Title | Detecting and Preventing IP Spoofing and Local Area Network Denial (LAND) Attack for Cloud Computing with the Modification of Hop Count Filtering (HCF) Mechanism |
Publication Type | Conference Paper |
Year of Publication | 2019 |
Authors | Sultana, Subrina, Nasrin, Sumaiya, Lipi, Farhana Kabir, Hossain, Md Afzal, Sultana, Zinia, Jannat, Fatima |
Conference Name | 2019 International Conference on Computer, Communication, Chemical, Materials and Electronic Engineering (IC4ME2) |
Keywords | cloud computing, CloudSim 3.0 toolkit, composability, computer network security, DDoS Attack Prevention, distributed denial of service attack, Distributed Denial of Service(DDoS), Flooding Attack, HCF mechanism, Hop Count Filtering (HCF), hop count filtering mechanism, Human Behavior, Internet, Internet protocol, IP, IP networks, IP spoofing, IP spoofing detection, IP spoofing prevention, IP2HC table, LAND attack, LAND based DDoS attack, local area network denial attack, Local area networks, malformed packets, memory exhaustion minimization, Metrics, pubcrawl, Resiliency, smurf attack, Source port, spoofed packets, SYN flood attack, teardrop attack, TTL, victim server, virtual cloud environment |
Abstract | In today's world the number of consumers of cloud computing is increasing day by day. So, security is a big concern for cloud computing environment to keep user's data safe and secure. Among different types of attacks in cloud one of the harmful and frequently occurred attack is Distributed Denial of Service (DDoS) attack. DDoS is one type of flooding attack which is initiated by sending a large number of invalid packets to limit the services of the victim server. As a result, server can not serve the legitimate requests. DDoS attack can be done by a lot of strategies like malformed packets, IP spoofing, smurf attack, teardrop attack, syn flood attack, local area network denial (LAND) attack etc. This paper focuses on IP spoofing and LAND based DDoS attack. The objective of this paper is to propose an algorithm to detect and prevent IP spoofing and LAND attack. To achieve this objective a new approach is proposed combining two existing solutions of DDoS attack caused by IP spoofing and ill-formed packets. The proposed approach will provide a transparent solution, filter out the spoofed packets and minimize memory exhaustion through minimizing the number of insertions and updates required in the datatable. Finally, the approach is implemented and simulated using CloudSim 3.0 toolkit (a virtual cloud environment) followed by result analysis and comparison with existing algorithms. |
DOI | 10.1109/IC4ME247184.2019.9036507 |
Citation Key | sultana_detecting_2019 |