Anda di halaman 1dari 5

International Conference on Computing and Intelligence Systems

Pages: 1320 1324

Volume: 04, Special Issue: March 2015


ISSN: 2278-2397

Design of Distributed Cloud Server for


Preventing DDOS Attacks
V.Naveenraj1, G.Sekar2
1

M.Phil. Research Scholar, PG & Research Department of Computer Science, Dr. Ambedkar Govt. Arts
College, Vyasarpadi, Chennai, India
2
Assistant Professor, PG & Research Department of Computer Science, Dr. Ambedkar Govt. Arts College,
Vyasarpadi, Chennai, India
Email: Naveen.nice.1990@gmail.com gsekarg@yahoo.co.in
AbstractCloud encompasses diverse models and
technologies. Many of the applications interface with the
user via the Web. All the normal security vulnerabilities
are just as relevant to applications running on the cloud
as they are to applications running on conventional
hosting. Another type of security issues related with
Physical security where data center to be physically
secure against unauthorized access or potential natural
disasters.In this paper we discuss about security issues
on the cloud especially the DDOS attacks. The
distributed environment is prone to more attacks. The
DDOS attacks are done by the hacker with help of
command prompt or DOS or Linux terminals. The
maximum number of attacks in the distributed
environment in DDOS attacks.
Keywords DDOS Attacks, Security Issues, cloud
computing

I.

INTRODUCTION

Cloud computing is a model for enabling


convenient, on-demand network access to a shared
pool of configurable computing resources (e.g.,
networks, servers, storage, applications, and services)
that can be rapidly provisioned and released with
minimal management effort or service provider
interaction. Cloud computing is defined as shared the
computing resources without a local server in a
personal computer to work an application. Cloud
computing is a type of internet based computing.
Where the services are storage, servers, application,
etc,. The service delivered based onto the
organizations computer and peripherals through the
internet
Main goal of the cloud concerns high performed
computing and consumer oriented application
provided like spread sheet, presentation, etc. to
provide personalized information and data storage.
Standards of cloud told that the cloud is connecting
computers and needs based on that the cloud going to
be made. Many business peoples they are using cloud
because of cheaper on buying an original application.
Comparatively it leads qualities of fast and easier
maintenance. Other than people they use cloud service
like Google docs, mails, drive and more to access they
need upon. In any place they handle the files and
create. In many people had uses on cloud service. And
more number of cloud provider give free software,

International Journal of Computing Algorithm (IJCOA)

storage, infrastructure, etc,. We can able access our


file throughout world in via internet. There are three
types of cloud available as shown in the Fig 1.
Public cloud: Public cloud provides the services are
data storage, servers, and application. The public
cloud can free for companies to use an application,
storage, and infrastructure. These clouds are more
scalable, accessible, public cloud may be pay-as-youfees or fixed month fees for service utilize.
Private cloud: Private cloud is distinct and secure
environment for specific client to operate the cloud.
The cloud operates by the single organization and
greater control over them. It has individual Local
access networks. Benefits of private clouds are higher
security, performance, More Control, cost efficiency,
improved reliability, and energy efficiency.
Hybrid cloud: cloud services utilize both public and
private cloud to perform functions within the
individual organization. Some of that payable and
some of that free for cloud services. Organization
services maintain by the organization other than that
maintain by the cloud service provider.In that case
they provide among the services are called as as-aservice. For example: platform-as-a -service,
Infrastructure-as-a-service, storage-as-a-service, etc.

Fig 1. Types of Cloud

II.

CLOUD SECURITY CHALLENGES

The security risks for cloud computing


providerswill be equivalent to the traditional
application likeproviding strongsecurity fenceby
expelling the bad factors out [10]. To extract the
functionalities of virtualization and virtual machines

1320

International Conference on Computing and Intelligence Systems


Pages: 1320 1324
from multiple organizations, the cloud service
providers have to be co-located on the same physical
resources. The following parametershave to be kindly
considered by the providers while deploying the cloud
environment [12].
A. ADMINISTRATIVE ACCESS TO SERVERS AND
APPLICATIONS
One of the most important properties of cloud
computing is the self accessing of cloud documents
via internet. In a traditional company server, each user
can be authorized internally but in cloud, since the
access is open to lot of people, employment of
administrative access to the servers data is somewhat
hard to implement.
B. DYNAMIC VIRTUAL MACHINES
A Virtual Machine (VM) can be easily roll backed
to the previous state, restarted, stopped since they are
dynamic in nature. VMs can also be cloned and
moved between physical servers. But this dynamic
nature of virtual machine becomes a bottleneck for
security.Sometimes the errors may be propagated to
the entire network so that other may know the current
configuration which should kept confidential. It is also
hard to maintain a log about the status of virtual
machine.
C. VULNERABILITY EXPLOITS AND VM-TO-VM
ATTACKS
Like localized virtual machines and servers, Cloud
servers make use of same operating systems and web
applications.So an important threat to cloud
environment is the ability for an attacker to exploit
vulnerabilities inthese systems and applications. The
co-located virtual machines will increase the scope of
attack. So there becomes a need for the transparent
prevention systems tofind out malicious activity at the
virtual-machine level irrespective of its location [10].
D. SECURING DORMANT VIRTUAL MACHINES
Even though the status of a virtual machine is
offline, it is still available to the applications unlike a
physical machine, so that its storage is accessed by the
third party.In addition to that an inactive virtual
machine is unable to run anti-attack scan software. So
the cloud service provider must ensure a security
mechanism to establish a dormant virtual machine to
be 100% dormant i.e. not responding to any request.
E. PERFORMANCE IMPACT OF TRADITIONAL
SECURITY
The security solutions in practice were formulated
prior to the concept of x86 virtualization and so they
cannot be applicable to current cloud virtualization.
Since virtual machines share resources among a large
set of users, the scan of the system before sharing
surely takes more time and thus decreases the system
performance. Cloud service providers have to address
this performance degradation problem by providing

International Journal of Computing Algorithm (IJCOA)

Volume: 04, Special Issue: March 2015


ISSN: 2278-2397

fastest scans at the hypervisor level and eliminating at


the host level.
F. DATA INTEGRITY: CO-LOCATION,
COMPROMISE AND THEFT
According to the Data Breach Report given by
Verizon Business Risk Team in 2009, 64% of data are
lostby hackingand intrusions.The areas of attack in
cloudenvironments would be more and hence
increases the rate of risks also.The companies expect
that cloud service providers have to give the assurance
that an auditable proof should be given to them so that
the cloud resources will not be tampered from shared
physical infrastructure [13]. It requires regular
monitoring of operating system and application
filesand activities.
G. PATCH MANAGEMENT
Once a company has enrolled themselves in cloud
environment, from that time the patch management
for the hosted web server will be in the hands of the
provider and not in the hands of the company. This
self-service cloud server patch management will also
be a hurdle for security data.The previously mentioned
Data Breach Report of 2009 also state that companies
using cloud computing will have to vigilantly watch
the cloud resources status for patches.
H. POLICY AND COMPLIANCE
Enterprises are in the situations to prove
themselves for compliance with security standards like
PCI, HIPAA, GLBA, SAS70 and ISOabout the
location of systems, virtualization mechanisms, oncampus or off-campus virtual machines etc.
I. PERIMETER PROTECTION AND ZONING
The enterprise perimeter also has an impact over
the security of cloud data. So the foundation for
establishing security of networks, the firewall,can be
formulated in such a way that the third party could not
reach cloud servers or its policies. As a result,the
virtual machines should be designed as self-defending
machines.
III.

SECURITY ISSUES

Most of the security issues are fallen in the public


cloud as the environment is shared by different types
of users and organizations. Security issues on the
cloud are tractable because the concerns that arise a
stem from the lack of making, lack of information[14].
The attackers they had advantage from that.
Common types of attacks
1.
2.
3.
4.
A.

DDOS Attacks
Malware-Injection Attacks
Side Channel Attacks
Authentication Attacks
DDOS ATTACKS:

This type of attack is targeting connected or


tangible system. The attackers receive configuration

1321

International Conference on Computing and Intelligence Systems


Pages: 1320 1324
information. They try to get accessing the server and
handle the resources and trigger information [19]. The
flood of incoming message forces the system to
shutdown [1].
B. MALWARE-INJECTION ATTACKS:
The kind of attack is injecting the malware into the
server. Ultimate target is injecting the malicious code
into the web application. Malware reduces the speed,
performance, storage. It leads to hang the server[3,5].
C. SIDE CHANNEL ATTACKS :
The attackers encrypt the retrieval information and
get the personal information at the time of send and
receiving in the server. That may be
encryptingcipertext to plain text. Time is important
factor in this attack. Send or receive at time of data at
only possible [3][11].
D. AUTHENTICATION ATTACKS:
Its one of the frequently doing attacks. This may
happen on security faults under the authentication
system. There are so many ways to attack the
authentication system. It happened on the virtual
servers.
IV.

Volume: 04, Special Issue: March 2015


ISSN: 2278-2397

The DDOS attack covers the large class of


malicious attacks on the network or internet
infrastructure. In this problem how it happen.The
figure 3 shows distributed structure of the cloud.
When the server region all of them have
administrative rights. When the hackers with help that
of command prompt to identify the cloud IP Address
(IPV4 Address) and sending flood and where they
also have access of the file and server details make use
them send malicious to server or interrupt server they
restart them.
It mostly happens on the cloud service providers
misunderstanding and laziness. More number of
hacking tools available for crash the network in
market. They frequently delete important information.
Some time the web makers use code or language it
happen.
Incident of Amazon EC2 server, the code will help
us to find the root directory and IP Details. There is
problem in the programming tool. All users account
details stored under the root directory. The Sweden
hacker hacked and send the Report on the Amazon
sever. They check what happened on that they found
that Programming tool PHP had the mistake on the
version of before 5.3.12 and before of 5.4.2.

DDOS ATTACKS IN CLOUD

Cloud providers facing more numbers of DDOS


Attacks year wise and they are in increasing manner
[15]. Most of private and public cloud providers suffer
the DDOS attacks. The Arbor networks release
security report that told that 76% of attacks happened
under the DDOS attacks in security issues. In the
report have 43% of attacks on infrastructure security
issues. On most important factor some concern have
deal only 14% of respondents had seen attacks
targeting any form of cloud service. Data centers are
attacked by 94% [8].

Fig3. Distributed structure of Cloud

Fig 2. Attack types distribution

Sony pictures are supposed to have conducted a


retaliatory DDOS Attacks against the network. They
leak information for public download, according to
media report. The network punctuated by extortion
demands, as well the theft and releases the personal
information, emails and others. They named upon that
Guardians of Peace[7].

International Journal of Computing Algorithm (IJCOA)

The DDOS attack works on the application layer


[3] and ports helps us to find the IP. The ports are
TCP22 and 3389. These ports are administrative ports.
SSH runs by default port on the TCP 22. But,
actual port of TCP 22 is port 5632.client use random
ports to connect to the port TCP 22 they trying to log
on to that server. This port is default port for some of
pcAnywhere services. UDP packets [2] sent to this
port generally for pcAnywhere. The value 0x0016 is
hexadecimal form TCP22.
The port 3389 used for Remote desktop, terminal
services, windows 2000 terminal server, Microsoft

1322

International Conference on Computing and Intelligence Systems


Pages: 1320 1324
remote display protocol, Ms Terminal services, MS
WBT Server. This port is vulnerable to denial of
service against windows network terminal server. The
hacker quickly causes a server to reach full memory
utilization by creating a large number of normal TCP
connections to port 3389. Vulnerability exists on the
RDP. Where, the hacker sends a specially crafted
sequence of packets to port TCP 3389.
V.

transaction. Software checks the authorized person to


use them. The software have trip password and have
session to idle time. Trip password generated by the
server when approached level2 server. Time duration
of password expired on 1 minute. When they session
ended on idle 5 minutes. When they doing coping files
and do other activities of a server.

SOME ABBREVATIONS:
DOS
DDOS
TCP
GPO
EC2
RDP
SSH

TYPES OF DDOS ATTACKS

A. SYN FLOOD ATTACK:


TCP SYN flood is a one of the type of Distributed
Denial of Service (DDoS) attack that exploresthe part
of the normal TCP three-way handshake to consume
resources on the targeted server and render it
unresponsive [16,18].

C. PING OF DEATH:
A ping of death involves sending malware to the
server. A ping normally 32 bytes sized. This attack
caused by sending an IP Packet above sized 65536
bytes allowed by IP Protocol. The operating doesnt
know heavy size of packets. So, they crashed, ceased
or freeze.
D. LAND ATTACK:
It consists of stream of TCP SYN packets send by
same name IP address and port number of server.
Service providers can able to block these attacks.
VI.

SOLUTION FOR THE DDOS ATTACKS

In the Figure 3,set of level 2 servers available in


the layer 2 has administrative rights and they are
connected with the main server. Request attending
server is having administrative rights. So, that we are
giving limit access to level 2 server.
To restrict the client by accessing information we
are using group policy on that severs. To create the
GPO from the Group policy reporting Firewall ports.
Select the group policy reporting firewall ports started
GPO from the source starter GPO. Create new GPO.
Under mention the ports dont give any access right to
the client. Here all the administrative ports mentioned.
Starter GPOs and create GPOs Folder linked in the
group policy object [6].
In that case level 2 servers dont have rights do
any process of the server. So, level 2 servers wants to
access storage file and authentication details, needs
software that do the process of administrative access

International Journal of Computing Algorithm (IJCOA)

Denial Of Service
Distributed Denial Of Service
Transmission Control Protocol
Group Policy Object
Elastic Cloud 2
Remote Desktop Protocol
Secure Shell
VII. CONCLUSION

B. SMURF ATTACK:
Smurf attacks can be devastating, both to the
victim networkand to the network(s) used to amplify
the attack. An Internet control Message Protocol
(ICMP) Smurf attack is a brute-force attack on the
direct broadcast feature that is built in to the IP
protocol [17].

Volume: 04, Special Issue: March 2015


ISSN: 2278-2397

Cloud computing is recent emerged technology


that has revolutionized the storage of large volume of
data. Security issues are the major challenging issue in
Cloud computing. Various data security risk factors
are discussed in the above section Examining the
major Security challenges for cloud providers and
their
clients,
and
further my
paper be extended by guidelines
for
the
implementation of data security controls that are
based on recognized security frameworks and industry
best practices.
REFERENCES
[1]

Alina Madalina Lonea, Daniela Elena Popescu, Huaglory


Tianfield, Detecting DDoS Attacks in Cloud Computing
Environment, "Politehnica" University of Timisoara,
INTJCC, pp.70-78, February, 2013.
[2] Upma Goyal, Gayatri Bhatti and Sandeep Mehmi, A Dual
Mechanism for defeating DDoS Attacks in Cloud Computing
Model Computer Science Department, Punjab Technical
University, Kapurthala, India, vol. 2, Issue 3, pp 34-39,
March 2013.
[3] Ajey Singh, Dr. Maneesh Shrivastava, Overview of Attacks
on Cloud Computing, IJEIT, Volume 1, Issue 4, April 2012
[4] Vikas Chouhan , Sateesh Kumar Peddoju, Packet
Monitoring Approach to Prevent DDoS Attack in Cloud
Computing, Electronics & Computer Engineering
Department,Indian Institute of Technology Roorkee, Vol-1
Iss-1, 2012
[5] Poonam Yadav, Sujatha, Security Issues in Cloud
Computing Solution of DDOS and Introducing Two-Tier
CAPTCHA, Software Engineering Department, ITMU
gurgaon, Haryana, IJCCSA, Vol.3, No.3, June 2013
[6] https://technet.microsoft.com/en-in/library/jj572986.aspx
[7] http://recode.net/2014/12/10/sony-pictures-tries-to-disruptdownloads-of-its-stolen-files/
[8] http://www.infoworld.com/article/2613310/cloud-security/ascloud-use-grows--so-will-rate-of-ddos-attacks.html
[9] Wayne Jansen, Timothy Grance Guidelines on Security and
Privacy in Public Cloud Computing, NIST, Jan 2011.
[10] Making Virtual Machines Cloud-Ready, A Trend Micro
White Paper | May 2010.
[11] BhruguSevak, Security against side channel attack in cloud
computing, IJEAT, Volume 1, Issue-2, December 2012.
[12] Kuyoro s.o, Ibikunle f.,Awodele o., Cloud Computing
Security Issues and Challenges, IJCN, Volume 3, Issue-5,
2011

1323

International Conference on Computing and Intelligence Systems


Pages: 1320 1324

Volume: 04, Special Issue: March 2015


ISSN: 2278-2397

[13] Osama Harfoushi, Badder Alfawwaz, Nazeeh a.Ghatesheh,


Data Security and Challenges in Cloud Computing : A
Conceptual Analysis and Review, Department of Computer
informatin system,Communication and network,2014, 6,1521,http://www.scirp.org/journal/cn
[14] Prince Jain, Security Issues and their Solution In Cloud
Computing, IJCBR, Proceddings of I- Society 2012.
[15] Mohammed Nazri, Abdulaziz Aborujilah, New Framework
To Detect And Prevent Denial Of Service Attack In Cloud
Computing Environment, MIT, IJCSS, Volume -6, Issue-4.
[16] Niraj Suresh Katkamwar, Atharva Girish Puranik, Securing
Cloud Servers Against Flooding Based DDOS Attacks,
IJAIEM, volume- 1, issue-3, Nov 2012.
[17] Akash Mittal, Prof. Ajith Kumar Shrivastava, A Review Of
DDOS Attacks and its Counter Measures In TCP
BasedNetworks, Department of computer science, IJCSES,
Volume -2, Issue-4, Nov -2011
[18] Esraa Alomari, SelvaKumar Manickam, Botnet- Based
Distributed Denial of Service Attacks on Web Servers,
IJCA, Volume-49, issues-7, July 2012.
[19] J.RameshBabu, B.SamBalaji, A Prevention Of DDOS
Attacks In Cloud Using NEIF Techniques., IJSRP, Volume4, Issue-4, April 2014.

International Journal of Computing Algorithm (IJCOA)

1324

Anda mungkin juga menyukai