Analyzing the Secure Virtualization schemes and preventions from DDoS flooding Zoombie attacks

Authors

  • Chaturvedi AK Dept. of MCA, Govt. Engineering College, Ajmer, Rajasthan, India
  • Kumar P Dept. of CS, Bhagwant University, Ajmer, Rajasthan, India
  • Sharma K Dept. of CS, Bhagwant University, Ajmer, Rajasthan, India

DOI:

https://doi.org/10.26438/ijcse/v7i7.223229

Keywords:

DDoS, flooding, attack, Cloud, recovery, prevention, secure, virtualization

Abstract

As Cloud computing emerges as a dominant paradigm in distributed systems, it is important to fully understand the underlying technologies that make clouds possible. One technology, and perhaps the most important, is the virtualization. Recently virtualization, through the use of hypervisors, has become widely used and well understood by many. Distributed Denial of Service (DDoS) attacks typically focus high quantity of IP packets at specific network entry elements; usually any form of hardware that operates on a Blacklist pattern is quickly overrun. As in the cloud computing, a large number of tenants or VM clients share the common hardware, DDoS attacks have the potential of having much greater impact than against single tenanted architectures. In this paper, various secure virtualization schemes and preventions from DDoS flooding zombie attacks are analyzed. Security threats are discussed and preventive measures from DDoS attacks and protection solutions are presented so that the companies can take the appropriate action accordingly.

References

[1]. Andrew J. Younge, Robert Henschel, James T. Brown, Gregor von Laszewski, Judy Qiu, Geoffrey C. Fox, “Analysis of Virtualization Technologies for High Performance Computing Environments”, 2011 IEEE 4th International Conference on Cloud Computing, ISSN : 978-0-7695-4460-1/11, pp. 9-16.

[2]. Farzad Sabahi, “Secure Virtualization for Cloud Environment Using Hypervisor-based Technology”, International Journal of Machine Learning and Computing, Vol. 2, No. 1, February 2012, pp. 39-45

[3]. Durairaj. M, Kannan.P, “A Study On Virtualization Techniques And Challenges In Cloud Computing”, INTERNATIONAL JOURNAL OF SCIENTIFIC & TECHNOLOGY RESEARCH, VOLUME 3, ISSUE 11, NOVEMBER 2014, ISSN 2277-8616, pp. 147-151

[4]. Ms Jayshri Damodar Pagare, Dr. Nitin A Koli, “A technical review on comparison of Xen and KVM hypervisors: An analysis of virtualization technologies”, International Journal of Advanced Research in Computer and Communication Engineering, Vol. 3, Issue 12, December 2014, ISSN (Online) : 2278-1021 , ISSN (Print) : 2319-5940, pp. 8828-8832

[5]. V RaviTeja Kanakala, V.Krishna Reddy, K.Thirupathi Rao, “Analysis on Virtualization Technologies in Cloud”, International Journal of Advanced Research in Computer Engineering & Technology (IJARCET) Volume 3 Issue 7, July 2014, pp 2567-2574.

[6]. Gabriel Cephas Obasuyi, Arif Sari, “Security Challenges of Virtualization Hypervisors in Virtualized Hardware Environment”, Int. J. Communications, Network and System Sciences, 2015, Vol. 8, pp. 260-273, http://dx.doi.org/10.4236/ijcns.2015.87026

[7]. V. A. Meshram, V. V. Meshram, P. V. Khandare , Dr. S. R. Sakhare, “Cloud Computing and Virtualization Security: A Survey”, International Journal of Computer Trends and Technology (IJCTT) – volume 12 number 4 – Jun 2014, ISSN: 2231-5381, pp. 167-170

[8]. Kanika, Navjot Sidhu, “Analysis of Virtualization: Vulnerabilities and Attacks over the Virtualized Cloud Computing”, International Journal of Emerging Technologies in Computational and Applied Sciences (IJETCAS), Vol. 8(issue 5), March-May, 2014, pp. 391-396

[9]. Syed Asad Hussain, Mehwish Fatima, Atif Saeed, Imran Raza, Raja Khurram Shahzad, “Multilevel classification of security concerns in cloud computing”, Applied Computing and Informatics, 2016, ISSN: 2210-8327, pp.1-9

[10]. Theepan Moorthy and Sathish Gopalakrishnan, “IO and data management for infrastructure as a service FPGA accelerators”, Journal of Cloud Computing: Advances, Systems and Applications, 2017, pp. 1-23

[11]. Diego Perez-Botero, Jakub Szefer and Ruby B. Lee, “Characterizing Hypervisor Vulnerabilities in Cloud Computing Servers”, in Proceedings of the Workshop on Security in Cloud Computing (SCC), May 2013.

[12]. Swati Pawar, Sarvesh Singh, “Performance Comparison of VMware and Xen Hypervisor on Guest OS”, International Journal of Innovative Computer Science & Engineering, Volume 2 Issue 3; July-August-2015; Page No. 56-60.

Downloads

Published

2019-07-31
CITATION
DOI: 10.26438/ijcse/v7i7.223229
Published: 2019-07-31

How to Cite

[1]
A. K. Chaturvedi, P. Kumar, and K. Sharma, “Analyzing the Secure Virtualization schemes and preventions from DDoS flooding Zoombie attacks”, Int. J. Comp. Sci. Eng., vol. 7, no. 7, pp. 223–229, Jul. 2019.

Issue

Section

Review Article