tailieunhanh - Studying the efficiency of using private certificate to solve the peer-to-peer distributed denial of service attack on cloud computing

This paper presents a treatise about cloud computing security risk and attack, we explained the definition of cloud computing and the P2P network in order to understand the infrastructure and how Denial of Service attacks consumes and confuses the network infrastructure, the two type of Denial of Service attack DoS and DDoS aimed to flood the network storage and to exhaust the network resource. | International Journal of Computer Networks and Communications Security VOL. 3, NO. 10, OCTOBER 2015, 403–411 Available online at: E-ISSN 2308-9830 (Online) / ISSN 2410-0595 (Print) Studying the Efficiency of using Private Certificate to Solve the Peer-to-Peer Distributed Denial of Service Attack on Cloud Computing Nazar Kamal Khorsheed1, Omeed Kamal Khoursheed2, Tawfeek Hamza3 and Dr. Magdi zakaria Rashad4 1, 2 Koya university, Dep of S\W engineering, 3, 4AlMansoura University, Computer Science E-mail: 1onizarkhorshd@, 2omeed_khorsheed@, 3taher_hamza@, 4 magdi_z2011@, ABSTRACT This paper presents a treatise about cloud computing security risk and attack, we explained the definition of cloud computing and the P2P network in order to understand the infrastructure and how Denial of Service attacks consumes and confuses the network infrastructure, the two type of Denial of Service attack DoS and DDoS aimed to flood the network storage and to exhaust the network resource. Among the available solutions is SSL certificates but we found It's not enough to solve and to prevent DDoS/DoS attacks, that due to the existence of SSL handshake attack. The ideal solution for Denial of Service attacks is by using private certificate protected from third party or to use multi-type and multi-level of private certificate keys. For strengthening our work we took two study cases Prolexic cloud and Parse cloud. Keywords: NIST, Self-Provisioning, DoS, Distributed, DDos, Fully-Qualified Domain Name, Certificates, Authorities Domain, Wildcard, SAN, UCC, Prolexic , Handshake. 1 INTRODUCTION Denial of Service (DoS) attack has overwhelmed the cloud computing environment, from the beginning of the internet and Denial of service attack cloud servers, database servers and even P2P network, the attackers aim to dilapidate the network resources by flooding the routers and servers with malicious requests until the target server

crossorigin="anonymous">
Đã phát hiện trình chặn quảng cáo AdBlock
Trang web này phụ thuộc vào doanh thu từ số lần hiển thị quảng cáo để tồn tại. Vui lòng tắt trình chặn quảng cáo của bạn hoặc tạm dừng tính năng chặn quảng cáo cho trang web này.