Defensive Mechanism Against DDoS Attack to Preserve Resource Availability for IoT Applications
The major challenge of Internet of Things (IoT) generated data is its hypervisor level vulnerabilities. Malicious VM deployment and termination are so simple due to its multitenant shared nature and distributed elastic cloud features. These features enable the attackers to launch Distributed Denial of Service attacks to degrade cloud server performance. Attack detection techniques are applied to the VMs that are used by malicious tenants to hold the cloud resources by launching DDoS attacks at data center subnets. Traditional dataflow-based attack detection methods rely on the similarities of incoming requests which consist of IP and TCP header information flows. The proposed approach classifies the status patterns of malicious VMs and ideal VMs to identify the attackers. In this article, information theory is used to calculate the entropy value of the malicious virtual machines for detecting attack behaviors. Experimental results prove that the proposed system works well against DDoS attacks in IoT applications.
Year of publication: |
2017
|
---|---|
Authors: | Aridoss, Manimaran |
Published in: |
International Journal of Handheld Computing Research (IJHCR). - IGI Global, ISSN 1947-9166, ZDB-ID 2703345-4. - Vol. 8.2017, 4 (01.10.), p. 40-51
|
Publisher: |
IGI Global |
Subject: | Cloud Data Center | DDoS Attack | Entropy Information Theory | Internet of Things |
Saved in:
Saved in favorites
Similar items by subject
-
An Intelligent Power Load Control/Switching System Using an Energy Meter and Relay Circuit
Udoh, Emmanuel, (2016)
-
Community-based complex cloud data center
Filiposka, Sonja, (2015)
-
A workload prediction model for reducing service level agreement violations in cloud data centers
Nehra, P., (2024)
- More ...