100% found this document useful (1 vote)
232 views20 pages

Bahir Dar University School of Computing Department of Computer Science

The document is a research proposal that aims to develop a denial of service (DoS) attack mitigation system for cloud environments. It outlines the background and problem statement, objectives to design and implement an enhanced DoS mitigation system (Enhanced DDoS-MS) framework. The methodology will include reviewing existing solutions, identifying their strengths and weaknesses, and presenting the principles and evaluation of the proposed system using simulation tools. If successful, the system could help make cloud services continuously available and accessible to users.

Uploaded by

ayenew dessaleng
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
100% found this document useful (1 vote)
232 views20 pages

Bahir Dar University School of Computing Department of Computer Science

The document is a research proposal that aims to develop a denial of service (DoS) attack mitigation system for cloud environments. It outlines the background and problem statement, objectives to design and implement an enhanced DoS mitigation system (Enhanced DDoS-MS) framework. The methodology will include reviewing existing solutions, identifying their strengths and weaknesses, and presenting the principles and evaluation of the proposed system using simulation tools. If successful, the system could help make cloud services continuously available and accessible to users.

Uploaded by

ayenew dessaleng
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 20

Bahir Dar University

School of Computing
Department of Computer Science
Research proposal On:

PREVENTING DISTRIBUTED DENIAL OF S ERVICE


ATTACKS IN CLOUD ENVIRONMENTS

Presented By:

Yared Dessalegne

PROPOSAL 1
 Introduction/Background
 Literature review
 Statement of the problem
 Objective The Study
 Methodology
 Scope and limitation
 Significance of the study
 Work and Budget Plan

PROPOSAL 2
INTRODUCTION
Cloud computing is the utilization of hardware and software combined.

It provides services to end users over a network like the internet.

A cloud computing structure relies on three service layers:

 Platform as a Service (PaaS).

 Software as a Service (SaaS) .

 Infrastructure as a service(IaaS).

PROPOSAL 3
Cont…
Cloud customer

Software as a service

Platform as a service

Infrastructure as a service

Cloud provider

PROPOSAL 4
Cont…

Cloud computing has key benefits ,Some of the advantages are:

 its ability to store large amount of data remotely,

and share services in a dynamic environment.

However cloud computing faces many challenges from those the


challenges the most common one is Security.

So the main issue in this proposal is protection of cloud infrastructure


and services from DOS attack.

PROPOSAL 5
Cont…
A DoS attack occurs when an attacker (or a malicious user) attempts to
completely consume all available resources by:

 sending massive amounts of bogus traffic to the victim.

 A DoS attack typically consumes bandwidth but can also consume


memory, CPU cycles, file space, or any other resource that is necessary
for normal operation .

PROPOSAL 6
Literature Review

Existing prevention Techniques :

 There are many methods proposed for tackling DDoS attacks such as
CLAD,SOS, WebSOS, and Fosel.

Hence, it is noticed that the existing techniques focused on some


aspects and ignored or failed to meet the requirements of others.

PROPOSAL 7
cont…

Proposed prevention Techniques :

related literature from different sources (books, Internet, journals, etc.)


will be review to understand DoS attack problems on cloud computing
environment.

The existing solutions still have limitations with regard to encounter


DDoS and EDoS attacks.

PROPOSAL 8
Cont….

So to solve the problem, a new framework is proposed to fill this gap by
including the strong aspects of the existing solutions and strengthen the
weak ones.

The framework is called Enhanced DDoS-Mitigation System


(Enhanced DDoS-MS).

PROPOSAL 9
Statement of the Problem

Studies have been conducted in the past few years to propose solutions
to the problems of cloud computing services security issues. Among the
different threats, DoS attack is becoming the most critical.
It denies cloud services users from using their access right on virtual
infrastructure.
It withdraws the cloud costumers from using cloud services.
 Its impact is not as such simple the degree can range from mild service
degradation to complete loss of service.

PROPOSAL 10
cont…

There are a number of methods proposed to encounter these attacks.


However, existing solutions still have limitations for example:

 it prevents the legitimate users from accessing the targeted servers.

it still increases the end-toend latency .

the verification process is not enough to protect the system.

So to fill the above gaps we propose a new framework DDoS Mitigation


System (DDoS-MS).

PROPOSAL 11
Objective of the study

General objective :

 The general objective of this proposal to develop a DoS

attack mitigation system on the cloud environment.


Specific objective :
To achieve the general objective of this proposal, the
following specific objectives are identified.

PROPOSAL 12
cont…

To design Enhanced DDoS-Mitigation System (Enhanced DDoS-MS).

To implement the network system without an active firewall configuration.

To implement the network system with the existence of firewall and without
active attacks.

To design the network system with the existence of firewall under active
attacks .

To design the network system with an active policy system on the firewall.

PROPOSAL 13
Methodology
 In order to achieve the general and specific objectives mentioned
above, I will use the following methods.

The most current researches in the area of cloud computing on DoS


attacks problems will be review.

Identifying the strength and weakness of solutions proposed by


previous researchers.

we will use a new solution called Enhanced- Mitigation System


(Enhanced-MS) .

Its principle, architecture, mechanism, and evaluation using OPNET


simulation tool will be present.

PROPOSAL 14
Cont….
This figure shows how the proposed system will work.

PROPOSAL 15
Scope

 In this proposal mainly focuses on developing an architectural


framework for DoS attack mitigation on cloud computing.

 It particularly focuses on DDoS. So, some results of the proposal may


not be applicable for non-cloud computing systems .

PROPOSAL 16
Significance

The result of this proposal may contribute to :

the cloud customers can obtain any cloud services from cloud
providers with out any challenges.

so the cloud services are available and accessible at all times.

It will increase the cloud industry.

PROPOSAL 17
Work plan
Tasks November December January February

Nov 15-30 Dec 1-6 Dec 6-30 Jan 1-12 Jan 12-30 Feb1-20 Feb21-
30

Literature
review
Data
collection
Primary Data
Sources
Secondary
Data Source
Data Analysis
Document
submission

PROPOSAL 18
Budget plan
No . Item Total cost in Dollar($)

1 Books /Reference materials 1500

2 Stationary ,and mobile card 1500

3 Photocopying and Printing 1500

Total 4500$

PROPOSAL 19
RESEARCH METHODOLOGY 20

You might also like