期刊名称:International Journal of Innovative Research in Computer and Communication Engineering
印刷版ISSN:2320-9798
电子版ISSN:2320-9801
出版年度:2017
卷号:5
期号:2
页码:1594
DOI:10.15680/IJIRCCE.2017.0502067
出版社:S&S Publications
摘要:Cloud Computing allows customers to access cloud resources and services. On-demand, self-serviceand pay-by-use business model are adapted for the cloud resource sharing process. Service level agreements (SLA)regulate the cost for the services that are provided for the customers. Cloud data centers are employed to share datavalues to the users. Denial-of-Service (DoS) attack is an attempt by attacker to prevent legitimate users from usingresources. Distributed Denial of Service (DDoS) Attacks are generated in a “many to one” dimension. In DDoS attackmodel Large number of compromised host are gathered to send useless service requests, packets at the same time .DoSand DDoS attacks initiates the service degradation, availability and cost problems under cloud service providers.Brute-force attacks are raised against through specific periodic, pulsing and low-rate traffic patterns. Rate-controlling,time-window, worst-case threshold and pattern-matching are adapted to discriminate the legitimate and attackeractivities. Stealthy attack patterns are raised against applications running in the cloud. Slowly-Increasing-Polymorphic DDoS Attack Strategy (SIPDAS) can be applied to initiate application vulnerabilities. SIPDAS degradesthe service provided by the target application server running in the cloud. Polymorphic attacks changes the messagesequence at every successive infection to avoid signature detection process. Slowly-increasing polymorphic behaviorinduces enough overloads on the target system. XML-based DoS (XDoS) attacks to the web-based systems are appliedas the testing environment for the attack detection process.