Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
research-article

A Modeling Approach to Classifying Malicious Cloud Users via Shuffling

Published: 17 January 2019 Publication History

Abstract

DDoS attacks are still a serious security issue on the Internet. We explore a distributed Cloud setting in which users are mapped to servers where malicious users mapped to the same server can thwart the performance of legitimate users. By periodically shuffling the mapping of users to servers and observing how this affects successfully attacked servers, the malicious users can be identified. We use simple models to understand how to best score these observations to identify malicious users with well-defined levels of confidence.

References

[1]
Q. Jia, K. Sun, and A. Stavrou. Motag: Moving target defense against internet denial of service attacks. In Computer Communications and Networks (ICCCN), 2013 22nd International Conference on, pages 1--9. IEEE, 2013.
[2]
Q. Jia, H. Wang, D. Fleck, F. Li, A. Stavrou, and W. Powell. Catch me if you can: a cloud-enabled ddos defense. In Dependable Systems and Networks (DSN), 2014 44th Annual IEEE/IFIP International Conference on, pages 264--275. IEEE, 2014.
[3]
Y.-H. Lin, J.-J. Kuo, D.-N. Yang, and W.-T. Chen. A cost-effective shuffling-based defense against http ddos attacks with sdn/nfv. In Communications (ICC), 2017 IEEE International Conference on, pages 1--7. IEEE, 2017.
[4]
Y. Shan, G. Kesidis, and D. Fleck. Cloud-side shuffling defenses against ddos attacks on proxied multiserver systems. In Proceedings of the 2017 on Cloud Computing Security Workshop, pages 1--10. ACM, 2017.
[5]
T. Yamane. Statistics: An introductory analysis. 1973.

Cited By

View all
  • (2024)From Seek-and-Destroy to Split-and-Destroy: Connection Partitioning as an Effective Tool against Low-Rate DoS AttacksFuture Internet10.3390/fi1604013716:4(137)Online publication date: 19-Apr-2024
  • (2020)A Client Bootstrapping Protocol for DoS Attack Mitigation on Entry Point Services in the CloudSecurity and Communication Networks10.1155/2020/88732582020Online publication date: 1-Jan-2020

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM SIGMETRICS Performance Evaluation Review
ACM SIGMETRICS Performance Evaluation Review  Volume 46, Issue 2
September 2018
95 pages
ISSN:0163-5999
DOI:10.1145/3305218
Issue’s Table of Contents

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 17 January 2019
Published in SIGMETRICS Volume 46, Issue 2

Check for updates

Qualifiers

  • Research-article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)6
  • Downloads (Last 6 weeks)1
Reflects downloads up to 30 Aug 2024

Other Metrics

Citations

Cited By

View all
  • (2024)From Seek-and-Destroy to Split-and-Destroy: Connection Partitioning as an Effective Tool against Low-Rate DoS AttacksFuture Internet10.3390/fi1604013716:4(137)Online publication date: 19-Apr-2024
  • (2020)A Client Bootstrapping Protocol for DoS Attack Mitigation on Entry Point Services in the CloudSecurity and Communication Networks10.1155/2020/88732582020Online publication date: 1-Jan-2020

View Options

Get Access

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media