Analysis and Detecting TCP SYN flood attacks based on kernel-events in Cloud Computing

Publish Year: 1395
نوع سند: مقاله کنفرانسی
زبان: English
View: 1,015

This Paper With 8 Page And PDF and WORD Format Ready To Download

  • Certificate
  • من نویسنده این مقاله هستم

استخراج به نرم افزارهای پژوهشی:

لینک ثابت به این Paper:

شناسه ملی سند علمی:

CITCOMP01_051

تاریخ نمایه سازی: 16 شهریور 1395

Abstract:

Security is one of the most important challenges in cloud computing as there are a lot of threats and attacks which put the security of a cloud in risk. One of the most common attacks to cloud computing is DDoS (Distributed Denial of service) attack. The absolute prevention of the occurrence of DDoS attacks is not possible; therefore, detecting these attacks is an important step in securing a cloud against this kind of very common security threat. The attacker in DDoS attack tries to flood a target machine with sending packets similar to normal and factual traffic sent by another virtual machine. Therefore the detection systems cannot successfully detect DDoS attacks. On the other hand, distributed nature of these attacks makes them more difficult to be detected. In this paper we propose a model to detect Transmission Control Protocol Synchronize (TCP SYN) flood attack as a very popular type of DDoS attacks.

Authors

Hossein Abbasi

Computer Engineering Department, École Polytechnique de Montréal. Montreal, Canada

Chamseddine Talhi

Department of Software Engineering and Information Technologies École de technologie supérieure , ETS, Montreal, Canada

مراجع و منابع این Paper:

لیست زیر مراجع و منابع استفاده شده در این Paper را نمایش می دهد. این مراجع به صورت کاملا ماشینی و بر اساس هوش مصنوعی استخراج شده اند و لذا ممکن است دارای اشکالاتی باشند که به مرور زمان دقت استخراج این محتوا افزایش می یابد. مراجعی که مقالات مربوط به آنها در سیویلیکا نمایه شده و پیدا شده اند، به خود Paper لینک شده اند :
  • S. Noh, C. Lee, K. Choi, and G. Jung, "Detecting ...
  • A. G. Tartakovsky, B. L. Rozovskii, R. B. Blazek, and ...
  • R. Kaizaki, Nakamura, O., "Detection of Denial of Service attacks ...
  • A. Anand, M. Dhingra, J. Lakshmi, and S. K. Nandy, ...
  • L. Ang, G. Lin, and X. Kuai, "Fast Anomaly Detection ...
  • A. Chonka, Z. Wanlei, and X. Yang, "Defending Grid Web ...
  • A. Chonka, Z. Wanlei, and X. Yang, "Protecting web services ...
  • W. Jin, Y. Xiaolong, and L. Keping, "A new relative ...
  • A. Chonka, Xiang, Y., Zhou, W., Bonti, A., "Cloud security ...
  • Y. Lanjuan, Z. Tao, S. Jinyu, W. JinShuang, and C. ...
  • O. A. Darwish.M, Fernando Capretz.L, , "Cloud-based DDoS Attacks and ...
  • R.Udendhran, "New Framework to Detect and Prevent Denial of Service ...
  • B. H. Hase.V, "An Efficient Way to Prevent Dos/DDos Attack ...
  • R. Shea and L. Jiangchuan, "Understanding the impact of Denial ...
  • M. S. Bogdanoski, T. Risteski, A., "Analysis of the SYN ...
  • M. Desnoyers, Dagenais, M., "LTTng: Tracing across execution layers, from ...
  • نمایش کامل مراجع