Formal Analysis of an Authentication Protocol Against External Cloud-Based Denial-of-Service (DoS) Attack

11/22/2017
by   Marwan Darwish, et al.
0

The Denial-of-service (DoS) attack is considered one of the largest threats to the availability of cloud-computing services. Due to the unique architecture of cloud-computing systems, the methods for detecting and preventing DoS attacks are quite different from those used in traditional network systems. A main target for DoS attackers is the authentication protocol because it is considered a gateway to accessing cloud resources. In this work, we propose a cloud-based authentication protocol - one that securely authenticates the cloud user and effectively prevents DoS attack on the cloud-computing system-by involving the user in a high computation process. Then, we analyze the protocol via Syverson and Van Oorschot (SVO) logic to verify the authentication process of the protocol in a cloud-computing system.

READ FULL TEXT
research
11/22/2017

Cloud-Based Secure Authentication (CSA) Protocol Suite for Defense against DoS Attacks

Cloud-based services have become part of our day-to-day software solutio...
research
12/05/2017

A Slow Read attack Using Cloud

Cloud computing relies on sharing computing resources rather than having...
research
09/07/2020

Detection of Colluded Black-hole and Grey-hole attacks in Cloud Computing

The availability of the high-capacity network, massive storage, hardware...
research
05/25/2023

FIDS: Fuzzy Intrusion Detection System for simultaneous detection of DoS/DDoS attacks in Cloud computing

In recent times, I've encountered a principle known as cloud computing, ...
research
04/15/2020

A Mobile Cloud-Based eHealth Scheme

Mobile cloud computing is an emerging field that is gaining popularity a...
research
12/30/2022

Detecting Forged Kerberos Tickets in an Active Directory Environment

Active Directory is the most popular service to manage users and devices...
research
06/03/2023

Tecnicas Avanzadas de Ciberseguridad: Integracion y Evolucion de la Kill Chain en Diversos Escenarios

The document provides an in-depth analysis of the main attack chain mode...

Please sign up or login with your details

Forgot password? Click here to reset