Performance Analysis of Cloud Computing under the Impact of Botnet Attack
|
|
|
- Stuart McDaniel
- 10 years ago
- Views:
Transcription
1 Performance Analysis of Cloud Computing under the Impact of Botnet Attack Malvinder Singh Bali (Research scholar) a, Shivani Khurana (Guide) b * Department of Computer Science and Engineering CTIEMT, Shahpur Jalandhar, India, a [email protected] Abstract Cloud Computing is a model in which customers plug into the Cloud to access I.T resources which are provided on demand & charged as per use to enhance performance and speed. But maintaining the performance of cloud computing has become the biggest challenge for cloud researchers and the performance issues like Latency at the cloud and network end are deteriorating cloud performance. Researchers have worked to eradicate latency at cloud and network end by proposing some of the counter measures. But there is still a loop hole at the user end which is liable to get attacked by intruders causing service disruption which can enhance latency problems. In this paper we have presented the domains in cloud affected by performance with related work done so far. Secondly how latency issues like service disruption attacks at user end hamper the performance of cloud. For this, a Dos based attack has been applied on existing cloud based security model and performance has been evaluated by analyzing the calculated results to see the overall effect of attack on the cloud. Keywords: Cloud Computing, Latency, Botnet, Performance, Availability, DDoS. 1. Introduction to Cloud Computing Cloud is reference to work done on remote computers through a widely connected network-for all practical purposes, the Internet. The Cloud is a reference to the Fuzzy spots across a global network from where you may be accessing files or getting some data crunching done. Today Cloud Computing is expanding and most of the I.T companies are adapting Cloud technology so as to increase business flexibility and cost savings. The most current challenge the companies face is how to incorporate cloud Computing. Availability, Performance and Security are the three main problems when it come to adopting cloud computing. The risk of data loss and legal issues due to security breach is very high. Most companies today prefer Federated Cloud computing System, where some applications are located on public cloud, some applications on private cloud and some legacy applications are accessible over VPN. Performance is generally linked with application capability within the cloud system. Poor performance can be caused by limited bandwidth, disk space, memory, CPU cycle and Network connection, Latency. Due to such reasons in the system it can effectively end a system delivery and users will not accept slow performance. From security point of view, there are lot of loop holes which can degrade the performance of Cloud Computing at the end user.among them is the DDOS attack which hampers the performance of cloud by flooding it with unlimited no of bogus request, thus degrading the cloud performance. This will ultimately lead to slowness in providing resources by cloud vendor companies to their clients. One such DDOS attack which is gaining popularity can hamper cloud performance is Botnet attack. A Cloud based model is developed which will simulate the Cloud Scenario and see the effect of Botnet on the cloud performance. Latency can occur in cloud area, in networks connecting cloud to the end user and at the user end which can be measured by applying the formula. CL is cloud latency. CL1 +NL2=TSL * Corresponding author. [email protected] 215
2 NL is network latency. TSL is total system latency 1.1. Intra Cloud Latency (CL) In cloud, latency can arise when two vm s co-located on the same server communicate with each other. This problem is limited by introducing Nahanni memcached, a port of the well-known memcached that uses inter-vm shared memory instead of a virtual network for cache reads Facebook, for example employs memcached as one of several caching layers Network Latency (NL) Network latency cause applications to spend amount of time waiting for responses from a distant data centre, then the bandwidth may not be fully utilized and performance will suffer. Network latency is comprised of Propagation delay, Node delay and Congestion delay. Good network design can minimize node delay and congestion delay but not propagation delay. 2. Related Work Adam Wolfe and Paul Lu in [3] proposed a memcached named Nahanni Memcached which can reduce the communication overhead between Virtual machines(vm) located in same server and used it with VDE networking to improve the total read latency for a workload by up to 45%(i.e. read latest workload) compared to standard memcached. Ajith Singh and Hemalatha in [1] conducted a survey on how latency occurs in different geographical location. Also revealed an analysis work of how different browsers provide different latency.a test conducted to show effect of bandwidth reveals that when one tries to access cloud based Google docs in cybercafé or GPRS connection it took 20 sec while when tried to open at the campus of university which provides 5.4 mbps it opens in 2 sec. The problem of latency in the cloud network will be solved with the faster adaption of 3g and 4g in the coming years. Mohammad Haideri in [2] tried to highlight the modelling and simulation for different kinds of computer network attacks and their impact on computer and networks. He explained applications for modelling and simulation of computer network security. It presents a comprehensive suggestion to solve the problem in modelling and simulating in the field of Information Security. He simulated the cloud network and implemented the botnet attack on one of the cloud applications i.e. FTP to analyze the effect of the attack on FTP server. Ankush Veer Reddy in [4] proposed a security model for cloud based applications by implementing a firewall using two applications i.e.web based application and database application to simulate and test the efficiency of the model. There are many advantages with the virtual machine implementation, where all the required server operations are no more physical in nature and a group of virtual servers is used in this context (Binning, 2011). The services provided by the service provider are not affected even there are some physical changes to the virtual machine and thus the customers can enjoy the uninterrupted services. However there are some limitations to the virtual machine concept as well and the key among them are the attacks on the virtual server. In general these virtual servers will form a separate group which is apart from the logical groups. In general the cloud environment is dynamic in nature and the data operations between the remote data servers and the client are prone to frequent updates (Andry, 2010). Pardeep Sharma, Sandeep Sood and Sumeet Kaur in [8] had proposed the benefits of cloud computing along with its flip side. This Paper also introduces various issues in Cloud Computing and suggested the possible measures to overcome them and the proposed algorithm is used to calculate and compare the net revenue by using the cloud and data center. Sonia and Satinderpal Singh in [9] reviewed academic research published in the field of energy efficient cloud environment and aimed to provide an overview of analyzing the energy consumption in different types of networks with downloading/uploading speed and computing the performance of networks. Raihana Abdullah,Mohd Faizal Abdullah,Zul Azri Muhamad,Mohd Zakri Mas Ud,Siti Rahayu Selamat and Robiah Yusof in [6] had addressed the current trend of Botnet detection techniques and identifies the significant criteria in each technique. Several existing techniques are analyzed from various researchers and the capability criteria of botnet detection techniques have been reviewed. The comparative analysis of these techniques have been shown on the selected detection criteria. Ashraf Zia and Muhammad Naeem Ahmad Khan in [7] had discussed performance issues in cloud computing.a number of schemes pertaining to QoS issues are critically analyzed to point out their strengths and weaknesses. Some of the performances parameters at the three basic layers of the cloud.iaas, PaaS and SaaS are also discussed in this paper. This paper also observed the key challenging areas that how resources are allocated to clients and what are the roles of cloud providers. Also investigated how the performance can be increased by improving various components in a scalable way with low cost, bitter performances and QoS.Some technical and functional issues in cloud that affect the performance of a cloud are also pointed out. Nagaraju Kilari and Dr R.Sridaran in [5] had proposed various security threats in a classified model and illustrated how cloud and virtualization vulnerabilities affect the different cloud models. The classification of various security threats presented in this paper would definitely benefit the cloud users to make out proper choice and cloud service providers to handle such threats efficiently. As more cloud based applications keep evolving the associated security threats are also growing. Many researchers work on cloud security exist in partial forms of 216
3 either specifically on cloud issues or Virtualization-related security issues Ala Atallah A.AL-Mughrabi and Hussain H.Owaied in [10] had proposed model for database replication model in private cloud availability regions, which is an enhancement of the SQLServer Always On layers of Protection model presented by Microsoft in 2012.The enhancement concentrates in the database replication for private cloud availability region through the use of primary and secondary servers.the process of proposed model during the client send Write/Read Request to the server in Synchronous and Semi Synchronous replication level has been described in detail also. In the Second scenario as shown in Fig 2, we have implemented a firewall in the cloud based scenario with one router acting as a firewall. And a constant packet latency of 0.05 seconds are imposed for packet filtering. 3. Proposed Architecture In our Proposed Architecture, we will first create a cloud based scenario using OPNET I.T GURU Simulator and check the performance using performance metrics like Server load, Traffic received, Utilization and Throughput. Similarly we will duplicate the scenario and implement a firewall in the proposed cloud based scenario with one router acting as a firewall to keep the firewall policies on and evaluate the performance using above mentioned metrics. Lastly the DDoS attack (i.e Botnet attack) is applied on one of the server s of the cloud and performance is evaluated using performance metrics. All the three scenarios are then compared to evaluate the performance of cloud. In this section we have firstly created a normal cloud based scenario as shown in Fig 1, where we have taken two applications namely database application and web based application. A workstation of 10Base_T LAN object is used to act as the home office supporting 150 work stations. Two PPP server objects are used to act as database server and webserver.ip32_cloud object is used to act as the internet cloud. The application configuration object is used to define the application and profile configuration object is used to define the application profile. Fig 2.Firewall based cloud model In the third scenario as shown in Fig 3, we have implemented a botnet attack on the Firewall based cloud scenario by increasing no of workstations from 150 to 250 with 150 users accessing database at the workstation. Fig 3.Botnet attack on Cloud model Table 1 Application Description Application Attribute Load Database Database High Load Web Browsing Http Heavy Browsing Table 2 Simulated Parameters Application Parameter Unit Fig 1.Normal Cloud Scenario Database Traffic sent Traffic received Server DB Query load Throughput Utilization Bytes/sec Bytes /sec Requests/sec Packets/sec 217
4 4. Methodology The OPNET I.T Guru is used to build the network topology of the cloud as described in fig 1.The cloud scenario used across the simulation is done to evaluate the performance of database cloud application by doing the comparative analysis under three different scenarios using Performance metrics. For this a cloud network topology is created, Statistics are chosen to measure the performance, Simulation is made to run and finally results are analyzed based on simulation results. Fig 4 shows the methodology of the simulation. Fig 6. Db Query Traffic Received (packets/sec) In Fig 7, Point-to-point throughput from firewall to IP cloud during firewall security was 60 packets per second whereas during Botnet it was increased to 80 packets persecond. Fig 4. Methodology Used 5. Simulation. Evaluation and Result Analysis On the basis of different scenarios we come up with the results and innovations using the basic parameters that are performance and availability. The first scenario which we have created is normal Scenario, second with firewall Scenario and third one is Botnet scenario. It has been investigated that the Server DB Query load during firewall implementation was 5 requests per second where as it drastically increased to 9 requests per second after botnet attack as shown in Fig 5. Database Query traffic received in firewall scenario was 9.5 packets per second where as it increased rapidly in botnet attack to 14 packets per second as shown in. Same results are analyzed for Db query with bytes per second during traffic received and it was analyzed that effect of botnet over firewall was 24 bytes per second more Fig 6. Fig 7.Point-to-point Throughput (Packets/sec) (From Firewall to IP cloud) In Fig 8, Point-to-point throughput from IPcloud to firewall during firewall security was 100 packets per second whereas during Botnet it was increased to 125 packets per second Fig 8.Point-to-point Throughput (Packets/sec) (From IP cloud to Firewall) Fig 5. Server db Query load Point-to-point Utilization across IP cloud in Botnet attack is more as compared to firewall scenario as shown in 218
5 Fig 9. prime duty to thank all those who have helped to make it successful. It is my immense pleasure to express my Gratitude to Shivani Khurana (Assistant Professor of Computer Science Department) as a guide who provided constructive and positive feedback during the preparation of the paper. References Fig 9.Point-to-Point Utilization 6. Conclusion and Future Work From the simulation work done, we revealed as how Botnet effects the cloud based data application by deteriorating performance of the server database query by increasing load, traffic, utilizing more bandwidth (point-topoint utilization) and sending large packets (point-to-point throughput).to encounter such problems we need to develop Intrusion detection system (IDS) at cloud end so as to limit the effect of botnet on the cloud network Acknowledgment The making of the paper needed co-operation and guidance of a number of people. I therefore consider it my [1] Ajith Singh and Hemalatha, Comparative analysis of Low latency on different bandwidth and geographical locations while using cloud based applications, Head department of Software systems, Kalpagam university Coimbatore: IJAET ISSN: , Jan [2] Mohammad Heidari, The Role of Modeling and Simulation in Information Security the Lost Ring, Springer, 1989, vol. 61. [3] Adam Wolfe Gardon and Paul lu, Low Latency Caching for Cloud based Web applications, Department of Computer Science, University of Alberta, Edmonton, Alberta, Canada: [email protected]., Sept. 16, [4] Ankush Veer Reddy, Usage of Opnet I.T tool to Simulate and test the security of cloud (Project id-395) [5] Nagaraju Kilari and Dr. R.Sridaran, A Survey on Security Threats for Cloud computing International journal of engineering research and technology (IJERT) Volume.1 Issue7, September [6] Raihana,Faizal, ZulAzri, Zaki, SitiRahayu and Robiah, Revealing the Criterion on Botnet Detection Technique International journals of Computer science issues, vol 10,Issue 2, No 3,March [7] Ashraf Zia and Muhammad Naeem Ahmad Khan. Identifying key Challenges in Performance Issues in Cloud Computing.IJMECS, 2012, 10, September [8] Pardeep Sharma, Sandeep Sood and Sumeet Kaur, Cloud Computing issues and what to compute on Cloud International Journal of Advances in Computer networks and in Security,Vol 1,NI.1,PP ,2011 [9] Sonia and Satinder pal Singh. Analysis of Energy Consumption in Different types of networks For Cloud Environment IJARCSSE Vol 2, Issue 2, Feb 2012 ISSN: X [10] Ala Atallah A.AL-Mughrabi and Hussain H Owaied, Framework Model for database Replication within the Availability Zones in International journal of computer issues(ijcsi),vol 10,ISSUE 2,No 1,March
Usage of OPNET IT tool to Simulate and Test the Security of Cloud under varying Firewall conditions
Usage of OPNET IT tool to Simulate and Test the Security of Cloud under varying Firewall conditions GRADUATE PROJECT REPORT Submitted to the Faculty of The School of Engineering & Computing Sciences Texas
Firewall and VPN Investigation on Cloud Computing Performance
Firewall and VPN Investigation on Cloud Computing Performance Siddeeq Y. Ameen 1, Shayma Wail Nourildean 2 1 Department of Computer and Information Engineering, University of Mosul, Mosul, Iraq 2 Foundation
Lab 1: Evaluating Internet Connection Choices for a Small Home PC Network
Lab 1: Evaluating Internet Connection Choices for a Small Home PC Network Objective This lab teaches the basics of using OPNET IT Guru. We investigate application performance and capacity planning, by
SBSCET, Firozpur (Punjab), India
Volume 3, Issue 9, September 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Layer Based
NETWORK DESIGN BY USING OPNET IT GURU ACADEMIC EDITION SOFTWARE
RIVIER ACADEMIC JOURNAL, VOLUME 3, NUMBER 1, SPRING 2007 NETWORK DESIGN BY USING OPNET IT GURU ACADEMIC EDITION SOFTWARE Arti Sood * Graduate Student, M.S. in Computer Science Program, Rivier College Abstract
Lecture 02b Cloud Computing II
Mobile Cloud Computing Lecture 02b Cloud Computing II 吳 秀 陽 Shiow-yang Wu T. Sridhar. Cloud Computing A Primer, Part 2: Infrastructure and Implementation Topics. The Internet Protocol Journal, Volume 12,
Analysis of Effect of Handoff on Audio Streaming in VOIP Networks
Beyond Limits... Volume: 2 Issue: 1 International Journal Of Advance Innovations, Thoughts & Ideas Analysis of Effect of Handoff on Audio Streaming in VOIP Networks Shivani Koul* [email protected]
Security Labs in OPNET IT Guru
Security Labs in OPNET IT Guru Universitat Ramon Llull Barcelona 2004 Security Labs in OPNET IT Guru Authors: Cesc Canet Juan Agustín Zaballos Translation from Catalan: Cesc Canet -I- Overview This project
The Advantages of Using EIGRP on an Enterprise Network
The Advantages of Using EIGRP on an Enterprise Network By Randy Patrick Submitted to the Faculty of the Information Technology Program in Partial Fulfillment of the Requirements for the Degree of Bachelor
High Performance Cluster Support for NLB on Window
High Performance Cluster Support for NLB on Window [1]Arvind Rathi, [2] Kirti, [3] Neelam [1]M.Tech Student, Department of CSE, GITM, Gurgaon Haryana (India) [email protected] [2]Asst. Professor,
Testing Network Virtualization For Data Center and Cloud VERYX TECHNOLOGIES
Testing Network Virtualization For Data Center and Cloud VERYX TECHNOLOGIES Table of Contents Introduction... 1 Network Virtualization Overview... 1 Network Virtualization Key Requirements to be validated...
Cisco Application Networking for IBM WebSphere
Cisco Application Networking for IBM WebSphere Faster Downloads and Site Navigation, Less Bandwidth and Server Processing, and Greater Availability for Global Deployments What You Will Learn To address
Home Networking Evaluating Internet Connection Choices for a Small Home PC Network
Laboratory 2 Home Networking Evaluating Internet Connection Choices for a Small Home PC Network Objetive This lab teaches the basics of using OPNET IT Guru. OPNET IT Guru s user-friendly interface with
Survey on DDoS Attack Detection and Prevention in Cloud
Survey on DDoS Detection and Prevention in Cloud Patel Ankita Fenil Khatiwala Computer Department, Uka Tarsadia University, Bardoli, Surat, Gujrat Abstract: Cloud is becoming a dominant computing platform
Survey on DDoS Attack in Cloud Environment
Available online at www.ijiere.com International Journal of Innovative and Emerging Research in Engineering e-issn: 2394-3343 p-issn: 2394-5494 Survey on DDoS in Cloud Environment Kirtesh Agrawal and Nikita
INCREASING THE CLOUD PERFORMANCE WITH LOCAL AUTHENTICATION
INTERNATIONAL JOURNAL OF RESEARCH IN COMPUTER APPLICATIONS AND ROBOTICS ISSN 2320-7345 INCREASING THE CLOUD PERFORMANCE WITH LOCAL AUTHENTICATION Sanjay Razdan Department of Computer Science and Eng. Mewar
SUNYIT. Reaction Paper 2. Measuring the performance of VoIP over Wireless LAN
SUNYIT Reaction Paper 2 Measuring the performance of VoIP over Wireless LAN SUBMITTED BY : SANJEEVAKUMAR 10/3/2013 Summary of the Paper The paper s main goal is to compare performance of VoIP in both LAN
1.1. Abstract. 1.2. VPN Overview
1.1. Abstract Traditionally organizations have designed their VPN networks using layer 2 WANs that provide emulated leased lines. In the last years a great variety of VPN technologies has appeared, making
IMPROVEMENT OF RESPONSE TIME OF LOAD BALANCING ALGORITHM IN CLOUD ENVIROMENT
IMPROVEMENT OF RESPONSE TIME OF LOAD BALANCING ALGORITHM IN CLOUD ENVIROMENT Muhammad Muhammad Bala 1, Miss Preety Kaushik 2, Mr Vivec Demri 3 1, 2, 3 Department of Engineering and Computer Science, Sharda
Cisco Application Networking for BEA WebLogic
Cisco Application Networking for BEA WebLogic Faster Downloads and Site Navigation, Less Bandwidth and Server Processing, and Greater Availability for Global Deployments What You Will Learn To address
EXPERIMENTAL STUDY FOR QUALITY OF SERVICE IN VOICE OVER IP
Scientific Bulletin of the Electrical Engineering Faculty Year 11 No. 2 (16) ISSN 1843-6188 EXPERIMENTAL STUDY FOR QUALITY OF SERVICE IN VOICE OVER IP Emil DIACONU 1, Gabriel PREDUŞCĂ 2, Denisa CÎRCIUMĂRESCU
Cisco Application Networking for Citrix Presentation Server
Cisco Application Networking for Citrix Presentation Server Faster Site Navigation, Less Bandwidth and Server Processing, and Greater Availability for Global Deployments What You Will Learn To address
Presenting Mongoose A New Approach to Traffic Capture (patent pending) presented by Ron McLeod and Ashraf Abu Sharekh January 2013
Presenting Mongoose A New Approach to Traffic Capture (patent pending) presented by Ron McLeod and Ashraf Abu Sharekh January 2013 Outline Genesis - why we built it, where and when did the idea begin Issues
White Paper A SECURITY GUIDE TO PROTECTING IP PHONE SYSTEMS AGAINST ATTACK. A balancing act
A SECURITY GUIDE TO PROTECTING IP PHONE SYSTEMS AGAINST ATTACK With organizations rushing to adopt Voice over IP (VoIP) technology to cut costs and integrate applications designed to serve customers better,
packet retransmitting based on dynamic route table technology, as shown in fig. 2 and 3.
Implementation of an Emulation Environment for Large Scale Network Security Experiments Cui Yimin, Liu Li, Jin Qi, Kuang Xiaohui National Key Laboratory of Science and Technology on Information System
A Study of Network Security Systems
A Study of Network Security Systems Ramy K. Khalil, Fayez W. Zaki, Mohamed M. Ashour, Mohamed A. Mohamed Department of Communication and Electronics Mansoura University El Gomhorya Street, Mansora,Dakahlya
CLOUD COMPUTING. DAV University, Jalandhar, Punjab, India. DAV University, Jalandhar, Punjab, India
CLOUD COMPUTING 1 Er. Simar Preet Singh, 2 Er. Anshu Joshi 1 Assistant Professor, Computer Science & Engineering, DAV University, Jalandhar, Punjab, India 2 Research Scholar, Computer Science & Engineering,
Performance Analysis of Routing Protocols for Real Time Application
Performance Analysis of Routing Protocols for Real Time Application Archana Kudtarkar 1, Reena Sonkusare 2, Dayanand Ambawade 3 Student-ME, Department of EXTC, SPIT, Mumbai, India 1 Associate Professor,
Performance Management for Cloudbased STC 2012
Performance Management for Cloudbased Applications STC 2012 1 Agenda Context Problem Statement Cloud Architecture Need for Performance in Cloud Performance Challenges in Cloud Generic IaaS / PaaS / SaaS
Overview - Using ADAMS With a Firewall
Page 1 of 6 Overview - Using ADAMS With a Firewall Internet security is becoming increasingly important as public and private entities connect their internal networks to the Internet. One of the most popular
Optimization of Computer Network for Efficient Performance
International Journal of Computer Networks and Communications Security VOL. 3, NO. 10, OCTOBER 2015, 396 402 Available online at: www.ijcncs.org E-ISSN 2308-9830 (Online) / ISSN 2410-0595 (Print) Optimization
Chapter 11 Cloud Application Development
Chapter 11 Cloud Application Development Contents Motivation. Connecting clients to instances through firewalls. Chapter 10 2 Motivation Some of the questions of interest to application developers: How
Overview - Using ADAMS With a Firewall
Page 1 of 9 Overview - Using ADAMS With a Firewall Internet security is becoming increasingly important as public and private entities connect their internal networks to the Internet. One of the most popular
Cisco Integrated Services Routers Performance Overview
Integrated Services Routers Performance Overview What You Will Learn The Integrated Services Routers Generation 2 (ISR G2) provide a robust platform for delivering WAN services, unified communications,
Keyword: Cloud computing, service model, deployment model, network layer security.
Volume 4, Issue 2, February 2014 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com An Emerging
DoS: Attack and Defense
DoS: Attack and Defense Vincent Tai Sayantan Sengupta COEN 233 Term Project Prof. M. Wang 1 Table of Contents 1. Introduction 4 1.1. Objective 1.2. Problem 1.3. Relation to the class 1.4. Other approaches
AN EFFICIENT LOAD BALANCING ALGORITHM FOR A DISTRIBUTED COMPUTER SYSTEM. Dr. T.Ravichandran, B.E (ECE), M.E(CSE), Ph.D., MISTE.,
AN EFFICIENT LOAD BALANCING ALGORITHM FOR A DISTRIBUTED COMPUTER SYSTEM K.Kungumaraj, M.Sc., B.L.I.S., M.Phil., Research Scholar, Principal, Karpagam University, Hindusthan Institute of Technology, Coimbatore
Analysis of QoS parameters of VOIP calls over Wireless Local Area Networks
Analysis of QoS parameters of VOIP calls over Wireless Local Area Networks Ayman Wazwaz, Computer Engineering Department, Palestine Polytechnic University, Hebron, Palestine, [email protected] Duaa sweity
Security Threats in Mobile Ad Hoc Networks
Security Threats in Mobile Ad Hoc Networks Hande Bakiler, Aysel Şafak Department of Electrical & Electronics Engineering Baskent University Ankara, Turkey [email protected], [email protected]
Analysis on Virtualization Technologies in Cloud
Analysis on Virtualization Technologies in Cloud 1 V RaviTeja Kanakala, V.Krishna Reddy, K.Thirupathi Rao 1 Research Scholar, Department of CSE, KL University, Vaddeswaram, India I. Abstract Virtualization
Advancement in Virtualization Based Intrusion Detection System in Cloud Environment
Advancement in Virtualization Based Intrusion Detection System in Cloud Environment Jaimin K. Khatri IT Systems and Network Security GTU PG School, Ahmedabad, Gujarat, India Mr. Girish Khilari Senior Consultant,
Performance Testing. Slow data transfer rate may be inherent in hardware but can also result from software-related problems, such as:
Performance Testing Definition: Performance Testing Performance testing is the process of determining the speed or effectiveness of a computer, network, software program or device. This process can involve
A Comparative Study of Load Balancing Algorithms in Cloud Computing
A Comparative Study of Load Balancing Algorithms in Cloud Computing Reena Panwar M.Tech CSE Scholar Department of CSE, Galgotias College of Engineering and Technology, Greater Noida, India Bhawna Mallick,
Ranch Networks for Hosted Data Centers
Ranch Networks for Hosted Data Centers Internet Zone RN20 Server Farm DNS Zone DNS Server Farm FTP Zone FTP Server Farm Customer 1 Customer 2 L2 Switch Customer 3 Customer 4 Customer 5 Customer 6 Ranch
Securing Cloud using Third Party Threaded IDS
Securing Cloud using Third Party Threaded IDS Madagani Rajeswari, Madhu babu Janjanam 1 Student, Dept. of CSE, Vasireddy Venkatadri Institute of Technology, Guntur, AP 2 Assistant Professor, Dept. of CSE,
Measuring the Performance of VoIP over Wireless LAN
Measuring the Performance of VoIP over Wireless LAN Keshav Neupane, Student Victor Kulgachev, Student Department of Computer Science Northern Kentucky University Highland Heights, KY, USA, 41099 [email protected]
IJREAT International Journal of Research in Engineering & Advanced Technology, Volume 1, Issue 1, March, 2013 ISSN: 2320-8791 www.ijreat.
Intrusion Detection in Cloud for Smart Phones Namitha Jacob Department of Information Technology, SRM University, Chennai, India Abstract The popularity of smart phone is increasing day to day and the
Testing & Assuring Mobile End User Experience Before Production. Neotys
Testing & Assuring Mobile End User Experience Before Production Neotys Agenda Introduction The challenges Best practices NeoLoad mobile capabilities Mobile devices are used more and more At Home In 2014,
5 Performance Management for Web Services. Rolf Stadler School of Electrical Engineering KTH Royal Institute of Technology. [email protected].
5 Performance Management for Web Services Rolf Stadler School of Electrical Engineering KTH Royal Institute of Technology [email protected] April 2008 Overview Service Management Performance Mgt QoS Mgt
Lab 3: Evaluating Application Performance across a WAN
Lab 3: Evaluating Application Performance across a WAN Objective In this lab, we have a small LAN with 20 users for a startup company named Deltasoft Technologies. We investigate the application performance
Chapter 5. Data Communication And Internet Technology
Chapter 5 Data Communication And Internet Technology Purpose Understand the fundamental networking concepts Agenda Network Concepts Communication Protocol TCP/IP-OSI Architecture Network Types LAN WAN
A Link Load Balancing Solution for Multi-Homed Networks
A Link Load Balancing Solution for Multi-Homed Networks Overview An increasing number of enterprises are using the Internet for delivering mission-critical content and applications. By maintaining only
Security Issues In Cloud Computing and Countermeasures
Security Issues In Cloud Computing and Countermeasures Shipra Dubey 1, Suman Bhajia 2 and Deepika Trivedi 3 1 Department of Computer Science, Banasthali University, Jaipur, Rajasthan / India 2 Department
CHAPTER 3 PROBLEM STATEMENT AND RESEARCH METHODOLOGY
51 CHAPTER 3 PROBLEM STATEMENT AND RESEARCH METHODOLOGY Web application operations are a crucial aspect of most organizational operations. Among them business continuity is one of the main concerns. Companies
Lightweight DNS for Multipurpose and Multifunctional Devices
IJCSNS International Journal of Computer Science and Network Security, VOL.13 No.12, December 2013 71 Lightweight DNS for Multipurpose and Multifunctional Devices Yogesh A. Wagh 1, Prashant A. Dhangar
Performance Analysis of Queuing Disciplines for Different Internet Service Protocols
Performance Analysis of Queuing Disciplines for Different Internet Service Protocols Neha Ghaisas Department of Computer Engineering, R.R Sedamkar Professor and Dean Academics, Rashmi Thakur Asst. Professor,
About Firewall Protection
1. This guide describes how to configure basic firewall rules in the UTM to protect your network. The firewall then can provide secure, encrypted communications between your local network and a remote
Network Security Demonstration - Snort based IDS Integration -
Network Security Demonstration - Snort based IDS Integration - Hyuk Lim ([email protected]) with TJ Ha, CW Jeong, J Narantuya, JW Kim Wireless Communications and Networking Lab School of Information and
A SWOT ANALYSIS ON CISCO HIGH AVAILABILITY VIRTUALIZATION CLUSTERS DISASTER RECOVERY PLAN
A SWOT ANALYSIS ON CISCO HIGH AVAILABILITY VIRTUALIZATION CLUSTERS DISASTER RECOVERY PLAN Eman Al-Harbi [email protected] Soha S. Zaghloul [email protected] Faculty of Computer and Information
DATA SECURITY 1/12. Copyright Nokia Corporation 2002. All rights reserved. Ver. 1.0
DATA SECURITY 1/12 Copyright Nokia Corporation 2002. All rights reserved. Ver. 1.0 Contents 1. INTRODUCTION... 3 2. REMOTE ACCESS ARCHITECTURES... 3 2.1 DIAL-UP MODEM ACCESS... 3 2.2 SECURE INTERNET ACCESS
Sla Aware Load Balancing Algorithm Using Join-Idle Queue for Virtual Machines in Cloud Computing
Sla Aware Load Balancing Using Join-Idle Queue for Virtual Machines in Cloud Computing Mehak Choudhary M.Tech Student [CSE], Dept. of CSE, SKIET, Kurukshetra University, Haryana, India ABSTRACT: Cloud
International Journal of Computer Science Trends and Technology (IJCST) Volume 2 Issue 4, July-Aug 2014
RESEARCH ARTICLE An Efficient Service Broker Policy for Cloud Computing Environment Kunal Kishor 1, Vivek Thapar 2 Research Scholar 1, Assistant Professor 2 Department of Computer Science and Engineering,
Web Application Hosting Cloud Architecture
Web Application Hosting Cloud Architecture Executive Overview This paper describes vendor neutral best practices for hosting web applications using cloud computing. The architectural elements described
Quality of Service (QoS)) in IP networks
Quality of Service (QoS)) in IP networks Petr Grygárek rek 1 Quality of Service (QoS( QoS) QoS is the ability of network to support applications without limiting it s s function or performance ITU-T T
Real-Time Analysis of CDN in an Academic Institute: A Simulation Study
Journal of Algorithms & Computational Technology Vol. 6 No. 3 483 Real-Time Analysis of CDN in an Academic Institute: A Simulation Study N. Ramachandran * and P. Sivaprakasam + *Indian Institute of Management
An Approach to Load Balancing In Cloud Computing
An Approach to Load Balancing In Cloud Computing Radha Ramani Malladi Visiting Faculty, Martins Academy, Bangalore, India ABSTRACT: Cloud computing is a structured model that defines computing services,
Quantifying the Performance Degradation of IPv6 for TCP in Windows and Linux Networking
Quantifying the Performance Degradation of IPv6 for TCP in Windows and Linux Networking Burjiz Soorty School of Computing and Mathematical Sciences Auckland University of Technology Auckland, New Zealand
Auto-Scaling, Load Balancing and Monitoring As service in public cloud
IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661, p- ISSN: 2278-8727Volume 16, Issue 4, Ver. I (Jul-Aug. 2014), PP 39-46 Auto-Scaling, Load Balancing and Monitoring As service in public
Database Security in Virtualization and Cloud Computing Environments
White Paper Database Security in Virtualization and Cloud Computing Environments Three key technology challenges in protecting sensitive data Table of Contents Securing Information in Virtualization and
Chapter 19 Cloud Computing for Multimedia Services
Chapter 19 Cloud Computing for Multimedia Services 19.1 Cloud Computing Overview 19.2 Multimedia Cloud Computing 19.3 Cloud-Assisted Media Sharing 19.4 Computation Offloading for Multimedia Services 19.5
A Novel Distributed Denial of Service (DDoS) Attacks Discriminating Detection in Flash Crowds
International Journal of Research Studies in Science, Engineering and Technology Volume 1, Issue 9, December 2014, PP 139-143 ISSN 2349-4751 (Print) & ISSN 2349-476X (Online) A Novel Distributed Denial
MANAGING NETWORK COMPONENTS USING SNMP
MANAGING NETWORK COMPONENTS USING SNMP Abubucker Samsudeen Shaffi 1 Mohanned Al-Obaidy 2 Gulf College 1, 2 Sultanate of Oman. Email: [email protected] [email protected] Abstract:
Optimizing Data Center Networks for Cloud Computing
PRAMAK 1 Optimizing Data Center Networks for Cloud Computing Data Center networks have evolved over time as the nature of computing changed. They evolved to handle the computing models based on main-frames,
Frequently Asked Questions
Frequently Asked Questions 1. Q: What is the Network Data Tunnel? A: Network Data Tunnel (NDT) is a software-based solution that accelerates data transfer in point-to-point or point-to-multipoint network
DDOS WALL: AN INTERNET SERVICE PROVIDER PROTECTOR
Journal homepage: www.mjret.in DDOS WALL: AN INTERNET SERVICE PROVIDER PROTECTOR Maharudra V. Phalke, Atul D. Khude,Ganesh T. Bodkhe, Sudam A. Chole Information Technology, PVPIT Bhavdhan Pune,India [email protected],
SonicWALL Clean VPN. Protect applications with granular access control based on user identity and device identity/integrity
SSL-VPN Combined With Network Security Introducing A popular feature of the SonicWALL Aventail SSL VPN appliances is called End Point Control (EPC). This allows the administrator to define specific criteria
Fault-Tolerant Framework for Load Balancing System
Fault-Tolerant Framework for Load Balancing System Y. K. LIU, L.M. CHENG, L.L.CHENG Department of Electronic Engineering City University of Hong Kong Tat Chee Avenue, Kowloon, Hong Kong SAR HONG KONG Abstract:
Denial of Service attacks: analysis and countermeasures. Marek Ostaszewski
Denial of Service attacks: analysis and countermeasures Marek Ostaszewski DoS - Introduction Denial-of-service attack (DoS attack) is an attempt to make a computer resource unavailable to its intended
PERFORMANCE ANALYSIS OF VOIP TRAFFIC OVER INTEGRATING WIRELESS LAN AND WAN USING DIFFERENT CODECS
PERFORMANCE ANALYSIS OF VOIP TRAFFIC OVER INTEGRATING WIRELESS LAN AND WAN USING DIFFERENT CODECS Ali M. Alsahlany 1 1 Department of Communication Engineering, Al-Najaf Technical College, Foundation of
Firewalls. Securing Networks. Chapter 3 Part 1 of 4 CA M S Mehta, FCA
Firewalls Securing Networks Chapter 3 Part 1 of 4 CA M S Mehta, FCA 1 Firewalls Learning Objectives Task Statements 1.3 Recognise function of Telecommunications and Network security including firewalls,..
International Journal of Engineering Research & Management Technology
International Journal of Engineering Research & Management Technology March- 2015 Volume 2, Issue-2 Survey paper on cloud computing with load balancing policy Anant Gaur, Kush Garg Department of CSE SRM
technical brief Optimizing Performance in HP Web Jetadmin Web Jetadmin Overview Performance HP Web Jetadmin CPU Utilization utilization.
technical brief in HP Overview HP is a Web-based software application designed to install, configure, manage and troubleshoot network-connected devices. It includes a Web service, which allows multiple
Performance Comparison of Server Load Distribution with FTP and HTTP
Performance Comparison of Server Load Distribution with FTP and HTTP Yogesh Chauhan Assistant Professor HCTM Technical Campus, Kaithal Shilpa Chauhan Research Scholar University Institute of Engg & Tech,
4 Delivers over 20,000 SSL connections per second (cps), which
April 21 Commissioned by Radware, Ltd Radware AppDirector x8 and x16 Application Switches Performance Evaluation versus F5 Networks BIG-IP 16 and 36 Premise & Introduction Test Highlights 1 Next-generation
Abstract. Introduction. Section I. What is Denial of Service Attack?
Abstract In this report, I am describing the main types of DoS attacks and their effect on computer and network environment. This report will form the basis of my forthcoming report which will discuss
Symantec Endpoint Protection 11.0 Architecture, Sizing, and Performance Recommendations
Symantec Endpoint Protection 11.0 Architecture, Sizing, and Performance Recommendations Technical Product Management Team Endpoint Security Copyright 2007 All Rights Reserved Revision 6 Introduction This
Database Security, Virtualization and Cloud Computing
Whitepaper Database Security, Virtualization and Cloud Computing The three key technology challenges in protecting sensitive data in modern IT architectures Including: Limitations of existing database
Complete Protection against Evolving DDoS Threats
Complete Protection against Evolving DDoS Threats AhnLab, Inc. Table of Contents Introduction... 2 The Evolution of DDoS Attacks... 2 Typical Protection against DDoS Attacks... 3 Firewalls... 3 Intrusion
Behavior Analysis of TCP Traffic in Mobile Ad Hoc Network using Reactive Routing Protocols
Behavior Analysis of TCP Traffic in Mobile Ad Hoc Network using Reactive Routing Protocols Purvi N. Ramanuj Department of Computer Engineering L.D. College of Engineering Ahmedabad Hiteishi M. Diwanji
Optimizing Enterprise Network Bandwidth For Security Applications. Improving Performance Using Antaira s Management Features
Optimizing Enterprise Network Bandwidth For Security Applications Improving Performance Using Antaira s Management Features By: Brian Roth, Product Marketing Engineer April 1, 2014 April 2014 Optimizing
The Affects of Different Queuing Algorithms within the Router on QoS VoIP application Using OPNET
The Affects of Different Queuing Algorithms within the Router on QoS VoIP application Using OPNET Abstract: Dr. Hussein A. Mohammed*, Dr. Adnan Hussein Ali**, Hawraa Jassim Mohammed* * Iraqi Commission
International Journal of Computer & Organization Trends Volume21 Number1 June 2015 A Study on Load Balancing in Cloud Computing
A Study on Load Balancing in Cloud Computing * Parveen Kumar * Er.Mandeep Kaur Guru kashi University,Talwandi Sabo Guru kashi University,Talwandi Sabo Abstract: Load Balancing is a computer networking
Multilevel Communication Aware Approach for Load Balancing
Multilevel Communication Aware Approach for Load Balancing 1 Dipti Patel, 2 Ashil Patel Department of Information Technology, L.D. College of Engineering, Gujarat Technological University, Ahmedabad 1
ENSC 427: Communication Networks
Spring 2012 ENSC 427: Communication Networks Creating a Secure Network through Firewalls and Virtual Private Networks http://www.sfu.ca/~msa102 Team #2 Maxim Soleimani-Nouri Andy Cheng Saman Mehdizadeh
CDBMS Physical Layer issue: Load Balancing
CDBMS Physical Layer issue: Load Balancing Shweta Mongia CSE, School of Engineering G D Goenka University, Sohna [email protected] Shipra Kataria CSE, School of Engineering G D Goenka University,
WEB SITE SECURITY. Jeff Aliber Verizon Digital Media Services
WEB SITE SECURITY Jeff Aliber Verizon Digital Media Services 1 SECURITY & THE CLOUD The Cloud (Web) o The Cloud is becoming the de-facto way for enterprises to leverage common infrastructure while innovating
Chapter 1 - Web Server Management and Cluster Topology
Objectives At the end of this chapter, participants will be able to understand: Web server management options provided by Network Deployment Clustered Application Servers Cluster creation and management
