Open Access Open Access  Restricted Access Subscription Access

Effectiveness of Application Layer Denial of Service Counter- Measures in Cloud Computing

Abolarin, Kolawole, Akoja, Mofoluke

Abstract


Cloud computing, which appears to be a new computing trend, has a history that can be traced to the 1960s, yet the potential of computing paradigm has not been fully utilised. This is because of security and trust management issues associated with the paradigm. With a rise in financial losses reaching as high as $4.5 billion in 2017 and a breach of about 4.5million records in the cyberspace, cyber security remains an important aspect of any IT infrastructure demanding thorough evaluation. This is because the consequences of failing to do so are always dire as evident in the statistical figures. Studies so far have shown remarkable efforts in the area of cloud computing security but has paid little attention to the area of application based denial of service and its distributed variant.

The aim of this study is to review the adequacy of existing counter-measures against Extensive Mark-up Language Denial of Service (XDoS) and its distributed version (Extensive Mark-up Language Distributed Denial of Service (XDDoS)) which are application based denial of service in software as a service (SaaS) cloud computing service model.

A review of literature in the area of counter-measures against DoS, DDoS, application based DoS and DDoS was conducted and it was found that current counter-measure are still inadequate. Hence, further study must be conducted to find an effective counter-measure against the XDoS and the XDDoS. As well as finding other aspects of computing resource that an attacker can use to cause denial of service so as to mitigate them.


Full Text:

PDF

References


Abadi, D.Data Management in the Cloud: Limitations and Opportunities, s.l.: Bulletin of the IEEE Computer Society Technical Committee on Data Engineering.2009.

Arora, R. & Bajaj, K. S., 2013. Highly Effective Advanced Technology "HEAT" Re-defining Technology for Hospital Management. International Journal of Management & Behavioural Sciences, March, Volume Special Edition. 68-73p.

Chonka, A., Xiang, Y., Zhou, W. & Bonti, A. Cloud Security defence to protect cloud computing against HTTP-DoS and XML-DoS. Journal of Network and Application. 2011.34:1097-1107p.

CISCO. Cisco Cloud Computing - Data Center Strategy, Architecture and Solutions. Point of view white paper for U.S. public sector, s.l.: Cisco Systems, Inc.2009.

Cohen, F.Computer Virus: theory and experiments. Computer & Security.1987.6:22-35p.

Cooke, E., Jahanian, F. & McPherson, D. The Zombie Roundup: Understanding, Detecting and Disrupting Botnets. 2005s.l., s.n:39-44p.

Desai, P., 2008. Towards An Undetectable Computer Virus, s.l.: San Jose State University.

Dietrich, S., Long, N. & Dittrich, D. Analyzing distributed denial of service attack tools: The shaft case.. New Orleans, s.n., 2000:329-339p.

Fan, F., Lei, F. & Wu, J. The Integration of Cloud Computing and the intrction. Gyeongju, IEEE, 2011:45-48p.

Fowler, A., 2009. Fear in the Fast Lane. [Online] Available at: http://www.abc.net.au/4corners/content/2009/s2655088.htm


Refbacks

  • There are currently no refbacks.