SlideShare a Scribd company logo
1 of 3
Stealthy Denial of Service Strategy in
Cloud Computing
ABSTRACT:
The success of the cloud computing paradigm is due to its on-demand, self-service, and pay-by-use
nature. According to this paradigm, the effects of Denial of Service (DoS) attacks involve not only the
quality of the delivered service, but also the service maintenance costs in terms of resource
consumption. Specifically, the longer the detection delay is, the higher the costs to be incurred.
Therefore, a particular attention has to be paid for stealthy DoS attacks. They aim at minimizing their
visibility, and at the same time, they can be as harmful as the brute-force attacks. They are sophisticated
attacks tailored to leverage the worst-case performance of the target system through specific periodic,
pulsing, and low-rate traffic patterns. In this paper, we propose a strategy to orchestrate stealthy attack
patterns, which exhibit a slowly-increasing-intensity trend designed to inflict the maximumfinancial cost
to the cloud customer, while respecting the job size and the service arrival rate imposed by the
detection mechanisms. We describe both how to apply the proposed strategy, and its effects on the
target systemdeployedinthe cloud
EXISTING SYSTEM:
Sophisticated DDoS attacks are defined as that category of attacks, which are tailored to hurt a specific
weak point in the target system design, in order to conduct denial of service or just to significantly
degrade the performance. The term stealthy has been used to identify sophisticated attacks that are
specifically designed to keep the malicious behaviors virtually invisible to the detection mechanisms.
These attacks can be significantly harder to detect compared with more traditional brute-force and
floodingstyle attacks.
The methods of launching sophisticated attacks can be categorized into two classes: job-content-based
and jobsarrival pattern-based.
In recent years, variants of DoS attacks that use low-rate traffic have been proposed, including Shrew
attacks (LDoS), Reduction of Quality attacks (RoQ), and Low-Rate DoS attacks against application servers
(LoRDAS).
DISADVANTAGES OF EXISTINGSYSTEM:
Due to its high similarity to legitimate network traffic and much lower launching overhead than classic
DDoS attack, this new assault type cannot be efficiently detected or prevented by existing
network-basedsolutions.
They assume the target server has a finite service queue, where the incoming service requests are
temporarily stored to be served by the corresponding application process or thread. The attack takes
advantage of the capacity to forecast the time at which the responses to incoming requests for a given
service occur. This capability is used to schedule an intelligent pattern in such a way that the attacked
server becomes busy the most time in processing of the malicious requests instead of those from
legitimate users.
None of the works proposed in the literature focus on stealthy attacks against application that run in the
cloudenvironment.
PROPOSEDSYSTEM:
This paper presents a sophisticated strategy to orchestrate stealthy attack patterns against applications
running in the cloud. Instead of aiming at making the service unavailable, the proposed strategy aims at
exploiting the cloud flexibility, forcing the application to consume more resources than needed,
affectingthe cloudcustomermore onfinancial aspectsthanonthe service availability.
The attack pattern is orchestrated in order to evade, or however, greatly delay the techniques proposed
in the literature to detect low-rate attacks. It does not exhibit a periodic waveform typical of low-rate
exhaustingattacks.Incontrastwiththem, itisan iterative andincremental process.
In particular, the attack potency (in terms of service requests rate and concurrent attack sources) is
slowly enhanced by a patient attacker, in order to inflict significant financial losses, even if the attack
pattern is performed in accordance to the maximum job size and arrival rate of the service requests
allowedinthe system.
Using a simplified model empirically designed, we derive an expression for gradually increasing the
potency of the attack, as a function of the reached service degradation (without knowing in advance the
target system capability). We show that the features offered by the cloud provider, to ensure the SLA
negotiated with the customer (including the load balancing and auto-scaling mechanisms), can be
maliciously exploited by the proposed stealthy attack, which slowly exhausts the resources provided by
the cloudprovider, andincreasesthe costsincurredbythe customer.
The proposed attack strategy, namely Slowly-Increasing-Polymorphic DDoS Attack Strategy (SIPDAS) can
be applied to several kind of attacks, that leverage known application vulnerabilities, in order to degrade
the service providedbythe targetapplicationserverrunninginthe cloud.
ADVANTAGES OF PROPOSEDSYSTEM:
We show that the proposed slowly-increasing polymorphic behavior induces enough overload on the
target system (to cause a significant financial losses), and evades, or however, delays greatly the
detectionmethods.
Even if the victim detects the attack, the attack process can be re-initiate by exploiting a different
application vulnerability (polymorphism in the form), or a different timing (polymorphism over time), in
orderto inflictaprolongedconsumptionof resources.
SYSTEM REQUIREMENTS:
HARDWAREREQUIREMENTS:
 System : PentiumIV 2.4 GHz or More
 Hard Disk : 40 GB
 RAM : 2 GB
SOFTWAREREQUIREMENTS:
 OperatingSystem : WindowsXP
 Language : Java
 Front End : JSP
 Data Base : My SQL
 Server : Apache Tomcat
REFERENCE:
Massimo Ficco and Massimiliano Rak, “Stealthy Denial of Service Strategy in Cloud
Computing”, IEEE TRANSACTIONS ON CLOUD COMPUTING, VOL. 3, NO. 1, JANUARY-MARCH
2015.

More Related Content

Viewers also liked (14)

Lecture 2. komponen teknologi
Lecture 2. komponen teknologiLecture 2. komponen teknologi
Lecture 2. komponen teknologi
 
Mareíto - Atelier Alicante
Mareíto - Atelier AlicanteMareíto - Atelier Alicante
Mareíto - Atelier Alicante
 
Yiddish Chutzpah - Atelier Alicante
Yiddish Chutzpah - Atelier AlicanteYiddish Chutzpah - Atelier Alicante
Yiddish Chutzpah - Atelier Alicante
 
1. agroindustri peluang dan kendala
1. agroindustri peluang dan kendala1. agroindustri peluang dan kendala
1. agroindustri peluang dan kendala
 
Rakimania - Atelier Alicante
Rakimania - Atelier AlicanteRakimania - Atelier Alicante
Rakimania - Atelier Alicante
 
Wikishine - Atelier Alicante
Wikishine - Atelier AlicanteWikishine - Atelier Alicante
Wikishine - Atelier Alicante
 
19th century timeline heather lovingood
19th century timeline heather lovingood19th century timeline heather lovingood
19th century timeline heather lovingood
 
2. perencanaan usaha agroindustri
2. perencanaan usaha agroindustri2. perencanaan usaha agroindustri
2. perencanaan usaha agroindustri
 
Ppp classroom management 2014 matamoros style
Ppp classroom management 2014 matamoros stylePpp classroom management 2014 matamoros style
Ppp classroom management 2014 matamoros style
 
7 8-kendali atribut
7 8-kendali atribut7 8-kendali atribut
7 8-kendali atribut
 
Lecture 2. komponen teknologi
Lecture 2. komponen teknologiLecture 2. komponen teknologi
Lecture 2. komponen teknologi
 
proposal Peningkatan Kualitas Pembelajaran IPA melalui Model STAD dengan Medi...
proposal Peningkatan Kualitas Pembelajaran IPA melalui Model STAD dengan Medi...proposal Peningkatan Kualitas Pembelajaran IPA melalui Model STAD dengan Medi...
proposal Peningkatan Kualitas Pembelajaran IPA melalui Model STAD dengan Medi...
 
HOW TO USE THE NEPBE SYLLABUS IN A GIVEN LESSON PLAN FORMAT
HOW TO USE THE NEPBE SYLLABUS IN A GIVEN LESSON PLAN FORMATHOW TO USE THE NEPBE SYLLABUS IN A GIVEN LESSON PLAN FORMAT
HOW TO USE THE NEPBE SYLLABUS IN A GIVEN LESSON PLAN FORMAT
 
9. bahan serat
9. bahan serat9. bahan serat
9. bahan serat
 

Similar to AAA

Stealthy denial of service strategy in cloud computing
Stealthy denial of service strategy in cloud computingStealthy denial of service strategy in cloud computing
Stealthy denial of service strategy in cloud computingsyeda yasmeen
 
DDOS Attacks-A Stealthy Way of Implementation and Detection
DDOS Attacks-A Stealthy Way of Implementation and DetectionDDOS Attacks-A Stealthy Way of Implementation and Detection
DDOS Attacks-A Stealthy Way of Implementation and DetectionIJRES Journal
 
A Survey on Stealthy Denial of Service Strategy in Cloud Computing
A Survey on Stealthy Denial of Service Strategy in Cloud ComputingA Survey on Stealthy Denial of Service Strategy in Cloud Computing
A Survey on Stealthy Denial of Service Strategy in Cloud ComputingIRJET Journal
 
A DENIAL OF SERVICE STRATEGY TO ORCHESTRATE STEALTHY ATTACK PATTERNS IN CLOUD...
A DENIAL OF SERVICE STRATEGY TO ORCHESTRATE STEALTHY ATTACK PATTERNS IN CLOUD...A DENIAL OF SERVICE STRATEGY TO ORCHESTRATE STEALTHY ATTACK PATTERNS IN CLOUD...
A DENIAL OF SERVICE STRATEGY TO ORCHESTRATE STEALTHY ATTACK PATTERNS IN CLOUD...IAEME Publication
 
WEB-BASED APPLICATION LAYER DISTRIBUTED DENIAL-OF-SERVICE ATTACKS: A DATA-DRI...
WEB-BASED APPLICATION LAYER DISTRIBUTED DENIAL-OF-SERVICE ATTACKS: A DATA-DRI...WEB-BASED APPLICATION LAYER DISTRIBUTED DENIAL-OF-SERVICE ATTACKS: A DATA-DRI...
WEB-BASED APPLICATION LAYER DISTRIBUTED DENIAL-OF-SERVICE ATTACKS: A DATA-DRI...indexPub
 
IRJET- HHH- A Hyped-up Handling of Hadoop based SAMR-MST for DDOS Attacks...
IRJET-  	  HHH- A Hyped-up Handling of Hadoop based SAMR-MST for DDOS Attacks...IRJET-  	  HHH- A Hyped-up Handling of Hadoop based SAMR-MST for DDOS Attacks...
IRJET- HHH- A Hyped-up Handling of Hadoop based SAMR-MST for DDOS Attacks...IRJET Journal
 
D do s_white_paper_june2015
D do s_white_paper_june2015D do s_white_paper_june2015
D do s_white_paper_june2015saifam
 
Encountering distributed denial of service attack utilizing federated softwar...
Encountering distributed denial of service attack utilizing federated softwar...Encountering distributed denial of service attack utilizing federated softwar...
Encountering distributed denial of service attack utilizing federated softwar...IJECEIAES
 
MAINTAINING CLOUD PERFORMANCE UNDER DDOS ATTACKS
MAINTAINING CLOUD PERFORMANCE UNDER DDOS ATTACKSMAINTAINING CLOUD PERFORMANCE UNDER DDOS ATTACKS
MAINTAINING CLOUD PERFORMANCE UNDER DDOS ATTACKSIJCNCJournal
 
IRJET- EEDE- Extenuating EDOS for DDOS and Eluding HTTP Web based Attacks in ...
IRJET- EEDE- Extenuating EDOS for DDOS and Eluding HTTP Web based Attacks in ...IRJET- EEDE- Extenuating EDOS for DDOS and Eluding HTTP Web based Attacks in ...
IRJET- EEDE- Extenuating EDOS for DDOS and Eluding HTTP Web based Attacks in ...IRJET Journal
 
Efficient ddos attacks security scheme using asvs
Efficient ddos attacks security scheme using asvsEfficient ddos attacks security scheme using asvs
Efficient ddos attacks security scheme using asvseSAT Journals
 
Efficient ddos attacks security scheme using asvs
Efficient ddos attacks security scheme using asvsEfficient ddos attacks security scheme using asvs
Efficient ddos attacks security scheme using asvseSAT Publishing House
 
A MECHANISM FOR EARLY DETECTING DDOS ATTACKS BASED ON M/G/R PS QUEUE
A MECHANISM FOR EARLY DETECTING DDOS ATTACKS BASED ON M/G/R PS QUEUEA MECHANISM FOR EARLY DETECTING DDOS ATTACKS BASED ON M/G/R PS QUEUE
A MECHANISM FOR EARLY DETECTING DDOS ATTACKS BASED ON M/G/R PS QUEUEIJNSA Journal
 
A MECHANISM FOR EARLY DETECTING DDOS ATTACKS BASED ON M/G/R PS QUEUE
A MECHANISM FOR EARLY DETECTING DDOS ATTACKS BASED ON M/G/R PS QUEUEA MECHANISM FOR EARLY DETECTING DDOS ATTACKS BASED ON M/G/R PS QUEUE
A MECHANISM FOR EARLY DETECTING DDOS ATTACKS BASED ON M/G/R PS QUEUEIJNSA Journal
 
A MECHANISM FOR EARLY DETECTING DDOS ATTACKS BASED ON M/G/R PS QUEUE
A MECHANISM FOR EARLY DETECTING DDOS ATTACKS BASED ON M/G/R PS QUEUEA MECHANISM FOR EARLY DETECTING DDOS ATTACKS BASED ON M/G/R PS QUEUE
A MECHANISM FOR EARLY DETECTING DDOS ATTACKS BASED ON M/G/R PS QUEUEIJNSA Journal
 
Detection of application layer ddos attack using hidden semi markov model (20...
Detection of application layer ddos attack using hidden semi markov model (20...Detection of application layer ddos attack using hidden semi markov model (20...
Detection of application layer ddos attack using hidden semi markov model (20...Mumbai Academisc
 
ddo-s attacks in cloud computing issued taxonomy and future direction
ddo-s attacks in cloud computing issued taxonomy and future directionddo-s attacks in cloud computing issued taxonomy and future direction
ddo-s attacks in cloud computing issued taxonomy and future directionmoataz82
 
CREDIT BASED METHODOLOGY TO DETECT AND DISCRIMINATE DDOS ATTACK FROM FLASH CR...
CREDIT BASED METHODOLOGY TO DETECT AND DISCRIMINATE DDOS ATTACK FROM FLASH CR...CREDIT BASED METHODOLOGY TO DETECT AND DISCRIMINATE DDOS ATTACK FROM FLASH CR...
CREDIT BASED METHODOLOGY TO DETECT AND DISCRIMINATE DDOS ATTACK FROM FLASH CR...IJNSA Journal
 
CREDIT BASED METHODOLOGY TO DETECT AND DISCRIMINATE DDOS ATTACK FROM FLASH CR...
CREDIT BASED METHODOLOGY TO DETECT AND DISCRIMINATE DDOS ATTACK FROM FLASH CR...CREDIT BASED METHODOLOGY TO DETECT AND DISCRIMINATE DDOS ATTACK FROM FLASH CR...
CREDIT BASED METHODOLOGY TO DETECT AND DISCRIMINATE DDOS ATTACK FROM FLASH CR...IJNSA Journal
 

Similar to AAA (20)

Stealthy denial of service strategy in cloud computing
Stealthy denial of service strategy in cloud computingStealthy denial of service strategy in cloud computing
Stealthy denial of service strategy in cloud computing
 
DDOS Attacks-A Stealthy Way of Implementation and Detection
DDOS Attacks-A Stealthy Way of Implementation and DetectionDDOS Attacks-A Stealthy Way of Implementation and Detection
DDOS Attacks-A Stealthy Way of Implementation and Detection
 
A Survey on Stealthy Denial of Service Strategy in Cloud Computing
A Survey on Stealthy Denial of Service Strategy in Cloud ComputingA Survey on Stealthy Denial of Service Strategy in Cloud Computing
A Survey on Stealthy Denial of Service Strategy in Cloud Computing
 
A DENIAL OF SERVICE STRATEGY TO ORCHESTRATE STEALTHY ATTACK PATTERNS IN CLOUD...
A DENIAL OF SERVICE STRATEGY TO ORCHESTRATE STEALTHY ATTACK PATTERNS IN CLOUD...A DENIAL OF SERVICE STRATEGY TO ORCHESTRATE STEALTHY ATTACK PATTERNS IN CLOUD...
A DENIAL OF SERVICE STRATEGY TO ORCHESTRATE STEALTHY ATTACK PATTERNS IN CLOUD...
 
WEB-BASED APPLICATION LAYER DISTRIBUTED DENIAL-OF-SERVICE ATTACKS: A DATA-DRI...
WEB-BASED APPLICATION LAYER DISTRIBUTED DENIAL-OF-SERVICE ATTACKS: A DATA-DRI...WEB-BASED APPLICATION LAYER DISTRIBUTED DENIAL-OF-SERVICE ATTACKS: A DATA-DRI...
WEB-BASED APPLICATION LAYER DISTRIBUTED DENIAL-OF-SERVICE ATTACKS: A DATA-DRI...
 
IRJET- HHH- A Hyped-up Handling of Hadoop based SAMR-MST for DDOS Attacks...
IRJET-  	  HHH- A Hyped-up Handling of Hadoop based SAMR-MST for DDOS Attacks...IRJET-  	  HHH- A Hyped-up Handling of Hadoop based SAMR-MST for DDOS Attacks...
IRJET- HHH- A Hyped-up Handling of Hadoop based SAMR-MST for DDOS Attacks...
 
D do s_white_paper_june2015
D do s_white_paper_june2015D do s_white_paper_june2015
D do s_white_paper_june2015
 
Encountering distributed denial of service attack utilizing federated softwar...
Encountering distributed denial of service attack utilizing federated softwar...Encountering distributed denial of service attack utilizing federated softwar...
Encountering distributed denial of service attack utilizing federated softwar...
 
MAINTAINING CLOUD PERFORMANCE UNDER DDOS ATTACKS
MAINTAINING CLOUD PERFORMANCE UNDER DDOS ATTACKSMAINTAINING CLOUD PERFORMANCE UNDER DDOS ATTACKS
MAINTAINING CLOUD PERFORMANCE UNDER DDOS ATTACKS
 
IRJET- EEDE- Extenuating EDOS for DDOS and Eluding HTTP Web based Attacks in ...
IRJET- EEDE- Extenuating EDOS for DDOS and Eluding HTTP Web based Attacks in ...IRJET- EEDE- Extenuating EDOS for DDOS and Eluding HTTP Web based Attacks in ...
IRJET- EEDE- Extenuating EDOS for DDOS and Eluding HTTP Web based Attacks in ...
 
Efficient ddos attacks security scheme using asvs
Efficient ddos attacks security scheme using asvsEfficient ddos attacks security scheme using asvs
Efficient ddos attacks security scheme using asvs
 
Efficient ddos attacks security scheme using asvs
Efficient ddos attacks security scheme using asvsEfficient ddos attacks security scheme using asvs
Efficient ddos attacks security scheme using asvs
 
A MECHANISM FOR EARLY DETECTING DDOS ATTACKS BASED ON M/G/R PS QUEUE
A MECHANISM FOR EARLY DETECTING DDOS ATTACKS BASED ON M/G/R PS QUEUEA MECHANISM FOR EARLY DETECTING DDOS ATTACKS BASED ON M/G/R PS QUEUE
A MECHANISM FOR EARLY DETECTING DDOS ATTACKS BASED ON M/G/R PS QUEUE
 
A MECHANISM FOR EARLY DETECTING DDOS ATTACKS BASED ON M/G/R PS QUEUE
A MECHANISM FOR EARLY DETECTING DDOS ATTACKS BASED ON M/G/R PS QUEUEA MECHANISM FOR EARLY DETECTING DDOS ATTACKS BASED ON M/G/R PS QUEUE
A MECHANISM FOR EARLY DETECTING DDOS ATTACKS BASED ON M/G/R PS QUEUE
 
A MECHANISM FOR EARLY DETECTING DDOS ATTACKS BASED ON M/G/R PS QUEUE
A MECHANISM FOR EARLY DETECTING DDOS ATTACKS BASED ON M/G/R PS QUEUEA MECHANISM FOR EARLY DETECTING DDOS ATTACKS BASED ON M/G/R PS QUEUE
A MECHANISM FOR EARLY DETECTING DDOS ATTACKS BASED ON M/G/R PS QUEUE
 
Detection of application layer ddos attack using hidden semi markov model (20...
Detection of application layer ddos attack using hidden semi markov model (20...Detection of application layer ddos attack using hidden semi markov model (20...
Detection of application layer ddos attack using hidden semi markov model (20...
 
ddo-s attacks in cloud computing issued taxonomy and future direction
ddo-s attacks in cloud computing issued taxonomy and future directionddo-s attacks in cloud computing issued taxonomy and future direction
ddo-s attacks in cloud computing issued taxonomy and future direction
 
CREDIT BASED METHODOLOGY TO DETECT AND DISCRIMINATE DDOS ATTACK FROM FLASH CR...
CREDIT BASED METHODOLOGY TO DETECT AND DISCRIMINATE DDOS ATTACK FROM FLASH CR...CREDIT BASED METHODOLOGY TO DETECT AND DISCRIMINATE DDOS ATTACK FROM FLASH CR...
CREDIT BASED METHODOLOGY TO DETECT AND DISCRIMINATE DDOS ATTACK FROM FLASH CR...
 
CREDIT BASED METHODOLOGY TO DETECT AND DISCRIMINATE DDOS ATTACK FROM FLASH CR...
CREDIT BASED METHODOLOGY TO DETECT AND DISCRIMINATE DDOS ATTACK FROM FLASH CR...CREDIT BASED METHODOLOGY TO DETECT AND DISCRIMINATE DDOS ATTACK FROM FLASH CR...
CREDIT BASED METHODOLOGY TO DETECT AND DISCRIMINATE DDOS ATTACK FROM FLASH CR...
 
K017135461
K017135461K017135461
K017135461
 

AAA

  • 1. Stealthy Denial of Service Strategy in Cloud Computing ABSTRACT: The success of the cloud computing paradigm is due to its on-demand, self-service, and pay-by-use nature. According to this paradigm, the effects of Denial of Service (DoS) attacks involve not only the quality of the delivered service, but also the service maintenance costs in terms of resource consumption. Specifically, the longer the detection delay is, the higher the costs to be incurred. Therefore, a particular attention has to be paid for stealthy DoS attacks. They aim at minimizing their visibility, and at the same time, they can be as harmful as the brute-force attacks. They are sophisticated attacks tailored to leverage the worst-case performance of the target system through specific periodic, pulsing, and low-rate traffic patterns. In this paper, we propose a strategy to orchestrate stealthy attack patterns, which exhibit a slowly-increasing-intensity trend designed to inflict the maximumfinancial cost to the cloud customer, while respecting the job size and the service arrival rate imposed by the detection mechanisms. We describe both how to apply the proposed strategy, and its effects on the target systemdeployedinthe cloud EXISTING SYSTEM: Sophisticated DDoS attacks are defined as that category of attacks, which are tailored to hurt a specific weak point in the target system design, in order to conduct denial of service or just to significantly degrade the performance. The term stealthy has been used to identify sophisticated attacks that are specifically designed to keep the malicious behaviors virtually invisible to the detection mechanisms. These attacks can be significantly harder to detect compared with more traditional brute-force and floodingstyle attacks. The methods of launching sophisticated attacks can be categorized into two classes: job-content-based and jobsarrival pattern-based. In recent years, variants of DoS attacks that use low-rate traffic have been proposed, including Shrew attacks (LDoS), Reduction of Quality attacks (RoQ), and Low-Rate DoS attacks against application servers (LoRDAS).
  • 2. DISADVANTAGES OF EXISTINGSYSTEM: Due to its high similarity to legitimate network traffic and much lower launching overhead than classic DDoS attack, this new assault type cannot be efficiently detected or prevented by existing network-basedsolutions. They assume the target server has a finite service queue, where the incoming service requests are temporarily stored to be served by the corresponding application process or thread. The attack takes advantage of the capacity to forecast the time at which the responses to incoming requests for a given service occur. This capability is used to schedule an intelligent pattern in such a way that the attacked server becomes busy the most time in processing of the malicious requests instead of those from legitimate users. None of the works proposed in the literature focus on stealthy attacks against application that run in the cloudenvironment. PROPOSEDSYSTEM: This paper presents a sophisticated strategy to orchestrate stealthy attack patterns against applications running in the cloud. Instead of aiming at making the service unavailable, the proposed strategy aims at exploiting the cloud flexibility, forcing the application to consume more resources than needed, affectingthe cloudcustomermore onfinancial aspectsthanonthe service availability. The attack pattern is orchestrated in order to evade, or however, greatly delay the techniques proposed in the literature to detect low-rate attacks. It does not exhibit a periodic waveform typical of low-rate exhaustingattacks.Incontrastwiththem, itisan iterative andincremental process. In particular, the attack potency (in terms of service requests rate and concurrent attack sources) is slowly enhanced by a patient attacker, in order to inflict significant financial losses, even if the attack pattern is performed in accordance to the maximum job size and arrival rate of the service requests allowedinthe system. Using a simplified model empirically designed, we derive an expression for gradually increasing the potency of the attack, as a function of the reached service degradation (without knowing in advance the target system capability). We show that the features offered by the cloud provider, to ensure the SLA negotiated with the customer (including the load balancing and auto-scaling mechanisms), can be maliciously exploited by the proposed stealthy attack, which slowly exhausts the resources provided by the cloudprovider, andincreasesthe costsincurredbythe customer. The proposed attack strategy, namely Slowly-Increasing-Polymorphic DDoS Attack Strategy (SIPDAS) can be applied to several kind of attacks, that leverage known application vulnerabilities, in order to degrade the service providedbythe targetapplicationserverrunninginthe cloud.
  • 3. ADVANTAGES OF PROPOSEDSYSTEM: We show that the proposed slowly-increasing polymorphic behavior induces enough overload on the target system (to cause a significant financial losses), and evades, or however, delays greatly the detectionmethods. Even if the victim detects the attack, the attack process can be re-initiate by exploiting a different application vulnerability (polymorphism in the form), or a different timing (polymorphism over time), in orderto inflictaprolongedconsumptionof resources. SYSTEM REQUIREMENTS: HARDWAREREQUIREMENTS:  System : PentiumIV 2.4 GHz or More  Hard Disk : 40 GB  RAM : 2 GB SOFTWAREREQUIREMENTS:  OperatingSystem : WindowsXP  Language : Java  Front End : JSP  Data Base : My SQL  Server : Apache Tomcat REFERENCE: Massimo Ficco and Massimiliano Rak, “Stealthy Denial of Service Strategy in Cloud Computing”, IEEE TRANSACTIONS ON CLOUD COMPUTING, VOL. 3, NO. 1, JANUARY-MARCH 2015.