Detecting and Isolating Zombie Attacks in Cloud Computing Environments

Verified

Added on  2023/01/11

|43
|13807
|95
Thesis and Dissertation
AI Summary
This dissertation explores the critical issue of detecting and isolating zombie attacks within cloud computing environments. The study begins by highlighting the importance of cloud computing and its vulnerabilities, particularly the threat of Distributed Denial of Service (DDoS) attacks launched by zombie networks. The research delves into the mechanisms of these attacks, detailing how malicious nodes compromise network channels to target specific machines, disrupting services and impacting performance. The report emphasizes the use of lambda functions as a key security element, acting as pointers to identify and mitigate external threats through server-client communication and mirror traffic analysis. The methodology includes sensing network channels, measuring external actions, and analyzing the impact of attacks, with a focus on preventing data modification and replacement. The practical aspects of the research involve implementing and testing these techniques using atom software to simulate communication between client and server. The dissertation provides a comprehensive overview of cloud security challenges and presents innovative methods to enhance data protection and maintain system integrity against sophisticated cyber threats.
Document Page
Programme: MSc Computer Science
Title of Dissertation: Detecting and Isolating Zombie Attack in Cloud Computing
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
ACKNOWLEDGEMENT
I.
Then I would like to thank my parents and friends who have helped me with their
valuable suggestions and guidance which has been helpful in various phases of the
completion of the project
Document Page
Abstract
Cloud computing is used in day to day life to store the data at the server end which should be
accessed as when the needed is done by the client-side. This must be included by the many
set of big market companies in storing data like Google, Facebook, and Amazon, etc. In
which they find more security to data storage power in comparison with the traditional set of
the mechanism as well as required the low set of human effort and the cost include in the
management of data after stored at once is also very low and compatible with the user
efficiency. It should have many sets of pros over the other technology in storing the data at
the server. It provides the set of flexibility to its user to store the set of multiple data over the
large type of format in it. As it praises with the pros included in it also suffer from the large
setbacks which should be performed by the third-party or outsider on to the lane of the
network which generates the major issues in data access technique. The attack done by the
attacker should result in degrading the system performance to a large extent which cannot be
set up by the client on the other ends. This should be done by the various set of sources
present outside but in the research report, it mainly focuses on the major set of Zombies
which included in the DDOS attack. It should sense the network channel by the help of the
malicious set of nodes included in it and then they check the location of correct host machine
then it generates the road map for plan the attack with a key-value form of generating the set
of messages and directly its attack on the targeted machine which should be unaware to the
client which should work under the network. This generates a lot of problems for the client
which should be connected in the network lane. It should be discussed briefly by the set of
practices that should use the lambda function generate in the field of the security act like a
pointer which helps in recognizing the outside bit included in it with the help of the
communication done under the server and GitHub functionality. It should be performed with
the help of mirror traffic by using the large set of the methodology. It should initially sense
the channel by check the outsiders, other than it include the measure the action of an outsider
and then it generates the final result on the base of the previous two actions. It should
completely analyze the other set of attacks which should be included in it the network lane
like password related or the data modification-related which should affect the minor but large
effect the system of communication interface. So, these are the major highlight of the
research report which should be described in it along with practical should be done on the
atom software which handles the communication between client and server.
Document Page
Introduction
This report introduces the importance of cloud computing in today’s world which should
provide far better services as compared to traditional machines. It shows the advantage along
with the functionality which it should provide to the user which uses its service in data
storing like flexibility, scalability and many more. Along with the pro, it also includes the
cons which should be related to the security purpose by the outsider included in it. This also
focuses that it also suffers from the set of the attacker in which the person which steal the
information stored in the cloud and changed it according to their way which can affect the
normal functionality. It also discusses the zombie's attack which should become during the
overflow of the message at the zombie's host in a malicious way. The effect of it includes the
disruption of bandwidth and reduce the resources in its pooling as well as fault tolerance
related problems also generated. Other than it also performs the set of practices in which
client-side, as well as server side communication, should be established by the use of sending
the asynchronous message in it from one end to another and getting the set of confirmation in
from the server end. It should be easy to set up in compact with the GitHub and file push into
it. After that it includes the detection of the action of the outsider in the data modify as well
as data replacement with the use of zombie machine which works in the parent-child form
help in fetch the important data as when it should be launch from the source machine but
lambda help in detecting the movement of this unwanted bits into the network which can be
detected from the set of files. The appropriate process in detecting the attack from the outside
along with the output which should be generated at each set of a task in data gathering to data
analysis every action should be clearly shown into the report. After the lambda function by
the user traffic, it senses the load into the network lane by the use of the three methods which
filter the communication data in a good form. So, in this overall, the second part of the cloud
computing should discuss which should become after the good part of the cloud computing
which is very necessary to analyze because this technique should be work under the back of
multiple organization which is not a small task and it contains a lot of data related to the
customer which should access this set of services. It should properly since even in case it
works better because the attack comes at any point of time from any place. It does not contain
any shape as well as the size and free from the source of point as well as destination machine.
In which it attacks the continuous on the hosted machine under the threshold of overflowing
and at last machine does not respond properly which should be the measure issue in this
Zombies attack.
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Table of Contents
Document Page
Abstract
Introduction..................................................................................................................................
List of Figures..............................................................................................................................
List of Table.................................................................................................................................
Project Summary..........................................................................................................................
Research Area..............................................................................................................................
Literature Review.........................................................................................................................
Practical Element Output.............................................................................................................
Document Page
Project Summary
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Cloud computing is developed in a better environment by helping in providing the various
services to us such as storage related, server related, distributed network type services and
many more essential services that are necessary for day to day work. Other than it helps the
user which is attached to it by providing the demand base services directly to the central
database which develops in the different-different structures. In the field of the security of the
data store in the cloud multiple algorithms, as well as techniques, must be enabled on the data
stored on to the server by the use of such as IDB, USB base encrypt and decrypt methods.
Although, these are not sufficient to protect the information from the outsiders and they fail
after a certain stage. They also not safe to protect the huge form of data found in multiple
formats like pdf, doc as well as images, audio, video, etc. So, in this project, the main attacks
are usually done by use of the third set of the party in breach of the border and directly
modify or steal the data by the use of the DOS method or MIM. These change the policy as
well as rules or regulation set up by the higher authority which harm the data storage
terminology in the server set. In this, mainly DOS attack which spelled as a denial of services
generated by the large of corrupted information which flows in the lane of the network. In
which the large Zombies based machines or also known as Zombie host which help generate
a large number of inevitable messages that impactful blocked the linkage way between the
client and server. In which the high amount of the data packets are forward between the
zombie's hosts to the target machine which results in the block the normal functionality of the
machine and the data comes from the server are also corrupted form. It distracts the
information in reading the output data format which impacts a lot of the users who are using
the cloud service in multiple organizations. These are very hard determined and they do not
generate any sign to come in the communication lane. So, some of the methods such as
signature-based which detect the database on the base of the key which bases on unique
attributes in a database that handles the information stored in it.
Other than, in this anomaly is also a good approach that predicts the data of the corrupted
packet on the base of the dirty bit which should be attached with either one or zero during the
data packet sent from the Zombie host server. It maintains somehow performance of the
system which should be absent in another method. Both of them work under the linear data
and from random data set unsettle data method used which work in the form of root and node,
as well as traverse method, is used to detect the missing values in the pair of datasets which
proves efficient in its situation.
Document Page
Research Area
The cloud computing which helps in providing the pro in termed of storing the essential data
as well as information on the server by use of centralized server concept. It should be used
due to enrich in the multiple services like the set of scalability, flexibility as well as many
more. The main motive to protect from the set of large attacks done by the outsider. In which
it some set of the information to work on that and then find whether it is infected from the
third-party attacks or not. So, it should be collected from the heterogeneous source of the
information by use of the multiple services in the online as well as offline mode. In which the
resources which collected it from the online mode by the use of the good skill set of company
pdf, journals as well as e-books whether in the offline mode it collect the information by
conducting the door to door survey of collect the employee information which must be stored
and then proper analyzed on the base of collected data. The main set of research included in
the big organization data like Amazon, Flipkart as well as Facebook where the millions of the
customer interact daily to access they need as well as visit their profile that contains the huge
amount of data must be needed to analyzed and prove the better research area to check the
data consistency as well as integrity in it. It should help in pre idea about the data secure from
the outsiders and protect it from the huge loss that must be a big game-changer in detecting
the set of errors in it. It should well to establish good steps in preventing the data before
losing the valuable data of the organization. In most of the case the data loss which required a
large set of research and provides the valuable set of the solution in those specific fields like
the education, banking as well as the technology sector. The large set of data should be
infected from these attack on the regular bases like the money transfer application in which
the information related to the bank account should breaches that affect the lots of customer
bank account and costly to secure the money from the attacker. So, this field required a set of
research to maintain the data secure and consistent. These all are should be the main
important area to research and find the appropriate set of results in it with the set of properly
analyzed the data values included in it.
Document Page
Literature Review
According to Kumar et al. (2019), it reflects that the cloud computing provides the
surrounding phenomena based on requester choice and also enjoy a lot of services included
by it like storage in the form the DFS and NFS in linear or non-linear based, server generate
by it, an application which is used in access the cloud-related information. It mainly based on
the concept of a single server in which all the facts and figures should be stored on the central
mode which can be accessed by the multiple clients which should be linked with the server. It
should be not true that the server and service provided by it free from attackers. It should be
maintained by the cloud service provider which has the knowledge of the multiple
techniques, the method as well as the process. It should ensure that data come from the server
is free from attacks. But in some cases, it also capable to protect it from the set of attacks.
The most common attack which should be done by the use of cloud service namely denial of
services (DOS) it can occur to a large set of customer access the same service at the same
point of time so data in loss condition may occur in the way of server. Another type of attack
which focuses here, in a side-channel base attack in which the same type of machine
capability should be situated near to cloud server which accesses all the detail of server and
make the condition of data loss on to the server. The attack which should be more famous by
its nature is the man in the middle attack which includes the attacker situated in the middle of
the client as well as the server and leaks all the message packet which shared between them.
In which the modern form of the attack should be developed in cloud computing namely
Zombies attack. In which the one of node end seems like Zombie. So, the programmer which
runs its program not actually known about the system user known as a malicious user. After
that, it uses Zombie to attack the system services which should be activated by the user
command and block the system from the unwanted access of resources in access to the
resource. It should restrict the system to access the normal functionality and also increase the
traffic into the system. Through it can degrade the system performance very rapidly which
generates a huge loss to the system.
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
According to Gaur et al. (2017), in the modern world technology related to the computer
increase day by day which provides a new way to introduce cloud computing in the market
techies. It should have pros with some set of cons as well. The normal network length which
provides by cloud computing is up to 8gbps on a daily bases. But the attack which comes
from the network attack the system services generally named DOS having a very high
capacity which can break the security up to 500gbps in the arena of the network. It should
attack the device mainly in all of the services whether it should be the government or private
base service. It should be an outsider attack in which it hacks the server abruptly and
modifies the services as per needs. It also attacks majorly the base of the service on the
payment which should be referred to as stressors. In which it takes very less amount of time
to attack the system and hack all the things related to which proves the huge loss to the
system economically and directly affects the performance of the country in the global ranking
estimated at the end of each financial year. In this, it also discusses the historic first attack
done by DOS in the year 2014 around Christmas. In which mainly it attack the server of the
game based company namely Microsoft as well as Sony which handles the gaming server
nearly all about the world. In which it breaches all the information of the player with their
profile and hangs up the server nearly for one year. After another DOS attack should be
performed which hack the Amazon server by restricting its site to reach for each of the
customer connected with it. It should displace all the cyber people who included in it to
research it and find the solution to get free from these dangerous attacks. It should mainly
attack those services which majorly based on the web services related activity like getting or
post. Other than this it uses some set of protocols like SMTP or SNMP which use to send the
information from one user to another by sharing the environment of the same set of servers in
between them have a major chance to get the effect from these types of attack. It also mainly
impossible to handle in most cases.
Document Page
According to Amara et al. (2017), which disclose about cloud computing along with the
attacks involved in it. It also has some models like the private cloud-based means the server
which consumes in the organization base on off-premises. They are more secure as compare
to the public as well as easier to access the data reside on the server because the load on data
should be very less and the virus or malware associate with the data communication also
below. Other than it includes the hybrid cloud which should be more flexible as compared to
another type of cloud-based infrastructure in sharing of the high level of resources in between
them. Additionally, it also develops an interesting cloud structure namely the community
based which should purely base on the individual person which comes together to share the
common idea between them to largely access the data and application which should reside on
the common server as well as access through the client request. Along with it should suggest
the various set of services included in it such as SaaS-based which should be deployed on the
server end and simultaneously its access on the client-side by neglecting the attacks on the
server. It should take care of some set of methods that should be important while data
communication like XML or SSL layer which provides security as well as data integrity in
the network. PaaS another set of method which should mainly distribute the various platform
need to run the application based service like Apache, MySQL, and PHP. It should be used
by the various multiple organization which deals with high customer end to end services like
Amazon, Flipkart, and Urban clap. Other than that it used IaaS which provides the basic
services of cloud-like storage and power as well as on-demand base service. It should be the
more usable layer in the Software Infrastructure related frameworks which frequently used in
cloud computing. It should also the hardware layer which handles the tolerance related
problem as well as traffic and cooling related server in maintaining the resources of the
system. Along with that it also describes some set of security suggest by an international
standard like integrity, authentication, and authenticity. With these, it defines the attack faced
by the modern cloud computing namely Zombies attack in which the victim infect machine
should be overflow by the request received by another virtual machine in the same set of the
network which should be produced in the very low span of time suffered from the DOS
attack.
chevron_up_icon
1 out of 43
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]