Open Access   Article Go Back

Analyzing the Secure Virtualization schemes and preventions from DDoS flooding Zoombie attacks

Amit K. Chaturvedi1 , Punit Kumar2 , Kalpana Sharma3

Section:Review Paper, Product Type: Journal Paper
Volume-7 , Issue-7 , Page no. 223-229, Jul-2019

CrossRef-DOI:   https://doi.org/10.26438/ijcse/v7i7.223229

Online published on Jul 31, 2019

Copyright © Amit K. Chaturvedi, Punit Kumar, Kalpana Sharma . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Amit K. Chaturvedi, Punit Kumar, Kalpana Sharma, “Analyzing the Secure Virtualization schemes and preventions from DDoS flooding Zoombie attacks,” International Journal of Computer Sciences and Engineering, Vol.7, Issue.7, pp.223-229, 2019.

MLA Style Citation: Amit K. Chaturvedi, Punit Kumar, Kalpana Sharma "Analyzing the Secure Virtualization schemes and preventions from DDoS flooding Zoombie attacks." International Journal of Computer Sciences and Engineering 7.7 (2019): 223-229.

APA Style Citation: Amit K. Chaturvedi, Punit Kumar, Kalpana Sharma, (2019). Analyzing the Secure Virtualization schemes and preventions from DDoS flooding Zoombie attacks. International Journal of Computer Sciences and Engineering, 7(7), 223-229.

BibTex Style Citation:
@article{Chaturvedi_2019,
author = {Amit K. Chaturvedi, Punit Kumar, Kalpana Sharma},
title = {Analyzing the Secure Virtualization schemes and preventions from DDoS flooding Zoombie attacks},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {7 2019},
volume = {7},
Issue = {7},
month = {7},
year = {2019},
issn = {2347-2693},
pages = {223-229},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=4749},
doi = {https://doi.org/10.26438/ijcse/v7i7.223229}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v7i7.223229}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=4749
TI - Analyzing the Secure Virtualization schemes and preventions from DDoS flooding Zoombie attacks
T2 - International Journal of Computer Sciences and Engineering
AU - Amit K. Chaturvedi, Punit Kumar, Kalpana Sharma
PY - 2019
DA - 2019/07/31
PB - IJCSE, Indore, INDIA
SP - 223-229
IS - 7
VL - 7
SN - 2347-2693
ER -

VIEWS PDF XML
431 197 downloads 135 downloads
  
  
           

Abstract

As Cloud computing emerges as a dominant paradigm in distributed systems, it is important to fully understand the underlying technologies that make clouds possible. One technology, and perhaps the most important, is the virtualization. Recently virtualization, through the use of hypervisors, has become widely used and well understood by many. Distributed Denial of Service (DDoS) attacks typically focus high quantity of IP packets at specific network entry elements; usually any form of hardware that operates on a Blacklist pattern is quickly overrun. As in the cloud computing, a large number of tenants or VM clients share the common hardware, DDoS attacks have the potential of having much greater impact than against single tenanted architectures. In this paper, various secure virtualization schemes and preventions from DDoS flooding zombie attacks are analyzed. Security threats are discussed and preventive measures from DDoS attacks and protection solutions are presented so that the companies can take the appropriate action accordingly.

Key-Words / Index Term

DDoS, flooding, attack, Cloud, recovery, prevention, secure, virtualization

References

[1]. Andrew J. Younge, Robert Henschel, James T. Brown, Gregor von Laszewski, Judy Qiu, Geoffrey C. Fox, “Analysis of Virtualization Technologies for High Performance Computing Environments”, 2011 IEEE 4th International Conference on Cloud Computing, ISSN : 978-0-7695-4460-1/11, pp. 9-16.
[2]. Farzad Sabahi, “Secure Virtualization for Cloud Environment Using Hypervisor-based Technology”, International Journal of Machine Learning and Computing, Vol. 2, No. 1, February 2012, pp. 39-45
[3]. Durairaj. M, Kannan.P, “A Study On Virtualization Techniques And Challenges In Cloud Computing”, INTERNATIONAL JOURNAL OF SCIENTIFIC & TECHNOLOGY RESEARCH, VOLUME 3, ISSUE 11, NOVEMBER 2014, ISSN 2277-8616, pp. 147-151
[4]. Ms Jayshri Damodar Pagare, Dr. Nitin A Koli, “A technical review on comparison of Xen and KVM hypervisors: An analysis of virtualization technologies”, International Journal of Advanced Research in Computer and Communication Engineering, Vol. 3, Issue 12, December 2014, ISSN (Online) : 2278-1021 , ISSN (Print) : 2319-5940, pp. 8828-8832
[5]. V RaviTeja Kanakala, V.Krishna Reddy, K.Thirupathi Rao, “Analysis on Virtualization Technologies in Cloud”, International Journal of Advanced Research in Computer Engineering & Technology (IJARCET) Volume 3 Issue 7, July 2014, pp 2567-2574.
[6]. Gabriel Cephas Obasuyi, Arif Sari, “Security Challenges of Virtualization Hypervisors in Virtualized Hardware Environment”, Int. J. Communications, Network and System Sciences, 2015, Vol. 8, pp. 260-273, http://dx.doi.org/10.4236/ijcns.2015.87026
[7]. V. A. Meshram, V. V. Meshram, P. V. Khandare , Dr. S. R. Sakhare, “Cloud Computing and Virtualization Security: A Survey”, International Journal of Computer Trends and Technology (IJCTT) – volume 12 number 4 – Jun 2014, ISSN: 2231-5381, pp. 167-170
[8]. Kanika, Navjot Sidhu, “Analysis of Virtualization: Vulnerabilities and Attacks over the Virtualized Cloud Computing”, International Journal of Emerging Technologies in Computational and Applied Sciences (IJETCAS), Vol. 8(issue 5), March-May, 2014, pp. 391-396
[9]. Syed Asad Hussain, Mehwish Fatima, Atif Saeed, Imran Raza, Raja Khurram Shahzad, “Multilevel classification of security concerns in cloud computing”, Applied Computing and Informatics, 2016, ISSN: 2210-8327, pp.1-9
[10]. Theepan Moorthy and Sathish Gopalakrishnan, “IO and data management for infrastructure as a service FPGA accelerators”, Journal of Cloud Computing: Advances, Systems and Applications, 2017, pp. 1-23
[11]. Diego Perez-Botero, Jakub Szefer and Ruby B. Lee, “Characterizing Hypervisor Vulnerabilities in Cloud Computing Servers”, in Proceedings of the Workshop on Security in Cloud Computing (SCC), May 2013.
[12]. Swati Pawar, Sarvesh Singh, “Performance Comparison of VMware and Xen Hypervisor on Guest OS”, International Journal of Innovative Computer Science & Engineering, Volume 2 Issue 3; July-August-2015; Page No. 56-60