INFORMATION CHANGE THE WORLD

International Journal of Wireless and Microwave Technologies(IJWMT)

ISSN: 2076-1449 (Print), ISSN: 2076-9539 (Online)

Published By: MECS Press

IJWMT Vol.9, No.1, Jan. 2019

Design of Effective Security Architecture for Mobile Cloud Computing to Prevent DDoS Attacks

Full Text (PDF, 866KB), PP.43-51


Views:9   Downloads:2

Author(s)

Kaushik Sekaran, G.Raja Vikram, B.V. Chowdary

Index Terms

Mobile Cloud computing;distributed denial of service (DDOS) attacks;security challenges;searching;cloud based computing;Mobile Agents

Abstract

A DOS (Denial of Service) attack, as its name suggests, denies or blocks access to certain services by flooding either the bandwidth of a specified network or by targeting its connectivity. There are much security challenges in mobile cloud computing. Cloud indicates a period of the computing where the services, which are an application, are made available by the internet. Cloud based computing is very adjustable and cheap as to providing a platform for various IT services. The mobile systems can hinge on the cloud based computing with mobile agents and can undertake various processes such as the searching or storing, etc. While it’s very economic, it has many challenges such as the security. Various researches have been carried out to build a secure mobile cloud based computing. In this paper, we have viewed and analyzed the DDOS (Distributed Denial of Service) attacks in depth to prevent it in the mobile cloud computing.

Cite This Paper

Kaushik Sekaran, G.Raja Vikram, B.V. Chowdary, "Design of Effective Security Architecture for Mobile Cloud Computing to Prevent DDoS Attacks ", International Journal of Wireless and Microwave Technologies(IJWMT), Vol.9, No.1, pp. 43-51, 2019.DOI: 10.5815/ijwmt.2019.01.05

Reference

[1]Hunter, P. (2003). Distributed Denial of Service (DDOS) Mitigation Tools.Network Security, 2003(5), 12-14.

[2]Beitollahi, H., & Deconinck, G. (2012). Analyzing well-known countermeasures against distributed denial of service attacks. Computer Communications, 35(11), 1312-1332.

[3]Lee, K., Kim, J., Kwon, K. H., Han, Y., & Kim, S. (2008). DDoS attack detection method using cluster analysis. Expert Systems with Applications,34(3), 1659-1665.

[4]Agarwal, S., Dawson, T., Tryfonas, C. (2003). DDoS mitigation via regional cleaning centers. Sprint ATL Research Report RR04-ATL-013177.

[5]Yaar, A., Perrig, A., & Song, D. (2004, May). SIFF: A stateless Internet flow filter to mitigate DDoS flooding attacks. In Security and Privacy, 2004.Proceedings. 2004 IEEE Symposium on (pp. 130-143). IEEE.

[6]Y. Chen, K. Hwang, W.-S. Ku, Collaborative detection of DDoS attacks over multiple network domains, IEEE Transactions on Parallel and Distributed Systems 18 (12) (2007) 1649–1662.

[7]L. Feinstein, D. Schnackenberg, R. Balupari, D. Kindred, Statistical approaches to DDoS attack detection and response, in: Proceedings of DARPA Information Survivability Conference and Exposition, Washington, DC, USA, 2003, pp. 303–314. 

[8]A.L. Toledo, X. Wang, Robust detection of MAC layer denial-of-service attacks in CSMA/CA wireless networks, IEEE Transactions on Information Forensics and Security 3 (3) (2008) 347–358.

[9]P. Ferguson, D. Senie, Network ingress filtering: defending denial of service attacks which employ IP source address spoofing, internet RFCs RFC 2827, 2000, pp. 1–10. 

[10]K. Park, H. Lee, On the effectiveness of route-based packet filtering for distributed DoS attack prevention in power-law internets, in: Proceedings of ACM SIGCOMM, San Diego, California, USA., 2001, pp. 15–26. 

[11]Soeung-Kon(Victor) Ko, Jung-Hoon Lee, Sung Woo Kim,Mobile cloud computing security considerations, January 2012.

[12]Sekaran Kaushik and P. Venkata Krishna. "Big Cloud: a hybrid cloud model for secure data storage through cloud space." International Journal of Advanced Intelligence Paradigms 8, no. 2 (2016), pp. 229-241.

[13]Sekaran, K., & Krishna, P. V. (2017). Cross region load balancing of tasks using region-based rerouting of loads in cloud computing environment. International Journal of Advanced Intelligence Paradigms, 9(5-6), pp. 589-603.

[14]Sung, M., Xu, J. (2003). IP traceback-based intelligent packet filtering: a novel technique for defending against Internet DDoS attacks. IEEE Transactions on Parallel and Distributed Systems, 14(9), pp. 861-872.