Open Access Open Access  Restricted Access Subscription Access

Intrusion Detection and Prevention using Lockout policy with ACL on Cloud Computing


Affiliations
1 School of Computing, SASTRA University, Thirumalaisamudram, Thanjavur - 613401, Tamilnadu, India
 

Background/Objectives: Cloud computing supports many enterprise and government organizations in business perspective due to its advantage such as high scalability and high flexibility. However, despite potential gains that can be achieved, security is fundamental issue. Denial of service attack attempted by attacker to exhausts the resources available to a network, application or service. The orchestrated flow of attack patterns by attacker affect the customers in terms of financial cost cause service inability to legitimate users, attacker overloads target system with massive amount of request, which results in loss of equipment resources affecting network bandwidth. Methods: To address this issue, the proposed lockout policy with access control list is applied to prevent the access to illegitimate user without affecting legal users. Findings: The proposed technique helps in differentiating legitimate and illegitimate users. The attack can be controlled by locking out malicious user access. Thereby the financial cost can be controlled by preventing the resource consumption by malicious node. Applications The proposed methodology can be applied in signature based analysis and strong user identification. There by providing security by building Anti-spam devices at customer site such as E-commerce application. Applications: The proposed methodology can be applied in the signature based analysis and strong user identification. Thus providing security by building Anti-spam devices at customer site, such as in an e-commerce application.

Keywords

Access Control List, Attack Pattern, DDoS, DoS, Lockout Policy, Service Inability.
User

Abstract Views: 153

PDF Views: 0




  • Intrusion Detection and Prevention using Lockout policy with ACL on Cloud Computing

Abstract Views: 153  |  PDF Views: 0

Authors

D. Narmadha
School of Computing, SASTRA University, Thirumalaisamudram, Thanjavur - 613401, Tamilnadu, India
P. Padmakumari
School of Computing, SASTRA University, Thirumalaisamudram, Thanjavur - 613401, Tamilnadu, India
A. Umamakeswari
School of Computing, SASTRA University, Thirumalaisamudram, Thanjavur - 613401, Tamilnadu, India

Abstract


Background/Objectives: Cloud computing supports many enterprise and government organizations in business perspective due to its advantage such as high scalability and high flexibility. However, despite potential gains that can be achieved, security is fundamental issue. Denial of service attack attempted by attacker to exhausts the resources available to a network, application or service. The orchestrated flow of attack patterns by attacker affect the customers in terms of financial cost cause service inability to legitimate users, attacker overloads target system with massive amount of request, which results in loss of equipment resources affecting network bandwidth. Methods: To address this issue, the proposed lockout policy with access control list is applied to prevent the access to illegitimate user without affecting legal users. Findings: The proposed technique helps in differentiating legitimate and illegitimate users. The attack can be controlled by locking out malicious user access. Thereby the financial cost can be controlled by preventing the resource consumption by malicious node. Applications The proposed methodology can be applied in signature based analysis and strong user identification. There by providing security by building Anti-spam devices at customer site such as E-commerce application. Applications: The proposed methodology can be applied in the signature based analysis and strong user identification. Thus providing security by building Anti-spam devices at customer site, such as in an e-commerce application.

Keywords


Access Control List, Attack Pattern, DDoS, DoS, Lockout Policy, Service Inability.



DOI: https://doi.org/10.17485/ijst%2F2016%2Fv9i48%2F138585