL value in both active and passive stage of the OS fingerprints to cater for false negative during detection. We demonstrated our proposed solution on a Xen Cloud Platform Test bed.

read more

Citations
More filters
Journal ArticleDOI

From Cloud to Fog Computing: A Review and a Conceptual Live VM Migration Framework

TL;DR: A conceptual smart pre-copy live migration approach is presented for VM migration that can estimate the downtime after each iteration to determine whether to proceed to the stop-and-copy stage during a system failure or an attack on a fog computing node.
Journal ArticleDOI

Ensemble-based multi-filter feature selection method for DDoS detection in cloud computing

TL;DR: An ensemble-based multi-filter feature selection method that combines the output of four filter methods to achieve an optimum selection that can effectively reduce the number of features and has a high detection rate and classification accuracy when compared to other classification techniques.
Journal ArticleDOI

Distributed denial of service (DDoS) resilience in cloud

TL;DR: This paper reviews 96 publications on DDoS attack and defense approaches in cloud computing published between January 2009 and December 2015, and discusses existing research trends.
Journal ArticleDOI

Ensemble-based Multi-Filter Feature Selection Method for DDoS Detection in Cloud Computing

TL;DR: In this article, an ensemble-based multi-filter feature selection method was proposed to reduce the number of features from 41 to 13 and has a high detection rate and classification accuracy when compared to other classification techniques.
Journal ArticleDOI

Denial of Service Defence for Resource Availability in Wireless Sensor Networks

TL;DR: A review of denial of service attacks that affect resource availability in WSN and their countermeasure is presented by presenting a taxonomy and future research directions and open research issues are discussed.
References
More filters
Journal ArticleDOI

Addressing cloud computing security issues

TL;DR: This paper proposes introducing a Trusted Third Party, tasked with assuring specific security characteristics within a cloud environment, and presents a horizontal level of service, available to all implicated entities, that realizes a security mesh, within which essential trust is maintained.
Proceedings ArticleDOI

Detecting SYN flooding attacks

TL;DR: A simple and robust mechanism that not only sets alarms upon detection of ongoing SYN flooding attacks, but also reveals the location of the flooding sources without resorting to expensive IP traceback.
Proceedings ArticleDOI

Hop-count filtering: an effective defense against spoofed DDoS traffic

TL;DR: Hop-Count Filtering (HCF) can identify close to 90% of spoofed IP packets, and then discard them with little collateral damage, and is implemented and evaluated in the Linux kernel, demonstrating its benefits using experimental measurements.
Proceedings ArticleDOI

Service-Oriented Cloud Computing Architecture

TL;DR: An overview survey of current cloud computing architectures is given, issues that current cloud Computing implementations have are discussed and a Service-Oriented Cloud Computing Architecture (SOCCA) is proposed so that clouds can interoperate with each other.
Journal ArticleDOI

A survey on gaps, threat remediation challenges and some thoughts for proactive attack detection in cloud computing

TL;DR: An extensive review on cloud computing with the main focus on gaps and security concerns is presented, which identifies the top security threats and their existing solutions and investigates the challenges/obstacles in implementing threat remediation.
Related Papers (5)
Trending Questions (1)
Why cant external ip in vm google cloud cant be accessed?

The paper does not provide information about the specific issue of external IP in VMs on Google Cloud not being accessible.