An exponent based error detection mechanism against DXDOS attack for improving the security in cloud

作者: J. Vijayalakshmi , C. R. Rene Robin

DOI: 10.1007/S10586-018-2261-5

关键词:

摘要: Providing security to Cloud against the harmful attacks is an important and essential thing in recent days. Because, there are lot of intend affect performance data transmission Cloud. Specifically, extensible markup language-denial service (XML-DoS) cause severe damage Cloud, which misuses protocols for injecting attack packets disturbing protocol handlers. So, this type must be detected enabling a reliable secure delivery For purpose, traditional works developed various detection mechanisms identifying blocking XML-DoS attacks, but it lacks with limitations increased computation overhead, reduced accuracy, inefficient classification. To solve these issues, paper aims develop new framework based on XML schema. The stages that involved work are, pattern validation, traffic extraction, error classification, IP traceback. At first, individual users transmit routers, then packet marking performed router IP. After that, patterns validated, if valid, distinct counted matching. Consequently, time sequence Tsallis entropy, source Lyapunov exponent estimated. Based estimated value, classified as chaotic or non-chaotic. Finally, bee colony algorithm implemented perform traceback, takes appropriate decision attacker from particular server. In experiments, proposed method evaluated by using measures. Also, superiority system proved comparing existing techniques.

参考文章(24)
Eitan Menahem, Alon Schclar, Lior Rokach, Yuval Elovici, XML-AD: Detecting anomalous patterns in XML documents Information Sciences. ,vol. 326, pp. 71- 88 ,(2016) , 10.1016/J.INS.2015.07.007
Aziz Nasridinov, Young-Sik Jeong, Jeong-Yong Byun, Young-Ho Park, A histogram-based method for efficient detection of rewriting attacks in simple object access protocol messages Security and Communication Networks. ,vol. 9, pp. 492- 499 ,(2016) , 10.1002/SEC.934
Xinlei Ma, Yonghong Chen, DDoS Detection Method Based on Chaos Analysis of Network Traffic Entropy IEEE Communications Letters. ,vol. 18, pp. 114- 117 ,(2014) , 10.1109/LCOMM.2013.112613.132275
Massimo Ficco, Massimiliano Rak, Stealthy Denial of Service Strategy in Cloud Computing ieee international conference on cloud computing technology and science. ,vol. 3, pp. 80- 94 ,(2015) , 10.1109/TCC.2014.2325045
Chirag Modi, Dhiren Patel, Bhavesh Borisaniya, Avi Patel, Muttukrishnan Rajarajan, A survey on security issues and solutions at different layers of Cloud computing The Journal of Supercomputing. ,vol. 63, pp. 561- 592 ,(2013) , 10.1007/S11227-012-0831-5
Chunming Rong, Son T. Nguyen, Martin Gilje Jaatun, Beyond lightning: A survey on security challenges in cloud computing Computers & Electrical Engineering. ,vol. 39, pp. 47- 54 ,(2013) , 10.1016/J.COMPELECENG.2012.04.015
Lifei Wei, Haojin Zhu, Zhenfu Cao, Xiaolei Dong, Weiwei Jia, Yunlu Chen, Athanasios V. Vasilakos, Security and privacy for storage and computation in cloud computing Information Sciences. ,vol. 258, pp. 371- 386 ,(2014) , 10.1016/J.INS.2013.04.028
Te-Shun Chou, SECURITY THREATS ON CLOUD COMPUTING VULNERABILITIES International Journal of Computer Science and Information Technology. ,vol. 5, pp. 79- 88 ,(2013) , 10.5121/IJCSIT.2013.5306
Bishoy Moussa, Mahmoud Mostafa, Mahmoud El-Khouly, XML Schema-Based Minification for Communication of Security Information and Event Management (SIEM) Systems in Cloud Environments International Journal of Advanced Computer Science and Applications. ,vol. 5, ,(2014) , 10.14569/IJACSA.2014.050912
Ashwani Parashar, Ramaswami Radhakrishnan, A Review of Packet Marking IP Traceback Schemes International Journal of Computer Applications. ,vol. 67, pp. 15- 20 ,(2013) , 10.5120/11398-6704