Performance Analysis of Cloud Computing under the Impact of Botnet Attack



Similar documents
Usage of OPNET IT tool to Simulate and Test the Security of Cloud under varying Firewall conditions

Firewall and VPN Investigation on Cloud Computing Performance

Lab 1: Evaluating Internet Connection Choices for a Small Home PC Network

SBSCET, Firozpur (Punjab), India

NETWORK DESIGN BY USING OPNET IT GURU ACADEMIC EDITION SOFTWARE

Lecture 02b Cloud Computing II

Analysis of Effect of Handoff on Audio Streaming in VOIP Networks

Security Labs in OPNET IT Guru

The Advantages of Using EIGRP on an Enterprise Network

High Performance Cluster Support for NLB on Window

Testing Network Virtualization For Data Center and Cloud VERYX TECHNOLOGIES

Cisco Application Networking for IBM WebSphere

Home Networking Evaluating Internet Connection Choices for a Small Home PC Network

Survey on DDoS Attack Detection and Prevention in Cloud

Survey on DDoS Attack in Cloud Environment

INCREASING THE CLOUD PERFORMANCE WITH LOCAL AUTHENTICATION

SUNYIT. Reaction Paper 2. Measuring the performance of VoIP over Wireless LAN

1.1. Abstract VPN Overview

IMPROVEMENT OF RESPONSE TIME OF LOAD BALANCING ALGORITHM IN CLOUD ENVIROMENT

Cisco Application Networking for BEA WebLogic

EXPERIMENTAL STUDY FOR QUALITY OF SERVICE IN VOICE OVER IP

Cisco Application Networking for Citrix Presentation Server

Presenting Mongoose A New Approach to Traffic Capture (patent pending) presented by Ron McLeod and Ashraf Abu Sharekh January 2013

White Paper A SECURITY GUIDE TO PROTECTING IP PHONE SYSTEMS AGAINST ATTACK. A balancing act

packet retransmitting based on dynamic route table technology, as shown in fig. 2 and 3.

A Study of Network Security Systems

CLOUD COMPUTING. DAV University, Jalandhar, Punjab, India. DAV University, Jalandhar, Punjab, India

Performance Analysis of Routing Protocols for Real Time Application

Performance Management for Cloudbased STC 2012

Overview - Using ADAMS With a Firewall

Optimization of Computer Network for Efficient Performance

Chapter 11 Cloud Application Development

Overview - Using ADAMS With a Firewall

Cisco Integrated Services Routers Performance Overview

Keyword: Cloud computing, service model, deployment model, network layer security.

DoS: Attack and Defense

AN EFFICIENT LOAD BALANCING ALGORITHM FOR A DISTRIBUTED COMPUTER SYSTEM. Dr. T.Ravichandran, B.E (ECE), M.E(CSE), Ph.D., MISTE.,

Analysis of QoS parameters of VOIP calls over Wireless Local Area Networks

Security Threats in Mobile Ad Hoc Networks

Analysis on Virtualization Technologies in Cloud

Advancement in Virtualization Based Intrusion Detection System in Cloud Environment

Performance Testing. Slow data transfer rate may be inherent in hardware but can also result from software-related problems, such as:

A Comparative Study of Load Balancing Algorithms in Cloud Computing

Ranch Networks for Hosted Data Centers

Securing Cloud using Third Party Threaded IDS

Measuring the Performance of VoIP over Wireless LAN

IJREAT International Journal of Research in Engineering & Advanced Technology, Volume 1, Issue 1, March, 2013 ISSN:

Testing & Assuring Mobile End User Experience Before Production. Neotys

5 Performance Management for Web Services. Rolf Stadler School of Electrical Engineering KTH Royal Institute of Technology.

Lab 3: Evaluating Application Performance across a WAN

Chapter 5. Data Communication And Internet Technology

A Link Load Balancing Solution for Multi-Homed Networks

Security Issues In Cloud Computing and Countermeasures

CHAPTER 3 PROBLEM STATEMENT AND RESEARCH METHODOLOGY

Lightweight DNS for Multipurpose and Multifunctional Devices

Performance Analysis of Queuing Disciplines for Different Internet Service Protocols

About Firewall Protection

Network Security Demonstration - Snort based IDS Integration -

A SWOT ANALYSIS ON CISCO HIGH AVAILABILITY VIRTUALIZATION CLUSTERS DISASTER RECOVERY PLAN

DATA SECURITY 1/12. Copyright Nokia Corporation All rights reserved. Ver. 1.0

Sla Aware Load Balancing Algorithm Using Join-Idle Queue for Virtual Machines in Cloud Computing

International Journal of Computer Science Trends and Technology (IJCST) Volume 2 Issue 4, July-Aug 2014

Web Application Hosting Cloud Architecture

Quality of Service (QoS)) in IP networks

Real-Time Analysis of CDN in an Academic Institute: A Simulation Study

An Approach to Load Balancing In Cloud Computing

Quantifying the Performance Degradation of IPv6 for TCP in Windows and Linux Networking

Auto-Scaling, Load Balancing and Monitoring As service in public cloud

Database Security in Virtualization and Cloud Computing Environments

Chapter 19 Cloud Computing for Multimedia Services

A Novel Distributed Denial of Service (DDoS) Attacks Discriminating Detection in Flash Crowds

MANAGING NETWORK COMPONENTS USING SNMP

Optimizing Data Center Networks for Cloud Computing

Frequently Asked Questions

DDOS WALL: AN INTERNET SERVICE PROVIDER PROTECTOR

SonicWALL Clean VPN. Protect applications with granular access control based on user identity and device identity/integrity

Fault-Tolerant Framework for Load Balancing System

Denial of Service attacks: analysis and countermeasures. Marek Ostaszewski

PERFORMANCE ANALYSIS OF VOIP TRAFFIC OVER INTEGRATING WIRELESS LAN AND WAN USING DIFFERENT CODECS

Firewalls. Securing Networks. Chapter 3 Part 1 of 4 CA M S Mehta, FCA

International Journal of Engineering Research & Management Technology

technical brief Optimizing Performance in HP Web Jetadmin Web Jetadmin Overview Performance HP Web Jetadmin CPU Utilization utilization.

Performance Comparison of Server Load Distribution with FTP and HTTP

4 Delivers over 20,000 SSL connections per second (cps), which

Abstract. Introduction. Section I. What is Denial of Service Attack?

Symantec Endpoint Protection 11.0 Architecture, Sizing, and Performance Recommendations

Database Security, Virtualization and Cloud Computing

Complete Protection against Evolving DDoS Threats

Behavior Analysis of TCP Traffic in Mobile Ad Hoc Network using Reactive Routing Protocols

Optimizing Enterprise Network Bandwidth For Security Applications. Improving Performance Using Antaira s Management Features

The Affects of Different Queuing Algorithms within the Router on QoS VoIP application Using OPNET

International Journal of Computer & Organization Trends Volume21 Number1 June 2015 A Study on Load Balancing in Cloud Computing

Multilevel Communication Aware Approach for Load Balancing

ENSC 427: Communication Networks

CDBMS Physical Layer issue: Load Balancing

WEB SITE SECURITY. Jeff Aliber Verizon Digital Media Services

Chapter 1 - Web Server Management and Cluster Topology

Transcription:

Performance Analysis of Cloud Computing under the Impact of Botnet Attack Malvinder Singh Bali (Research scholar) a, Shivani Khurana (Guide) b * Department of Computer Science and Engineering CTIEMT, Shahpur Jalandhar, India, a mbali4964@gmail.com Abstract Cloud Computing is a model in which customers plug into the Cloud to access I.T resources which are provided on demand & charged as per use to enhance performance and speed. But maintaining the performance of cloud computing has become the biggest challenge for cloud researchers and the performance issues like Latency at the cloud and network end are deteriorating cloud performance. Researchers have worked to eradicate latency at cloud and network end by proposing some of the counter measures. But there is still a loop hole at the user end which is liable to get attacked by intruders causing service disruption which can enhance latency problems. In this paper we have presented the domains in cloud affected by performance with related work done so far. Secondly how latency issues like service disruption attacks at user end hamper the performance of cloud. For this, a Dos based attack has been applied on existing cloud based security model and performance has been evaluated by analyzing the calculated results to see the overall effect of attack on the cloud. Keywords: Cloud Computing, Latency, Botnet, Performance, Availability, DDoS. 1. Introduction to Cloud Computing Cloud is reference to work done on remote computers through a widely connected network-for all practical purposes, the Internet. The Cloud is a reference to the Fuzzy spots across a global network from where you may be accessing files or getting some data crunching done. Today Cloud Computing is expanding and most of the I.T companies are adapting Cloud technology so as to increase business flexibility and cost savings. The most current challenge the companies face is how to incorporate cloud Computing. Availability, Performance and Security are the three main problems when it come to adopting cloud computing. The risk of data loss and legal issues due to security breach is very high. Most companies today prefer Federated Cloud computing System, where some applications are located on public cloud, some applications on private cloud and some legacy applications are accessible over VPN. Performance is generally linked with application capability within the cloud system. Poor performance can be caused by limited bandwidth, disk space, memory, CPU cycle and Network connection, Latency. Due to such reasons in the system it can effectively end a system delivery and users will not accept slow performance. From security point of view, there are lot of loop holes which can degrade the performance of Cloud Computing at the end user.among them is the DDOS attack which hampers the performance of cloud by flooding it with unlimited no of bogus request, thus degrading the cloud performance. This will ultimately lead to slowness in providing resources by cloud vendor companies to their clients. One such DDOS attack which is gaining popularity can hamper cloud performance is Botnet attack. A Cloud based model is developed which will simulate the Cloud Scenario and see the effect of Botnet on the cloud performance. Latency can occur in cloud area, in networks connecting cloud to the end user and at the user end which can be measured by applying the formula. CL is cloud latency. CL1 +NL2=TSL * Corresponding author. E-Mail: shivani.khurana27@gmail.com 215

NL is network latency. TSL is total system latency 1.1. Intra Cloud Latency (CL) In cloud, latency can arise when two vm s co-located on the same server communicate with each other. This problem is limited by introducing Nahanni memcached, a port of the well-known memcached that uses inter-vm shared memory instead of a virtual network for cache reads Facebook, for example employs memcached as one of several caching layers. 1.2. Network Latency (NL) Network latency cause applications to spend amount of time waiting for responses from a distant data centre, then the bandwidth may not be fully utilized and performance will suffer. Network latency is comprised of Propagation delay, Node delay and Congestion delay. Good network design can minimize node delay and congestion delay but not propagation delay. 2. Related Work Adam Wolfe and Paul Lu in [3] proposed a memcached named Nahanni Memcached which can reduce the communication overhead between Virtual machines(vm) located in same server and used it with VDE networking to improve the total read latency for a workload by up to 45%(i.e. read latest workload) compared to standard memcached. Ajith Singh and Hemalatha in [1] conducted a survey on how latency occurs in different geographical location. Also revealed an analysis work of how different browsers provide different latency.a test conducted to show effect of bandwidth reveals that when one tries to access cloud based Google docs in cybercafé or GPRS connection it took 20 sec while when tried to open at the campus of university which provides 5.4 mbps it opens in 2 sec. The problem of latency in the cloud network will be solved with the faster adaption of 3g and 4g in the coming years. Mohammad Haideri in [2] tried to highlight the modelling and simulation for different kinds of computer network attacks and their impact on computer and networks. He explained applications for modelling and simulation of computer network security. It presents a comprehensive suggestion to solve the problem in modelling and simulating in the field of Information Security. He simulated the cloud network and implemented the botnet attack on one of the cloud applications i.e. FTP to analyze the effect of the attack on FTP server. Ankush Veer Reddy in [4] proposed a security model for cloud based applications by implementing a firewall using two applications i.e.web based application and database application to simulate and test the efficiency of the model. There are many advantages with the virtual machine implementation, where all the required server operations are no more physical in nature and a group of virtual servers is used in this context (Binning, 2011). The services provided by the service provider are not affected even there are some physical changes to the virtual machine and thus the customers can enjoy the uninterrupted services. However there are some limitations to the virtual machine concept as well and the key among them are the attacks on the virtual server. In general these virtual servers will form a separate group which is apart from the logical groups. In general the cloud environment is dynamic in nature and the data operations between the remote data servers and the client are prone to frequent updates (Andry, 2010). Pardeep Sharma, Sandeep Sood and Sumeet Kaur in [8] had proposed the benefits of cloud computing along with its flip side. This Paper also introduces various issues in Cloud Computing and suggested the possible measures to overcome them and the proposed algorithm is used to calculate and compare the net revenue by using the cloud and data center. Sonia and Satinderpal Singh in [9] reviewed academic research published in the field of energy efficient cloud environment and aimed to provide an overview of analyzing the energy consumption in different types of networks with downloading/uploading speed and computing the performance of networks. Raihana Abdullah,Mohd Faizal Abdullah,Zul Azri Muhamad,Mohd Zakri Mas Ud,Siti Rahayu Selamat and Robiah Yusof in [6] had addressed the current trend of Botnet detection techniques and identifies the significant criteria in each technique. Several existing techniques are analyzed from various researchers and the capability criteria of botnet detection techniques have been reviewed. The comparative analysis of these techniques have been shown on the selected detection criteria. Ashraf Zia and Muhammad Naeem Ahmad Khan in [7] had discussed performance issues in cloud computing.a number of schemes pertaining to QoS issues are critically analyzed to point out their strengths and weaknesses. Some of the performances parameters at the three basic layers of the cloud.iaas, PaaS and SaaS are also discussed in this paper. This paper also observed the key challenging areas that how resources are allocated to clients and what are the roles of cloud providers. Also investigated how the performance can be increased by improving various components in a scalable way with low cost, bitter performances and QoS.Some technical and functional issues in cloud that affect the performance of a cloud are also pointed out. Nagaraju Kilari and Dr R.Sridaran in [5] had proposed various security threats in a classified model and illustrated how cloud and virtualization vulnerabilities affect the different cloud models. The classification of various security threats presented in this paper would definitely benefit the cloud users to make out proper choice and cloud service providers to handle such threats efficiently. As more cloud based applications keep evolving the associated security threats are also growing. Many researchers work on cloud security exist in partial forms of 216

either specifically on cloud issues or Virtualization-related security issues Ala Atallah A.AL-Mughrabi and Hussain H.Owaied in [10] had proposed model for database replication model in private cloud availability regions, which is an enhancement of the SQLServer Always On layers of Protection model presented by Microsoft in 2012.The enhancement concentrates in the database replication for private cloud availability region through the use of primary and secondary servers.the process of proposed model during the client send Write/Read Request to the server in Synchronous and Semi Synchronous replication level has been described in detail also. In the Second scenario as shown in Fig 2, we have implemented a firewall in the cloud based scenario with one router acting as a firewall. And a constant packet latency of 0.05 seconds are imposed for packet filtering. 3. Proposed Architecture In our Proposed Architecture, we will first create a cloud based scenario using OPNET I.T GURU Simulator and check the performance using performance metrics like Server load, Traffic received, Utilization and Throughput. Similarly we will duplicate the scenario and implement a firewall in the proposed cloud based scenario with one router acting as a firewall to keep the firewall policies on and evaluate the performance using above mentioned metrics. Lastly the DDoS attack (i.e Botnet attack) is applied on one of the server s of the cloud and performance is evaluated using performance metrics. All the three scenarios are then compared to evaluate the performance of cloud. In this section we have firstly created a normal cloud based scenario as shown in Fig 1, where we have taken two applications namely database application and web based application. A workstation of 10Base_T LAN object is used to act as the home office supporting 150 work stations. Two PPP server objects are used to act as database server and webserver.ip32_cloud object is used to act as the internet cloud. The application configuration object is used to define the application and profile configuration object is used to define the application profile. Fig 2.Firewall based cloud model In the third scenario as shown in Fig 3, we have implemented a botnet attack on the Firewall based cloud scenario by increasing no of workstations from 150 to 250 with 150 users accessing database at the workstation. Fig 3.Botnet attack on Cloud model Table 1 Application Description Application Attribute Load Database Database High Load Web Browsing Http Heavy Browsing Table 2 Simulated Parameters Application Parameter Unit Fig 1.Normal Cloud Scenario Database Traffic sent Traffic received Server DB Query load Throughput Utilization Bytes/sec Bytes /sec Requests/sec Packets/sec 217

4. Methodology The OPNET I.T Guru is used to build the network topology of the cloud as described in fig 1.The cloud scenario used across the simulation is done to evaluate the performance of database cloud application by doing the comparative analysis under three different scenarios using Performance metrics. For this a cloud network topology is created, Statistics are chosen to measure the performance, Simulation is made to run and finally results are analyzed based on simulation results. Fig 4 shows the methodology of the simulation. Fig 6. Db Query Traffic Received (packets/sec) In Fig 7, Point-to-point throughput from firewall to IP cloud during firewall security was 60 packets per second whereas during Botnet it was increased to 80 packets persecond. Fig 4. Methodology Used 5. Simulation. Evaluation and Result Analysis On the basis of different scenarios we come up with the results and innovations using the basic parameters that are performance and availability. The first scenario which we have created is normal Scenario, second with firewall Scenario and third one is Botnet scenario. It has been investigated that the Server DB Query load during firewall implementation was 5 requests per second where as it drastically increased to 9 requests per second after botnet attack as shown in Fig 5. Database Query traffic received in firewall scenario was 9.5 packets per second where as it increased rapidly in botnet attack to 14 packets per second as shown in. Same results are analyzed for Db query with bytes per second during traffic received and it was analyzed that effect of botnet over firewall was 24 bytes per second more Fig 6. Fig 7.Point-to-point Throughput (Packets/sec) (From Firewall to IP cloud) In Fig 8, Point-to-point throughput from IPcloud to firewall during firewall security was 100 packets per second whereas during Botnet it was increased to 125 packets per second Fig 8.Point-to-point Throughput (Packets/sec) (From IP cloud to Firewall) Fig 5. Server db Query load Point-to-point Utilization across IP cloud in Botnet attack is more as compared to firewall scenario as shown in 218

Fig 9. prime duty to thank all those who have helped to make it successful. It is my immense pleasure to express my Gratitude to Shivani Khurana (Assistant Professor of Computer Science Department) as a guide who provided constructive and positive feedback during the preparation of the paper. References Fig 9.Point-to-Point Utilization 6. Conclusion and Future Work From the simulation work done, we revealed as how Botnet effects the cloud based data application by deteriorating performance of the server database query by increasing load, traffic, utilizing more bandwidth (point-topoint utilization) and sending large packets (point-to-point throughput).to encounter such problems we need to develop Intrusion detection system (IDS) at cloud end so as to limit the effect of botnet on the cloud network Acknowledgment The making of the paper needed co-operation and guidance of a number of people. I therefore consider it my [1] Ajith Singh and Hemalatha, Comparative analysis of Low latency on different bandwidth and geographical locations while using cloud based applications, Head department of Software systems, Kalpagam university Coimbatore: IJAET ISSN: 2231-1963, Jan 2012. [2] Mohammad Heidari, The Role of Modeling and Simulation in Information Security the Lost Ring, Springer, 1989, vol. 61. [3] Adam Wolfe Gardon and Paul lu, Low Latency Caching for Cloud based Web applications, Department of Computer Science, University of Alberta, Edmonton, Alberta, Canada: Awalfe.Paul@cs.ualberta., Sept. 16, 2011. [4] Ankush Veer Reddy, Usage of Opnet I.T tool to Simulate and test the security of cloud (Project id-395) www.sci.tamucc.edu [5] Nagaraju Kilari and Dr. R.Sridaran, A Survey on Security Threats for Cloud computing International journal of engineering research and technology (IJERT) Volume.1 Issue7, September-2012. [6] Raihana,Faizal, ZulAzri, Zaki, SitiRahayu and Robiah, Revealing the Criterion on Botnet Detection Technique International journals of Computer science issues, vol 10,Issue 2, No 3,March 2013. [7] Ashraf Zia and Muhammad Naeem Ahmad Khan. Identifying key Challenges in Performance Issues in Cloud Computing.IJMECS, 2012, 10, 59-68 September 2012. [8] Pardeep Sharma, Sandeep Sood and Sumeet Kaur, Cloud Computing issues and what to compute on Cloud International Journal of Advances in Computer networks and in Security,Vol 1,NI.1,PP.130-135,2011 [9] Sonia and Satinder pal Singh. Analysis of Energy Consumption in Different types of networks For Cloud Environment IJARCSSE Vol 2, Issue 2, Feb 2012 ISSN: 2277 128X [10] Ala Atallah A.AL-Mughrabi and Hussain H Owaied, Framework Model for database Replication within the Availability Zones in International journal of computer issues(ijcsi),vol 10,ISSUE 2,No 1,March 2013. 219