The document proposes a stealthy denial of service strategy against applications running in the cloud. It aims to exploit the cloud's flexibility by orchestrating slowly-increasing polymorphic attack patterns to avoid overloading the target system and prolong resource consumption, inflicting higher costs. The proposed system architecture includes modules for data owners, cloud servers, data consumers, and a threat model. It was presented by students to their professor.
Convert to study guideBETA
Transform any presentation into a summarized study guide, highlighting the most important points and key insights.
1 of 19
Download to read offline
More Related Content
review exicution
1. Stealthy denial of service strategy in cloud
computing
Under the guidance of
Mr. S. Suraj kamal (M.Tech)
Assistant Professor.
Presented by
K. Roopa (12701A0565)
G . Prasanna (12701A0560)
J. Venkata Praveen (12701A0597)
S. Subhash chandra bose (12701A0581)
Department of computer science and engineering(CSE).
Annamacharya institute of technology and sciences
new boyanpalli,rajampet(AITS)
2. CONTENTS
Abstract
Existing System And its Challenges
Proposed System And its Advantages
Architecture
List of Modules
Modeling Diagrams
System configuration
3. Title explanation
Cloud computing is the use of computing resources
(hardware and software) that are delivered as a service
over a network (typically the Internet).
Propose a strategy to orchestrate stealthy attack
patterns, which exhibit a slowly-increasing-intensity trend
designed to inflict the maximum financial cost to the
cloud customer.
4. Abstract
Cloud computing paradigm is due to its on-demand,
self-service, and pay-by-use nature.
Denial of Service (DoS) attacks involve not only the
quality of the delivered service, but also the service
maintenance costs in terms of resource consumption.
Aim at minimizing their visibility
Longer the detection delay is, the higher cost to be
incurred
5. Existing system
Sophisticated DDoS attacks are defined as that
category of attacks, which are tailored to hurt a
specific weak point in the target system design.
In order to conduct denial of service or just to
significantly degrade the performance.
6. Disadvantages:
Target server has a finite service queue, where the
incoming service requests are temporarily stored to be
served by the corresponding application process or thread.
None of the works proposed in the literature focus on
stealthy attacks against application that run in the cloud
environment.
7. Proposed System
Sophisticated strategy to orchestrate stealthy attack
patterns against applications running in the cloud.
Proposed strategy aims at exploiting the cloud
flexibility.
8. Advantages
Proposed slowly-increasing polymorphic
behavior avoids enough overload on the target
system
Detects the attack, the attack process can be re-initiate
by exploiting a different application vulnerability
(polymorphism in the form), or a different timing
(polymorphism over time), in order to inflict a prolonged
consumption of resources.
11. Data owner
In this module, the data owner uploads
their data in the cloud server. For the
security purpose the data owner splits file
to four packets, encrypts the data file and
then store in the cloud. The Data owner
can have capable of manipulating the
encrypted data file.
12. Cloud server
The cloud service provider manages a
cloud to provide data storage service. Data
owner encrypts and splits the data files and
store them in the cloud for sharing with
data consumers. To access the shared
data files, data consumers download
encrypted data files of their interest from
the cloud and then decrypt them.
13. Data consumer
In this module, the user can only access
the data file with the encrypted key to
access the file. Then The NC cloud
combines all the packets and sends to
Remote user. Users may try to access data
files within the cloud only.
14. Threat model
Attacker adds the malicious data to a file
in cloud servers. Then the Unauthorized
user will considered as a attacker. The
unauthorized user can delete the packets in
a particular file.
15. USECASE DIAGRAM for Stealthy denial of service strategy in cloud
computing:
Browse File
Send File
Upload Response
Encrypt File
Store Encrypted Data
View Owner Files
View Attackers
Search 'N Ranked Data
View 'N' Ranked Data
Request data
Retrieve and store data
Process End User Request
View User Files
data owner
cloud server
end user
16. CLASS DIAGRAM for Stealthy denial of service strategy in cloud
computing:
data owner
Browse File
Upload File
Encrypt File
View All
View_owner_Files
Exit
Select File Name()
Owner Name()
Owner File()
Cloud Server
View all Owner Files
View Attacks
Store_Files
,Authorize_Files
Authorize users
File ID, File Name, Owner Name()
Secret Key, User Details()
File Access Details()
View User Property, Hackers, Exit()
Register
Register
Reset
Name()
Password()
DOB()
Gender()
Address()
City()
Country()
Email()
Mobile()
End User
Search File Download
Search 'N' Ranked data
Exit
Register
Login
Fname()
n rank()
username()
secret_key()
Login
Login
Register
Reset
User Name()
Password()
17. SEQUENCE DIAGRAM for Stealthy denial of service strategy in
cloud computing:
Data Owner End User Cloud Server
1: create the account
2: account acceptance res
3: upload the file
4: file received confirmation
5: create the account
6: account confirmation
7: req the file
8: file req confirmation
9: file sending responce
12: verify confirmation
14: delete file
11: view user file req
13: process req
15: view reqts
10: verify files
18. COLLABORATION DIAGRAM for Stealthy denial of service strategy in cloud
computing:
Cloud
Server
Data
Owner
End
User
11: view user file req
13: process req
15: view reqts
1: create the account
3: upload the file
12: verifyconfirmation
14: delete file
2: account acceptance res
4: file received confirmation
5: create the account
7: req the file
6: account confirmation
8: file req confirmation
9: file sending responce
10: verify files
19. SYSTEM REQUIREMENTS
Hardware Requirements:
System : Pentium IV 2.4 Ghz
Hard Disk : 40 GB
RAM : 2 GB
Software Requirements:
Operating System : Windows XP
Language : Java
Front End : JSP
Data Base : My SQL
Server : Apache Tomcat