A Framework to Automate Cloud based Service Attacks Detection and Prevention

Abstract

With the increasing demand for high availability, scalability and cost minimization, the adaptation of cloud computing is also increasing. By the demand from the data, consumer or the customers of the applications, the service providers or the application owners are migrating all the applications into the cloud. These migrations of the traditional applications and deploying new applications are benefiting the consumers and the service providers. The consumers are getting the higher availability of the applications and in the other hand, the consumers of the applications are getting benefits from of the cost reduction by optimal scalability and deploying additional features with the least cost, which intern providing the better customer satisfaction. Nevertheless, this migrations and new deployments are attracting the attention of the hackers and attackers as well. In the recent past, several attacks are reported on various popular services like search engines, storage services, and critical application ranging from healthcare to defence. The attacks are sometimes limited to the data exploration, where the attackers only consume the data and sometimes the attackers destroy crucial services. The major challenge in detecting these attacks is mostly identifying the nature of the connection request. Also, identifying the attacks are not sufficient in providing the security for the cloud services and must be deployed as security as a service in the applications or the services or in the data centre as automatic and continuous measures. Various research endeavours have shown critical enhancements in the on-going past for recognizing the security attacks. Nonetheless, these attempts have not provided any solution in preventing the security attacks. Also, the existing methods as mentioned are not automated and cannot be included in the services. Thus, this work provides a unique automated framework solution for detecting the application traffic pattern and generates the rule sets for detecting any anomalies in the request types. The major outcome of this work is to identify the attack types and prevent further damages to the cloud services with a minimal computational load. The additional benefits from this work are the preventive measure for popular attack types. The work also demonstrates the ability to detect a new type of attacks based on traffic pattern analysis and provides preventive measures for making the cloud computing application hosting industry a safer place.

Authors and Affiliations

P Ravinder Rao, Dr. V Sucharita

Keywords

Related Articles

GEO-VISUAL APPROACH FOR SPATIAL SCAN STATISTICS: AN ANALYSIS OF DENGUE FEVER OUTBREAKS IN DELHI

There are very few surveillance systems being used to detect disease outbreaks at present. In disease surveillance system, data related to cases and various risk factors are collected and then the collected data is trans...

A Systematic Review of Cyber Security and Classification of Attacks in Networks

Cyber security plays an important role to secure the people who use internet via different electronic devices in their daily life. Some causes occurred all over world that people face problems when they connect their dev...

Studying the Influence of Static Converters’ Current Harmonics on a PEM Fuel Cell using Bond Graph Modeling Technique

This paper shows the results of adding static converters (Boost, Buck and Buck-Boost converters) as an adaptation solution between a PEM Fuel Cell generator and a resistive load in order to study different effects of the...

Effect of Correlating ImageThreshold Values with Image Gradient Field on Damage Detection in Composite Structures

Effect of image threshold level variation is studied and proved to be a critical factor in damage detection and characterization of impacted composite Reaction Injection Molding ((RIM) structures. The variation of thresh...

Segment, Track, Extract, Recognize and Convert Sign Language Videos to Voice/Text

This paper summarizes various algorithms used to design a sign language recognition system. Sign language is the language used by deaf people to communicate among themselves and with normal people. We designed a real tim...

Download PDF file
  • EP ID EP468340
  • DOI 10.14569/IJACSA.2019.0100232
  • Views 58
  • Downloads 0

How To Cite

P Ravinder Rao, Dr. V Sucharita (2019). A Framework to Automate Cloud based Service Attacks Detection and Prevention. International Journal of Advanced Computer Science & Applications, 10(2), 241-250. https://europub.co.uk/articles/-A-468340