SlideShare a Scribd company logo
1 of 11
Cloud
Computing
Basic Definition
• When we store your photos online instead of on your home
computer, or use webmail or a social networking site, we are
using a “cloud computing” service. If we are an organization,
and you want to use, for example, an online invoicing service
instead of updating the in-house one we have been using for
many years, that online invoicing service is a “cloud
computing” service. Basically it is on network sharing of
resources.
Deployment of cloud services:
• Generally speaking, services provided by a public cloud are
offered over the Internet and are owned and operated by a
cloud provider. Some examples include services aimed at the
general public, such as online photo storage services, e-mail
services, or social networking sites. However, services for
enterprises can also be offered in a public cloud.
• In a private cloud, the cloud infrastructure is operated solely
for a specific organization, and is managed by the organization
or a third party.
• In a community cloud, the service is shared by several
organizations and made available only to those groups. The
infrastructure may be owned and operated by the
organizations or by a cloud service provider
Service Models
• Infrastructure as a Service
• Platform as a Service
• Software as a Service
Private Cloud Implementation
• We first need to understand the architecture:
DDOS
Distributed Denial Of Service
Attack
Distributed Denial of Service
Attack
• In computing, a denial-of-service (DoS) or distributed denial-
of-service (DDoS) attack is an attempt to make a machine or
network resource unavailable to its intended users.
• Although the means to carry out, the motives for, and targets
of a DoS attack vary, it generally consists of efforts to
temporarily or indefinitely interrupt or suspend services of
a host connected to the Internet.
• As clarification, distributed denial-of-service attacks are sent
by two or more persons, or bots, and denial-of-service attacks
are sent by one person or system. As of 2014, the frequency
of recognized DDoS attacks had reached an average rate of 28
per hour.
Algorithm Used
•Traffic Analyzer.
•Entropy Profiling.
•Shannon Weiner Index.
Traffic Analyzer
Input: Incoming Packets
• Output: Network traffic condition
• BEGIN
• FOR each time period, t
• Packets are logged at traffic analyzer for traffic rate
computation
• IF (Traffic Rate <= Link capacity)
• Alert “Normal (obtuse) Traffic condition”
• ELSE
• Alert “Abnormal (Acute) Traffic condition”
• Forward Packets to Level 2.
• END IF
• END FOR
• END
Entropy Profiling
• Input: Buffered packets of traffic analyzer, TRIAL phase
• Output: Cause of overload
• BEGIN
• Buffered packets at traffic analyzer are logged to
• MONITOR phase
• Difference between the phases yields Kullback Leibler
• SET Threshold ()
IF (HD <= Threshold)
• Alert “overload is a cause of legitimate (Flash crowd)”
• ELSE
• Alert “overload is a cause of attack sources (DDoS)”
• END IF
• END
•
Shannon Weiner Index
• Shannon Weiner Index is used for detecting level of DDoS.
• IF (DDoS)
• Calculate Index
• Print Level of DDoS
• END IF
• END

More Related Content

What's hot

Peer to peer data management
Peer to peer data managementPeer to peer data management
Peer to peer data managementJunaid Lodhi
 
Wide Area Networks - Jamie Reece Moore
Wide Area Networks - Jamie Reece MooreWide Area Networks - Jamie Reece Moore
Wide Area Networks - Jamie Reece MooreJamie Moore
 
A Complete Guide Cloud Computing
A Complete Guide Cloud ComputingA Complete Guide Cloud Computing
A Complete Guide Cloud ComputingSripati Mahapatra
 
Internet Architecture and Design Philosophy
Internet Architecture and Design PhilosophyInternet Architecture and Design Philosophy
Internet Architecture and Design PhilosophyDilum Bandara
 
Topic 2.2 network protocol
Topic 2.2 network protocolTopic 2.2 network protocol
Topic 2.2 network protocolAtika Zaimi
 
Network Trends
Network TrendsNetwork Trends
Network TrendsArun ACE
 
Lecture notes -001
Lecture notes -001Lecture notes -001
Lecture notes -001Eric Rotich
 
Topic 2.4 network services
Topic 2.4 network servicesTopic 2.4 network services
Topic 2.4 network servicesAtika Zaimi
 
load balancing in public cloud ppt
load balancing in public cloud pptload balancing in public cloud ppt
load balancing in public cloud pptKrishna Kumar
 

What's hot (17)

SOFTWARE DEFINED NETWORKING
SOFTWARE DEFINED NETWORKINGSOFTWARE DEFINED NETWORKING
SOFTWARE DEFINED NETWORKING
 
Introduction to Computer Networks.
Introduction to Computer Networks.Introduction to Computer Networks.
Introduction to Computer Networks.
 
Peer to peer data management
Peer to peer data managementPeer to peer data management
Peer to peer data management
 
Wide Area Networks - Jamie Reece Moore
Wide Area Networks - Jamie Reece MooreWide Area Networks - Jamie Reece Moore
Wide Area Networks - Jamie Reece Moore
 
Peer to peer system
Peer to peer systemPeer to peer system
Peer to peer system
 
A Complete Guide Cloud Computing
A Complete Guide Cloud ComputingA Complete Guide Cloud Computing
A Complete Guide Cloud Computing
 
Computer networks
Computer networksComputer networks
Computer networks
 
Peer to peer
Peer to peerPeer to peer
Peer to peer
 
Internet Architecture and Design Philosophy
Internet Architecture and Design PhilosophyInternet Architecture and Design Philosophy
Internet Architecture and Design Philosophy
 
Cloud computing protocol
Cloud computing protocolCloud computing protocol
Cloud computing protocol
 
Topic 2.2 network protocol
Topic 2.2 network protocolTopic 2.2 network protocol
Topic 2.2 network protocol
 
Network Trends
Network TrendsNetwork Trends
Network Trends
 
Understanding local area networking
Understanding local area networkingUnderstanding local area networking
Understanding local area networking
 
computer network 2
computer network 2computer network 2
computer network 2
 
Lecture notes -001
Lecture notes -001Lecture notes -001
Lecture notes -001
 
Topic 2.4 network services
Topic 2.4 network servicesTopic 2.4 network services
Topic 2.4 network services
 
load balancing in public cloud ppt
load balancing in public cloud pptload balancing in public cloud ppt
load balancing in public cloud ppt
 

Similar to Cloud computing

Unleash the Hammer on Denial-of-Service: Conquer DDos Attacks!
Unleash the Hammer on Denial-of-Service: Conquer DDos Attacks!Unleash the Hammer on Denial-of-Service: Conquer DDos Attacks!
Unleash the Hammer on Denial-of-Service: Conquer DDos Attacks!PriyadharshiniHemaku
 
Network security chapter 6 and 7 internet architecture
Network security chapter  6 and 7 internet   architectureNetwork security chapter  6 and 7 internet   architecture
Network security chapter 6 and 7 internet architectureMuhammad ismail Shah
 
02 Models of Distribution Systems.pdf
02 Models of Distribution Systems.pdf02 Models of Distribution Systems.pdf
02 Models of Distribution Systems.pdfRobeliaJoyVillaruz
 
cloud computing-Introduction
cloud computing-Introductioncloud computing-Introduction
cloud computing-IntroductionSuchithra Suriya
 
ICT 101 LECTURE 2 - BASICS OF COMPUTER NETWORKS.pptx
ICT 101 LECTURE 2 - BASICS OF COMPUTER NETWORKS.pptxICT 101 LECTURE 2 - BASICS OF COMPUTER NETWORKS.pptx
ICT 101 LECTURE 2 - BASICS OF COMPUTER NETWORKS.pptxmbombongafu
 
Contents Localization Initiatives to get better User Experience
Contents Localization Initiatives to get better User ExperienceContents Localization Initiatives to get better User Experience
Contents Localization Initiatives to get better User ExperienceBangladesh Network Operators Group
 
Chapeter 2 introduction to cloud computing
Chapeter 2   introduction to cloud computingChapeter 2   introduction to cloud computing
Chapeter 2 introduction to cloud computingeShikshak
 
network fundamentals
network fundamentalsnetwork fundamentals
network fundamentalsSithu PM
 
CCS335 - Cloud architecture model and infrastructure
CCS335 - Cloud architecture model and infrastructureCCS335 - Cloud architecture model and infrastructure
CCS335 - Cloud architecture model and infrastructureNiviV4
 
CNE CHP1.pdf
CNE CHP1.pdfCNE CHP1.pdf
CNE CHP1.pdfNehaam3
 
Accessing network needs
Accessing network needsAccessing network needs
Accessing network needsrahuldaredia21
 
An Introduction to Cloud Computing and Lates Developments.ppt
An Introduction to Cloud Computing and Lates Developments.pptAn Introduction to Cloud Computing and Lates Developments.ppt
An Introduction to Cloud Computing and Lates Developments.pptHarshalUbale2
 
Unit 5 - Designing Internet Systems and Servers - IT
Unit 5 - Designing Internet Systems and Servers - ITUnit 5 - Designing Internet Systems and Servers - IT
Unit 5 - Designing Internet Systems and Servers - ITDeepraj Bhujel
 

Similar to Cloud computing (20)

COMPUTER NW2 (1).pptx
COMPUTER NW2 (1).pptxCOMPUTER NW2 (1).pptx
COMPUTER NW2 (1).pptx
 
Unleash the Hammer on Denial-of-Service: Conquer DDos Attacks!
Unleash the Hammer on Denial-of-Service: Conquer DDos Attacks!Unleash the Hammer on Denial-of-Service: Conquer DDos Attacks!
Unleash the Hammer on Denial-of-Service: Conquer DDos Attacks!
 
Network security chapter 6 and 7 internet architecture
Network security chapter  6 and 7 internet   architectureNetwork security chapter  6 and 7 internet   architecture
Network security chapter 6 and 7 internet architecture
 
02 Models of Distribution Systems.pdf
02 Models of Distribution Systems.pdf02 Models of Distribution Systems.pdf
02 Models of Distribution Systems.pdf
 
cloud computing
cloud computingcloud computing
cloud computing
 
cloud computing-Introduction
cloud computing-Introductioncloud computing-Introduction
cloud computing-Introduction
 
cloud computin
cloud computincloud computin
cloud computin
 
Sapthagiricloud
SapthagiricloudSapthagiricloud
Sapthagiricloud
 
Cloud Computing.pptx
Cloud Computing.pptxCloud Computing.pptx
Cloud Computing.pptx
 
ICT 101 LECTURE 2 - BASICS OF COMPUTER NETWORKS.pptx
ICT 101 LECTURE 2 - BASICS OF COMPUTER NETWORKS.pptxICT 101 LECTURE 2 - BASICS OF COMPUTER NETWORKS.pptx
ICT 101 LECTURE 2 - BASICS OF COMPUTER NETWORKS.pptx
 
Contents Localization Initiatives to get better User Experience
Contents Localization Initiatives to get better User ExperienceContents Localization Initiatives to get better User Experience
Contents Localization Initiatives to get better User Experience
 
Chapeter 2 introduction to cloud computing
Chapeter 2   introduction to cloud computingChapeter 2   introduction to cloud computing
Chapeter 2 introduction to cloud computing
 
network fundamentals
network fundamentalsnetwork fundamentals
network fundamentals
 
CCS335 - Cloud architecture model and infrastructure
CCS335 - Cloud architecture model and infrastructureCCS335 - Cloud architecture model and infrastructure
CCS335 - Cloud architecture model and infrastructure
 
Networking
Networking Networking
Networking
 
CNE CHP1.pdf
CNE CHP1.pdfCNE CHP1.pdf
CNE CHP1.pdf
 
Accessing network needs
Accessing network needsAccessing network needs
Accessing network needs
 
An Introduction to Cloud Computing and Lates Developments.ppt
An Introduction to Cloud Computing and Lates Developments.pptAn Introduction to Cloud Computing and Lates Developments.ppt
An Introduction to Cloud Computing and Lates Developments.ppt
 
Unit 5 - Designing Internet Systems and Servers - IT
Unit 5 - Designing Internet Systems and Servers - ITUnit 5 - Designing Internet Systems and Servers - IT
Unit 5 - Designing Internet Systems and Servers - IT
 
UNIT 1.pdf
UNIT 1.pdfUNIT 1.pdf
UNIT 1.pdf
 

Cloud computing

  • 2. Basic Definition • When we store your photos online instead of on your home computer, or use webmail or a social networking site, we are using a “cloud computing” service. If we are an organization, and you want to use, for example, an online invoicing service instead of updating the in-house one we have been using for many years, that online invoicing service is a “cloud computing” service. Basically it is on network sharing of resources.
  • 3. Deployment of cloud services: • Generally speaking, services provided by a public cloud are offered over the Internet and are owned and operated by a cloud provider. Some examples include services aimed at the general public, such as online photo storage services, e-mail services, or social networking sites. However, services for enterprises can also be offered in a public cloud. • In a private cloud, the cloud infrastructure is operated solely for a specific organization, and is managed by the organization or a third party. • In a community cloud, the service is shared by several organizations and made available only to those groups. The infrastructure may be owned and operated by the organizations or by a cloud service provider
  • 4. Service Models • Infrastructure as a Service • Platform as a Service • Software as a Service
  • 5. Private Cloud Implementation • We first need to understand the architecture:
  • 6. DDOS Distributed Denial Of Service Attack
  • 7. Distributed Denial of Service Attack • In computing, a denial-of-service (DoS) or distributed denial- of-service (DDoS) attack is an attempt to make a machine or network resource unavailable to its intended users. • Although the means to carry out, the motives for, and targets of a DoS attack vary, it generally consists of efforts to temporarily or indefinitely interrupt or suspend services of a host connected to the Internet. • As clarification, distributed denial-of-service attacks are sent by two or more persons, or bots, and denial-of-service attacks are sent by one person or system. As of 2014, the frequency of recognized DDoS attacks had reached an average rate of 28 per hour.
  • 8. Algorithm Used •Traffic Analyzer. •Entropy Profiling. •Shannon Weiner Index.
  • 9. Traffic Analyzer Input: Incoming Packets • Output: Network traffic condition • BEGIN • FOR each time period, t • Packets are logged at traffic analyzer for traffic rate computation • IF (Traffic Rate <= Link capacity) • Alert “Normal (obtuse) Traffic condition” • ELSE • Alert “Abnormal (Acute) Traffic condition” • Forward Packets to Level 2. • END IF • END FOR • END
  • 10. Entropy Profiling • Input: Buffered packets of traffic analyzer, TRIAL phase • Output: Cause of overload • BEGIN • Buffered packets at traffic analyzer are logged to • MONITOR phase • Difference between the phases yields Kullback Leibler • SET Threshold () IF (HD <= Threshold) • Alert “overload is a cause of legitimate (Flash crowd)” • ELSE • Alert “overload is a cause of attack sources (DDoS)” • END IF • END •
  • 11. Shannon Weiner Index • Shannon Weiner Index is used for detecting level of DDoS. • IF (DDoS) • Calculate Index • Print Level of DDoS • END IF • END