際際滷

際際滷Share a Scribd company logo
Stealthy denial of service strategy in cloud
computing
Under the guidance of
Mr. S. Suraj kamal (M.Tech)
Assistant Professor.
Presented by
K. Roopa (12701A0565)
G . Prasanna (12701A0560)
J. Venkata Praveen (12701A0597)
S. Subhash chandra bose (12701A0581)
Department of computer science and engineering(CSE).
Annamacharya institute of technology and sciences
new boyanpalli,rajampet(AITS)
CONTENTS
 Abstract
Existing System And its Challenges
Proposed System And its Advantages
Architecture
List of Modules
Modeling Diagrams
System configuration
Title explanation
 Cloud computing is the use of computing resources
(hardware and software) that are delivered as a service
over a network (typically the Internet).
 Propose a strategy to orchestrate stealthy attack
patterns, which exhibit a slowly-increasing-intensity trend
designed to inflict the maximum financial cost to the
cloud customer.
Abstract
Cloud computing paradigm is due to its on-demand,
self-service, and pay-by-use nature.
Denial of Service (DoS) attacks involve not only the
quality of the delivered service, but also the service
maintenance costs in terms of resource consumption.
Aim at minimizing their visibility
Longer the detection delay is, the higher cost to be
incurred
Existing system
Sophisticated DDoS attacks are defined as that
category of attacks, which are tailored to hurt a
specific weak point in the target system design.
 In order to conduct denial of service or just to
significantly degrade the performance.
Disadvantages:
Target server has a finite service queue, where the
incoming service requests are temporarily stored to be
served by the corresponding application process or thread.
None of the works proposed in the literature focus on
stealthy attacks against application that run in the cloud
environment.
Proposed System
Sophisticated strategy to orchestrate stealthy attack
patterns against applications running in the cloud.
Proposed strategy aims at exploiting the cloud
flexibility.
Advantages
Proposed slowly-increasing polymorphic
behavior avoids enough overload on the target
system
Detects the attack, the attack process can be re-initiate
by exploiting a different application vulnerability
(polymorphism in the form), or a different timing
(polymorphism over time), in order to inflict a prolonged
consumption of resources.
System Architecture for Stealthy denial of
service strategy in cloud computing
List of modules
Data owner
Cloud server
Data consumer
Threat model
Data owner
In this module, the data owner uploads
their data in the cloud server. For the
security purpose the data owner splits file
to four packets, encrypts the data file and
then store in the cloud. The Data owner
can have capable of manipulating the
encrypted data file.
Cloud server
The cloud service provider manages a
cloud to provide data storage service. Data
owner encrypts and splits the data files and
store them in the cloud for sharing with
data consumers. To access the shared
data files, data consumers download
encrypted data files of their interest from
the cloud and then decrypt them.
Data consumer
In this module, the user can only access
the data file with the encrypted key to
access the file. Then The NC cloud
combines all the packets and sends to
Remote user. Users may try to access data
files within the cloud only.
Threat model
Attacker adds the malicious data to a file
in cloud servers. Then the Unauthorized
user will considered as a attacker. The
unauthorized user can delete the packets in
a particular file.
USECASE DIAGRAM for Stealthy denial of service strategy in cloud
computing:
Browse File
Send File
Upload Response
Encrypt File
Store Encrypted Data
View Owner Files
View Attackers
Search 'N Ranked Data
View 'N' Ranked Data
Request data
Retrieve and store data
Process End User Request
View User Files
data owner
cloud server
end user
CLASS DIAGRAM for Stealthy denial of service strategy in cloud
computing:
data owner
Browse File
Upload File
Encrypt File
View All
View_owner_Files
Exit
Select File Name()
Owner Name()
Owner File()
Cloud Server
View all Owner Files
View Attacks
Store_Files
,Authorize_Files
Authorize users
File ID, File Name, Owner Name()
Secret Key, User Details()
File Access Details()
View User Property, Hackers, Exit()
Register
Register
Reset
Name()
Password()
DOB()
Gender()
Address()
City()
Country()
Email()
Mobile()
End User
Search File Download
Search 'N' Ranked data
Exit
Register
Login
Fname()
n rank()
username()
secret_key()
Login
Login
Register
Reset
User Name()
Password()
SEQUENCE DIAGRAM for Stealthy denial of service strategy in
cloud computing:
Data Owner End User Cloud Server
1: create the account
2: account acceptance res
3: upload the file
4: file received confirmation
5: create the account
6: account confirmation
7: req the file
8: file req confirmation
9: file sending responce
12: verify confirmation
14: delete file
11: view user file req
13: process req
15: view reqts
10: verify files
COLLABORATION DIAGRAM for Stealthy denial of service strategy in cloud
computing:
Cloud
Server
Data
Owner
End
User
11: view user file req
13: process req
15: view reqts
1: create the account
3: upload the file
12: verifyconfirmation
14: delete file
2: account acceptance res
4: file received confirmation
5: create the account
7: req the file
6: account confirmation
8: file req confirmation
9: file sending responce
10: verify files
SYSTEM REQUIREMENTS
Hardware Requirements:
System : Pentium IV 2.4 Ghz
Hard Disk : 40 GB
RAM : 2 GB
Software Requirements:
Operating System : Windows XP
Language : Java
Front End : JSP
Data Base : My SQL
Server : Apache Tomcat

More Related Content

review exicution

  • 1. Stealthy denial of service strategy in cloud computing Under the guidance of Mr. S. Suraj kamal (M.Tech) Assistant Professor. Presented by K. Roopa (12701A0565) G . Prasanna (12701A0560) J. Venkata Praveen (12701A0597) S. Subhash chandra bose (12701A0581) Department of computer science and engineering(CSE). Annamacharya institute of technology and sciences new boyanpalli,rajampet(AITS)
  • 2. CONTENTS Abstract Existing System And its Challenges Proposed System And its Advantages Architecture List of Modules Modeling Diagrams System configuration
  • 3. Title explanation Cloud computing is the use of computing resources (hardware and software) that are delivered as a service over a network (typically the Internet). Propose a strategy to orchestrate stealthy attack patterns, which exhibit a slowly-increasing-intensity trend designed to inflict the maximum financial cost to the cloud customer.
  • 4. Abstract Cloud computing paradigm is due to its on-demand, self-service, and pay-by-use nature. Denial of Service (DoS) attacks involve not only the quality of the delivered service, but also the service maintenance costs in terms of resource consumption. Aim at minimizing their visibility Longer the detection delay is, the higher cost to be incurred
  • 5. Existing system Sophisticated DDoS attacks are defined as that category of attacks, which are tailored to hurt a specific weak point in the target system design. In order to conduct denial of service or just to significantly degrade the performance.
  • 6. Disadvantages: Target server has a finite service queue, where the incoming service requests are temporarily stored to be served by the corresponding application process or thread. None of the works proposed in the literature focus on stealthy attacks against application that run in the cloud environment.
  • 7. Proposed System Sophisticated strategy to orchestrate stealthy attack patterns against applications running in the cloud. Proposed strategy aims at exploiting the cloud flexibility.
  • 8. Advantages Proposed slowly-increasing polymorphic behavior avoids enough overload on the target system Detects the attack, the attack process can be re-initiate by exploiting a different application vulnerability (polymorphism in the form), or a different timing (polymorphism over time), in order to inflict a prolonged consumption of resources.
  • 9. System Architecture for Stealthy denial of service strategy in cloud computing
  • 10. List of modules Data owner Cloud server Data consumer Threat model
  • 11. Data owner In this module, the data owner uploads their data in the cloud server. For the security purpose the data owner splits file to four packets, encrypts the data file and then store in the cloud. The Data owner can have capable of manipulating the encrypted data file.
  • 12. Cloud server The cloud service provider manages a cloud to provide data storage service. Data owner encrypts and splits the data files and store them in the cloud for sharing with data consumers. To access the shared data files, data consumers download encrypted data files of their interest from the cloud and then decrypt them.
  • 13. Data consumer In this module, the user can only access the data file with the encrypted key to access the file. Then The NC cloud combines all the packets and sends to Remote user. Users may try to access data files within the cloud only.
  • 14. Threat model Attacker adds the malicious data to a file in cloud servers. Then the Unauthorized user will considered as a attacker. The unauthorized user can delete the packets in a particular file.
  • 15. USECASE DIAGRAM for Stealthy denial of service strategy in cloud computing: Browse File Send File Upload Response Encrypt File Store Encrypted Data View Owner Files View Attackers Search 'N Ranked Data View 'N' Ranked Data Request data Retrieve and store data Process End User Request View User Files data owner cloud server end user
  • 16. CLASS DIAGRAM for Stealthy denial of service strategy in cloud computing: data owner Browse File Upload File Encrypt File View All View_owner_Files Exit Select File Name() Owner Name() Owner File() Cloud Server View all Owner Files View Attacks Store_Files ,Authorize_Files Authorize users File ID, File Name, Owner Name() Secret Key, User Details() File Access Details() View User Property, Hackers, Exit() Register Register Reset Name() Password() DOB() Gender() Address() City() Country() Email() Mobile() End User Search File Download Search 'N' Ranked data Exit Register Login Fname() n rank() username() secret_key() Login Login Register Reset User Name() Password()
  • 17. SEQUENCE DIAGRAM for Stealthy denial of service strategy in cloud computing: Data Owner End User Cloud Server 1: create the account 2: account acceptance res 3: upload the file 4: file received confirmation 5: create the account 6: account confirmation 7: req the file 8: file req confirmation 9: file sending responce 12: verify confirmation 14: delete file 11: view user file req 13: process req 15: view reqts 10: verify files
  • 18. COLLABORATION DIAGRAM for Stealthy denial of service strategy in cloud computing: Cloud Server Data Owner End User 11: view user file req 13: process req 15: view reqts 1: create the account 3: upload the file 12: verifyconfirmation 14: delete file 2: account acceptance res 4: file received confirmation 5: create the account 7: req the file 6: account confirmation 8: file req confirmation 9: file sending responce 10: verify files
  • 19. SYSTEM REQUIREMENTS Hardware Requirements: System : Pentium IV 2.4 Ghz Hard Disk : 40 GB RAM : 2 GB Software Requirements: Operating System : Windows XP Language : Java Front End : JSP Data Base : My SQL Server : Apache Tomcat