An Intelligent Fast-Flux Swarm Network for Minimizing DDoS attacks in Cloud Computing

نویسنده

  • R. Kesavamoorthy
چکیده

One of the great threat to service availability in cloud computing is Distributed Denial of Service. Here a novel approach has been proposed to minimize DDoS attacks. This has been planned to achieve by an intelligent fastflux swarm network. An intelligent swarm network is required to ensure autonomous coordination and allocation of swarm nodes to perform its relaying operations. Intelligent Water Drop algorithm has been adapted for distributed and parallel optimization. The fast-flux technique was used to maintain connectivity between swarm nodes, clients, and servers. We have planned to simulate this as software consisting of various client nodes and swarm nodes. Distributed denial of service (DDoS) causes performance of a website or cloud service to be severely degraded. Using DDoS attacks, attackers can control the freedom of information by making certain information available at certain times to determine what information is and is not relayed to public. According to a recent survey, DDoS attacks are viewed as the number one security threat. Combating DDoS also requires the most resources. The proliferation of DDoS applications such as Low Orbit Ion Cannon (LOIC) [1] by 4Chan-affiliated hackers allows anyone to coordinate and launch DDoS attacks on any target. Recently pro-Wikileaks activists used LOIC to great effect. Our article proposes using a swarm network to extend the serviceability of cloud services under DDoS attacks. In the event of an incoming DDoS attack on a cloud service, the network will re-organize itself to provide the highest available service level for the clients and servers under adverse network conditions. Many solutions have been proposed [2–9]; however, they have met with limited success. We make use of a swarm network to coordinate and relay messages between clients and servers. This swarm system has the ability to selforganize and conduct large-scale parallel search for optimal relay solutions. We have also explored how swarm intelligence can be incorporated into the existing Internet infrastructure. Using established communication protocols, we have reduced the need for modifications of existing networks for easy adoption. This approach presents the first attempt at creating non-stationary swarm transport for cloud services.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

RESCUE: Reputation based Service for Cloud User Environment

Exceptional characteristics of Cloud computing has replaced all traditional computing. With reduced resource management and without in-advance investment, it has been victorious in making the IT world to migrate towards it. Microsoft announced its office package as Cloud, which can prevent people moving from Windows to Linux. As this drift is escalating in an exponential rate, the cloud environ...

متن کامل

Neural Network Based Protection of Software Defined Network Controller against Distributed Denial of Service Attacks

Software Defined Network (SDN) is a new architecture for network management and its main concept is centralizing network management in the network control level that has an overview of the network and determines the forwarding rules for switches and routers (the data level). Although this centralized control is the main advantage of SDN, it is also a single point of failure. If this main contro...

متن کامل

F-STONE: A Fast Real-Time DDOS Attack Detection Method Using an Improved Historical Memory Management

Distributed Denial of Service (DDoS) is a common attack in recent years that can deplete the bandwidth of victim nodes by flooding packets. Based on the type and quantity of traffic used for the attack and the exploited vulnerability of the target, DDoS attacks are grouped into three categories as Volumetric attacks, Protocol attacks and Application attacks. The volumetric attack, which the pro...

متن کامل

Assessment Methodology for Anomaly-Based Intrusion Detection in Cloud Computing

Cloud computing has become an attractive target for attackers as the mainstream technologies in the cloud, such as the virtualization and multitenancy, permit multiple users to utilize the same physical resource, thereby posing the so-called problem of internal facing security. Moreover, the traditional network-based intrusion detection systems (IDSs) are ineffective to be deployed in the cloud...

متن کامل

DoS-Resistant Attribute-Based Encryption in Mobile Cloud Computing with Revocation

Security and privacy are very important challenges for outsourced private data over cloud storages. By taking Attribute-Based Encryption (ABE) for Access Control (AC) purpose we use fine-grained AC over cloud storage. In this paper, we extend previous Ciphertext Policy ABE (CP-ABE) schemes especially for mobile and resource-constrained devices in a cloud computing environment in two aspects, a ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2015