Skip to main content

Providing Security for Cloud Computing Platform Using IP Address Randomization

  • Conference paper
  • First Online:
Proceedings of International Conference on Advances in Computer Engineering and Communication Systems

Part of the book series: Learning and Analytics in Intelligent Systems ((LAIS,volume 20))

  • 416 Accesses

Abstract

Distributed Denial of Service (DDoS) assaults represent an important warning toward basic communications and same to internet benefits. Here paper suggests IP Address Randomization, a moving objective defense mechanism with the aim of verifies authentic customers besides flood DDoS attacks. This project utilizes gathering of active packet indirection proxies toward passing information between real customers along with the protected servers. Our structure is able to successfully inhibit outer attackers’ endeavors to legitimately bombard the network base. Subsequently, attacker’s determination requires on the way to conspire through malicious insiders within discovering secrecy proxies after that initiating attack. However, moving objective defense mechanism can segregate insider assaults as of innocent clients through ceaselessly “moving” secrecy proxies toward latest network area whereas recognizing client to intermediary assignments. We build up a greedy shuffling computation to limit the quantity of proxy reassign (shuffles) while amplifying assaults detachment.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 219.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. D. Anstee, D. Bussiere, Worldwide infrastructure security report viii (2012) [Online]. Available: https://www.arbornetworks.com/report

  2. Layered intelligent ddos mitigation systems (2011) [Online]. Available: https://www.arbornetworks.com/ddos/Layered%20Intelligent%20DDoS%20Mitigation%20Systems.pdf

  3. J. Sun, K. Sun, DESIR: Decoy-enhanced seamless IP randomization, in IEEE INFOCOM 2016 - The 35th Annual IEEE International Conference on Computer Communications (2016), pp. 1–9

    Google Scholar 

  4. J. Ullrich, K. Krombholz, H. Hobel, A. Dabrowski, E. Weippl, IPv6 security: Attacks and countermeasures in a nutshell, in 8th USENIX Workshop on Offensive Technologies (WOOT 14) (San Diego, CA: USENIX Association, 2014). [Online]. Available: https://www.usenix.org/conference/woot14/workshop-program/presentation/Ullrich

  5. M. Wright, S. Venkatesan, M. Albanese, M.P. Wellman, Moving target defense against DDoS attacks: An empirical game-theoretic analysis, in ACM Workshop on Moving Target Defense (2016)

    Google Scholar 

  6. E. Miehling, M. Rasouli, D. Teneketzis, Optimal defense policies for partially observable spreading processes on bayesian attack graphs, in Second ACM Workshop on Moving Target Defense (2015)

    Google Scholar 

  7. R. Zhuang, A.G. Bardas, S.A. DeLoach, X. Ou, A theory of cyber attacks: A step towards analyzing MTD systems, in Second ACM Workshop on Moving Target Defense (2015)

    Google Scholar 

  8. R. Zhuang, S.A. DeLoach, X. Ou, Towards a theory of moving target defense, in First ACM Workshop on Moving Target Defense (2014)

    Google Scholar 

  9. H. Maleki, S. Valizadeh, W. Koch, A. Bestavros, M. van Dijk, Markov modeling of moving target defense games, in ACM Workshop on Moving Target Defense (2016)

    Google Scholar 

  10. D. Evans, A. Nguyen-Tuong, J. Knight, Effectiveness of Moving Target Defenses (Springer, Berlin, 2011)

    Google Scholar 

  11. J.H. Jafarian, E. Al-Shaer, Q. Duan, Adversary-aware IP address randomization for proactive agility against sophisticated attackers, in 2015 IEEE Conference on Computer Communications (INFOCOM) (2015), pp. 738–746

    Google Scholar 

  12. S. Achleitner, T.F.L. Porta, P. McDaniel, S. Sugrim, S.V. Krishnamurthy, R. Chadha, Deceiving network reconnaissance using SDNbased virtual topologies. IEEE Trans. Netw. Serv. Manage. 14(4), 1098–1112 (2017)

    Google Scholar 

  13. S. Basu, G. Kannayaram, S. Ramasubbareddy, C. Venkatasubbaiah, Improved genetic algorithm for monitoring of virtual machines in cloud environment, in Smart Intelligent Computing and Applications (Springer, Singapore, 2019), pp. 319–326

    Google Scholar 

  14. R. Somula, R. Sasikala, Round robin with load degree: An algorithm for optimal cloudlet discovery in mobile cloud computing. Scalable Computing: Practice and Experience 19(1), 39–52 (2018)

    Google Scholar 

  15. R. Somula, C. Anilkumar, B. Venkatesh, A. Karrothu, C.P. Kumar, R. Sasikala, Cloudlet services for healthcare applications in mobile cloud computing, in Proceedings of the 2nd International Conference on Data Engineering and Communication Technology (Springer, Singapore, 2019), pp. 535–543

    Google Scholar 

  16. R.S. Somula, R. Sasikala, A survey on mobile cloud computing: mobile computing+ cloud computing (MCC= MC+ CC). Scalable Comput.: Practice Exp. 19(4), 309–337 (2018)

    Google Scholar 

  17. R. Somula, R. Sasikala, A load and distance aware cloudlet selection strategy in multi-cloudlet environment. Int. J. Grid High-Perform. Comput. (IJGHPC) 11(2), 85–102 (2019)

    Google Scholar 

  18. R. Somula, R. Sasikala, A honey bee inspired cloudlet selection for resource allocation, in Smart Intelligent Computing and Applications (Springer, Singapore, 2019), pp. 335–343

    Google Scholar 

  19. S. Nalluri, S. Ramasubbareddy, G. Kannayaram, Weather Prediction Using Clustering Strategies in Machine Learning. J. Comput. Theor. Nanosci. 16(5–6), 1977–1981 (2019)

    Google Scholar 

  20. K.S. Sahoo, M. Tiwary, P. Mishra, S.R.S. Reddy, B. Balusamy, A.H. Gandomi, Improving end-users utility in software-defined wide area network systems. IEEE Trans. Netw. Serv. Manag. (2019)

    Google Scholar 

  21. K.S. Sahoo, M. Tiwary, B. Sahoo, B.K. Mishra, S. RamaSubbaReddy, A.K. Luhach, RTSM: response time optimisation during switch migration in software-defined wide area network. IET Wirel Sens Syst (2019)

    Google Scholar 

  22. R. Somula, K.D. Kumar, S. Aravindharamanan, K. Govinda, Twitter sentiment analysis based on US presidential election 2016, in In Smart Intelligent Computing and Applications (Springer, Singapore, 2020), pp. 363–373

    Google Scholar 

  23. K.B.K. Sai, S.R. Subbareddy, A.K. Luhach, IOT based air quality monitoring system using MQ135 and MQ7 with machine learning analysis. Scalable Comput.: Practice Exp. 20(4), 599–606 (2019)

    Google Scholar 

  24. R. Somula, Y. Narayana, S. Nalluri, A. Chunduru, K.V. Sree, POUPR: properly utilizing user-provided recourses for energy saving in mobile cloud computing, in Proceedings of the 2nd International Conference on Data Engineering and Communication Technology (Springer, Singapore, 2019), pp. 585–595

    Google Scholar 

  25. R. Vaishali, R. Sasikala, S. Ramasubbareddy, S. Remya, S. Nalluri, Genetic algorithm-based feature selection and MOE Fuzzy classification algorithm on Pima Indians Diabetes dataset, in 2017 International Conference on Computing Networking and Informatics (ICCNI) (IEEE, 2017), pp. 1–5

    Google Scholar 

  26. R. Somula, R. Sasikala, A research review on energy consumption of different frameworks in mobile cloud computing, in Innovations in Computer Science and Engineering (Springer, Singapore, 2019); I.P. Kumar, S. Sambangi, R. Somukoa, S. Nalluri, K. Govinda, Server security in cloud computing using block-chaining technique, in Data Engineering and Communication Technology (Springer, Singapore, 2020), pp. 913–920

    Google Scholar 

  27. I.P. Kumar, V.H. Gopal, S. Ramasubbareddy, S. Nalluri, K. Govinda, Dominant color palette extraction by K-means clustering algorithm and reconstruction of image, in Data Engineering and Communication Technology (Springer, Singapore, 2020), pp. 921–929

    Google Scholar 

  28. S. Nalluri, R.V. Saraswathi, S. Ramasubbareddy, K. Govinda, E. Swetha, Chronic heart disease prediction using data mining techniques, in Data Engineering and Communication Technology (Springer, Singapore, 2020), pp. 903–912

    Google Scholar 

  29. R.V. Saraswathi, S. Nalluri, S. Ramasubbareddy, K. Govinda, E. Swetha, Brilliant corp yield prediction utilizing internet of things, in Data Engineering and Communication Technology (Springer, Singapore, 2020), pp. 893–902

    Google Scholar 

  30. S. Maddila, S. Ramasubbareddy, K. Govinda, Crime and Fraud detection using clustering techniques, in Innovations in Computer Science and Engineering (Springer, Singapore, 2020), pp. 135–143

    Google Scholar 

  31. K. Rakshitha, A.S. Rao, Y. Sagar, S. Ramasubbareddy, Demonstrating broadcast aggregate keys for data sharing in cloud, in Innovations in Computer Science and Engineering (Springer, Singapore, 2020), pp. 185–193

    Google Scholar 

  32. S. Ramasubbareddy, T.A.S. Srinivas, K. Govinda, S.S. Manivannan, Comparative study of clustering techniques in market segmentation, in Innovations in Computer Science and Engineering (pp. 117–125). (Springer, Singapore, 2020)

    Google Scholar 

  33. S. Ramasubbareddy, T.A.S. Srinivas, K. Govinda, S.S. Manivannan, Crime prediction system, in Innovations in Computer Science and Engineering (Springer, Singapore, 2020), pp. 127–134

    Google Scholar 

  34. C. Pradeepthi, V.V. Geetha, S. Ramasubbareddy, K. Govinda, Prediction of real estate price using clustering techniques, in Emerging Research in Data Engineering Systems and Computer Communications (Springer, Singapore, 2020), pp. 281–289

    Google Scholar 

  35. K. Sathish, S. Ramasubbareddy, K. Govinda, Detection and localization of multiple objects using VGGNet and single shot detection, in Emerging Research in Data Engineering Systems and Computer Communications (Springer, Singapore, 2020), pp. 427–439

    Google Scholar 

  36. B.L. Devi, V.V. Bai, S. Ramasubbareddy, K. Govinda, Sentiment analysis on movie reviews, in Emerging Research in Data Engineering Systems and Computer Communications (Springer, Singapore, 2020), pp. 321–328

    Google Scholar 

  37. I.P. Kumar, S. Sambangi, R. Somukoa, S. Nalluri, K. Govinda, Server security in cloud computing using block-chaining technique, in Data Engineering and Communication Technology (Springer, Singapore, 2020), pp. 913–920

    Google Scholar 

  38. S. Nalluri, S. Ramasubbareddy, G. Kannayaram, Cloud application security based on enhanced MD5 algorithm. J. Comput. Theor. Nanosci. 16(5–6), 2022–2027 (2019)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to K. Durgaprasadvarma .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2021 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Durgaprasadvarma, K. (2021). Providing Security for Cloud Computing Platform Using IP Address Randomization. In: Kiran Mai, C., Kiranmayee, B.V., Favorskaya, M.N., Chandra Satapathy, S., Raju, K.S. (eds) Proceedings of International Conference on Advances in Computer Engineering and Communication Systems. Learning and Analytics in Intelligent Systems, vol 20. Springer, Singapore. https://doi.org/10.1007/978-981-15-9293-5_33

Download citation

  • DOI: https://doi.org/10.1007/978-981-15-9293-5_33

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-15-9292-8

  • Online ISBN: 978-981-15-9293-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics