Indian Journal of Science and Technology
DOI: 10.17485/ijst/2016/v9i48/107975
Year: 2016, Volume: 9, Issue: 48, Pages: 1-4
Original Article
D. Narmadha, P. Padmakumari* and A. Umamakeswari
School of Computing, SASTRA University, Thirumalaisamudram, Thanjavur - 613401, Tamilnadu, India; [email protected], [email protected], [email protected]
Background/Objectives: Cloud computing supports many enterprise and government organizations in business perspective due to its advantage such as high scalability and high flexibility. However, despite potential gains that can be achieved, security is fundamental issue. Denial of service attack attempted by attacker to exhausts the resources available to a network, application or service. The orchestrated flow of attack patterns by attacker affect the customers in terms of financial cost cause service inability to legitimate users, attacker overloads target system with massive amount of request, which results in loss of equipment resources affecting network bandwidth. Methods: To address this issue, the proposed lockout policy with access control list is applied to prevent the access to illegitimate user without affecting legal users. Findings: The proposed technique helps in differentiating legitimate and illegitimate users. The attack can be controlled by locking out malicious user access. Thereby the financial cost can be controlled by preventing the resource consumption by malicious node. Applications The proposed methodology can be applied in signature based analysis and strong user identification. There by providing security by building Anti-spam devices at customer site such as E-commerce application. Applications: The proposed methodology can be applied in the signature based analysis and strong user identification. Thus providing security by building Anti-spam devices at customer site, such as in an e-commerce application.
Keywords: Access Control List, Attack Pattern, DDoS, DoS, Lockout Policy, Service Inability
Subscribe now for latest articles and news.