• P-ISSN 0974-6846 E-ISSN 0974-5645

Indian Journal of Science and Technology

Article

Indian Journal of Science and Technology

Year: 2016, Volume: 9, Issue: 48, Pages: 1-4

Original Article

Intrusion Detection and Prevention using Lockout policy with ACL on Cloud Computing

Abstract

Background/Objectives: Cloud computing supports many enterprise and government organizations in business perspective due to its advantage such as high scalability and high flexibility. However, despite potential gains that can be achieved, security is fundamental issue. Denial of service attack attempted by attacker to exhausts the resources available to a network, application or service. The orchestrated flow of attack patterns by attacker affect the customers in terms of financial cost cause service inability to legitimate users, attacker overloads target system with massive amount of request, which results in loss of equipment resources affecting network bandwidth. Methods: To address this issue, the proposed lockout policy with access control list is applied to prevent the access to illegitimate user without affecting legal users. Findings: The proposed technique helps in differentiating legitimate and illegitimate users. The attack can be controlled by locking out malicious user access. Thereby the financial cost can be controlled by preventing the resource consumption by malicious node. Applications The proposed methodology can be applied in signature based analysis and strong user identification. There by providing security by building Anti-spam devices at customer site such as E-commerce application. Applications: The proposed methodology can be applied in the signature based analysis and strong user identification. Thus providing security by building Anti-spam devices at customer site, such as in an e-commerce application.
Keywords: Access Control List, Attack Pattern, DDoS, DoS, Lockout Policy, Service Inability

DON'T MISS OUT!

Subscribe now for latest articles and news.