DocumentCode :
3574395
Title :
Defense against DoS attack: PSO approach in virtualization
Author :
Mercyshalinie, S. ; Madhupriya, G. ; Vairamani, S. ; Velayutham, S.
Author_Institution :
Comput. Sci. & Eng. Dept., Thiagarajar Coll. of Eng., Madurai, India
fYear :
2014
Firstpage :
199
Lastpage :
204
Abstract :
Cloud Computing is a catchword in today´s IT industry that nobody can escape. The technology offers reduced IT costs and provides on demand services to individual users as well as organizations over the internet. Cloud computing delivery its services through three different service models like Infrastructure as a Service (IaaS), Platform as a Service (PaaS), and Software as a Service (SaaS). One of the important service is IaaS. IaaS provides infrastructure including software, hardware, storage space, network bandwidth to users on demand over the internet. Cloud computing relies upon virtualization to provide services. Physical characteristics of resources are hide from end users by virtualization. Cloud environment faces threats from confidentiality, integrity, and availability (CIA). But availability considered as one of the most important threat in cloud environment. The vulnerability of Denial of Service (DoS) attack can affect the availability of cloud. One form of the DoS attack is Transmission Control Protocol (TCP)-SYN flood attack. TCP SYN flood attack is an attempt to make a machine or networked resource unavailable to its intended users. The actual users of cloud can´t use the resources. It is necessary to identify the exact position when TCP-SYN flood starts. Therefore the proposed framework uses the Particle Swarm Optimization (PSO) algorithm to identify the optimized position of SYN flood attack in the traffic flow.
Keywords :
cloud computing; computer network security; data integrity; particle swarm optimisation; telecommunication traffic; transport protocols; virtualisation; CIA; DoS attack; IT cost reduction; IT industry; IaaS; PSO approach; PaaS; SaaS; TCP SYN flood attack; cloud availability; cloud computing; cloud computing delivery; confidentiality-integrity-and-availability; denial of service attack; hardware infrastructure; infrastructure-as-a-service; network bandwidth; particle swarm optimization algorithm; physical characteristics; platform-as-a-service; service models; software infrastructure; software-as-a-service; storage space; traffic flow; transmission control protocol-SYN flood attack; virtualization; Adaptation models; Computer crime; Industries; Servers; Software; Virtual machining; Virtualization; Cloud computing; Denial of Service Attack; Particle Swarm Optimization; TCP-SYN Flood Attack; Virtualization;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Advanced Computing (ICoAC), 2014 Sixth International Conference on
Print_ISBN :
978-1-4799-8466-4
Type :
conf
DOI :
10.1109/ICoAC.2014.7229709
Filename :
7229709
Link To Document :
بازگشت