CLOUD FIREWALL UNDER BURSTY AND CORRELATED DATA TRAFFIC: A THEORETICAL ANALYSIS
ABSTARCT :
Cloud firewalls stand as one of the major building blocks of the cloud security framework protecting the Virtual Private Infrastructure against attacks such as the Distributed Denial of Service (DDoS). In order to fully characterize the cloud firewall operation and gain actionable insights on the design of cloud security, performance models for the cloud firewall become imperative. In this paper, we propose a multi-dimensional Continuous-Time Markov Chain model for the cloud firewall that takes into account the burstiness and correlation features of the legitimate and malicious data traffic. By adopting the Markov-Modulated Poisson process (MMPP) and the Interrupted Poisson Process (IPP), we identify the workload conditions under which the cloud firewall might be subject to a loss of availability. Furthermore, by comparing the IPP and Poisson attacks, we numerically verify that the cloud firewall is inherently vulnerable to a burstiness-aware attack which might seriously compromise its operation. Additionally, we characterize the joint harmful impact of burstiness and correlation on the cloud firewall that might lead to performance degradation. Finally, we design an elastic cloud firewall by proposing a MMPP-driven load balancing procedure that provisions virtual firewalls dynamically while fulfilling a Service Level Agreement (SLA) latency specification.
EXISTING SYSTEM :
• The existing framework incorporates the issue like keeping from the assault worker exercises through manual force and kept up in the current framework.
• Security level of the existing framework is extremely low, kept up information may get lost or robbery by the unapproved clients.
• The much of the time mentioned site pages, pictures, and most mentioned customers are not followed out rapidly and the report age is exceptionally intense.
• The client system’s resource limitations are removed in the design of the existing detection systems that limits their efficiency in today’s large-scale applications.
• In contrast, we propose to create new micro-FWs in new administrative domains, where they are completely independent of previously existing ones on those domains.
DISADVANTAGE :
• When it comes to the type of data source, burstiness and correlation have a significant impact on the cloud firewall performance.
• Our objective is to gain actionable insights into the impact of burstiness in the cloud firewall performance. To do so, we consider that malicious users follow an IPP data source while the legitimate users join the system by means of a MMPP data source.
• It stems from the fact that burstiness, which is translated into the formations of clusters of data packets over the time line, has a direct impact on the waiting line of queueing systems by producing an above the average traffic load that causes a quick and abrupt increase in the queuing length.
• A bursty data source has a harmful impact on the buffer occupancy by making it to grow quickly and abruptly.
• The presented analysis unfolded a number of design guidelines such as the conditions under which the cloud firewall might severely underperform, the inherent vulnerability of the cloud firewall when facing a burstiness-aware attack, and the negative impact of a joint correlated and bursty attack.
PROPOSED SYSTEM :
• In contrast with the current DDoS traceback strategies, the proposed methodology has various benefits it is memory non-concentrated, effectively versatile, powerful against parcel contamination, and autonomous of assault traffic designs.
• The aftereffects of broad trial and recreation contemplates are introduced to show the viability and productivity of the proposed strategy.
• The proposed methodology is generally not quite the same as the current PPM (probabilistic bundle stamping) traceback instrument, and it outflanks the accessible PPM technique.
• In view of this fundamental change, the proposed procedure conquers the acquired downsides of bundle checking techniques, like restricted versatility, gigantic requests on extra room, and weakness to parcel contaminations.
• The proposed strategy can work autonomously as an extra module on switches for checking and recording stream data, and speaking with its upstream and downstream switches when the pushback methodology is done.
ADVANTAGE :
• It becomes mandatory to characterize the performance of cloud firewalls under legitimate traffic and DDoS attack.
• To accurately evaluate the performance of a cloud-based firewall, the full characterization of the system and workload should be put forward.
• The proper understanding of cloud firewalls under DDoS attacks will pave the way for a more secure cloud service provisioning, it becomes pivotal to analyze its performance under bursty and correlated data traffic.
• The impracticability of such approach lies on factors as performance degradation, single point of attacks for DDoS, economy, resource optimization, etc.
• By specifying the system as a MMPP/D/m/K queue model, they concluded that the multiplexer performance, which is quantified in terms of blocking probability and mean delay, is degraded when the burstiness increases.
|