Proceedings ArticleDOI
TCP/IP header classification for detecting spoofed DDoS attack in Cloud environment
Opeyemi Osanaiye,Mqhele E. Dlodlo +1 more
- pp 1-6
TLDR
The goal of this paper is to analyse and compare the TCP/IP packet header features of incoming traffic that identifies remote hosts according to their Operating System to detect the true source of a packet during spoofed DDoS attack.Abstract:
Spoofing of IP is a key attribute of Distributed Denial of Service (DDoS) attack that consumes Cloud resources and network bandwidth within a short period of time. This is costly to both the providers and users of Cloud. Cloud computing offers a metered service, which uses pay-per use. Therefore providing a high available Cloud will improve the Cloud provider's reputation and financial proceeds. To the Cloud users, it solely depends on the provider for its resources therefore it must always be available as contained in the service level agreement (SLA). The goal of this paper is to analyse and compare the TCP/IP packet header features of incoming traffic that identifies remote hosts according to their Operating System. This is used to detect the true source of a packet during spoofed DDoS attack. Our solution further analyses the observed final TTL value in both active and passive stage of the OS fingerprints to cater for false negative during detection. We demonstrated our proposed solution on a Xen Cloud Platform Test bed.read more
Citations
More filters
Journal ArticleDOI
From Cloud to Fog Computing: A Review and a Conceptual Live VM Migration Framework
TL;DR: A conceptual smart pre-copy live migration approach is presented for VM migration that can estimate the downtime after each iteration to determine whether to proceed to the stop-and-copy stage during a system failure or an attack on a fog computing node.
Journal ArticleDOI
Ensemble-based multi-filter feature selection method for DDoS detection in cloud computing
Opeyemi Osanaiye,Opeyemi Osanaiye,Haibin Cai,Kim-Kwang Raymond Choo,Ali Dehghantanha,Zheng Xu,Zheng Xu,Mqhele E. Dlodlo +7 more
TL;DR: An ensemble-based multi-filter feature selection method that combines the output of four filter methods to achieve an optimum selection that can effectively reduce the number of features and has a high detection rate and classification accuracy when compared to other classification techniques.
Journal ArticleDOI
Distributed denial of service (DDoS) resilience in cloud
TL;DR: This paper reviews 96 publications on DDoS attack and defense approaches in cloud computing published between January 2009 and December 2015, and discusses existing research trends.
Journal ArticleDOI
Ensemble-based Multi-Filter Feature Selection Method for DDoS Detection in Cloud Computing
TL;DR: In this article, an ensemble-based multi-filter feature selection method was proposed to reduce the number of features from 41 to 13 and has a high detection rate and classification accuracy when compared to other classification techniques.
Journal ArticleDOI
Denial of Service Defence for Resource Availability in Wireless Sensor Networks
TL;DR: A review of denial of service attacks that affect resource availability in WSN and their countermeasure is presented by presenting a taxonomy and future research directions and open research issues are discussed.
References
More filters
Journal ArticleDOI
Addressing cloud computing security issues
TL;DR: This paper proposes introducing a Trusted Third Party, tasked with assuring specific security characteristics within a cloud environment, and presents a horizontal level of service, available to all implicated entities, that realizes a security mesh, within which essential trust is maintained.
Proceedings ArticleDOI
Detecting SYN flooding attacks
TL;DR: A simple and robust mechanism that not only sets alarms upon detection of ongoing SYN flooding attacks, but also reveals the location of the flooding sources without resorting to expensive IP traceback.
Proceedings ArticleDOI
Hop-count filtering: an effective defense against spoofed DDoS traffic
TL;DR: Hop-Count Filtering (HCF) can identify close to 90% of spoofed IP packets, and then discard them with little collateral damage, and is implemented and evaluated in the Linux kernel, demonstrating its benefits using experimental measurements.
Proceedings ArticleDOI
Service-Oriented Cloud Computing Architecture
TL;DR: An overview survey of current cloud computing architectures is given, issues that current cloud Computing implementations have are discussed and a Service-Oriented Cloud Computing Architecture (SOCCA) is proposed so that clouds can interoperate with each other.
Journal ArticleDOI
A survey on gaps, threat remediation challenges and some thoughts for proactive attack detection in cloud computing
TL;DR: An extensive review on cloud computing with the main focus on gaps and security concerns is presented, which identifies the top security threats and their existing solutions and investigates the challenges/obstacles in implementing threat remediation.