Distributed Port Scan Attack in Cloud Environment

Pages: 16 (2954 words) Published: December 10, 2013
Distributed Port-Scan Attack in Cloud Environment
Prachi Deshpande1, Aditi Aggarwal1, S.C.Sharma1, P.Sateesh Kumar1 1

Indian Institute of Technology Roorkee, Roorkee-India-247 667 {deprachi3, aditi127, scs60fpt, prof.sateesh} gmail.com

Ajith Abraham 2,3


Machine Intelligence Research Labs (MIR Labs), WA, USA.
IT4Innovations - Center of Excellence, VSB - Technical University of Ostrava, Czech Republic. ajith.abraham@ieee.org

Abstract— Cloud Computing is becoming a promising
technology for processing a huge chunk of data. Hence, its
security aspect has drawn the attentions of researchers and
academician. The security of the cloud environment must be
reliable as well as scalable.
The cloud environment is vulnerable to many security attacks. Attacks can be launched individually or in tandem. In this
article, the overview of port-scan attack and the response of IDS are studied. The experimentation is carried out using
virtual-box and SNORT, the open-source IDS.
Keywords- Cloud computing; Firewall; Distributed attacks;
Intrusion Detection System; Port-scan; Security.



According to National Institute of Standards and
Technology (NIST), Cloud computing is a model for
enabling ubiquitous, convenient, on-demand network access
to a shared pool of configurable computing resources (e.g.,
networks, servers, storage, applications, and services) that can be rapidly provisioned and released with minimal
management effort or service provider interaction [1].
Cloud computing refers to a collection of computing and
communication resources that are shared by many different
users. It is considered as internet based computing service
provided by various infrastructure providers on an ondemand basis. It provides high performance computing for many data intensive and scientific applications with easy
scalability. Deshpande et al [2] illustrated a collection of various errors and the possible solution to set up a private cloud.
Security in cloud computing is key aspect which is most
desired by a cloud user. Data privacy and security concerns
are discussed in [3] with provision of trusted third party as a solution for providing security solutions. Intrusion detection system (IDS) based approaches was proposed for cloud
security in [4]. Most general security attacks in the cloud
environment includes flooding, Denial of service, root-kits, port-scan, malwares [5-6]. An evolutionary design is
proposed in [7] for intrusion detection. Further, in this
regard, an IDS using hybrid intelligence is proposed in [8], which is helpful under variety of conditions. Further the
approach in [8] is extended for the mobile computing
environment in [9] by Alvaro et.al. To improve the

978-1-4799-1409-8/13/$31.00 2013 IEEE


performance of public cloud monitoring, a lightweight
monitoring framework was proposed in [10].The article
discussed various performance related issues in cloud
computing and its security. Different type of intrusion
detection systems in cloud with their limitations is nicely
categorized in [11].
The Criminal psychology starts with the finding the
loopholes in the system. First step toward launching the
attack is to get the information about the system by portscanning. With the aid of port-scanning, attacker can get information like open ports, supported network services, and protocols used by the host.

The attacks can be launched in various stages, of which
the first stage is to get maximum information about the
target. Scanning with stealth scanner is preferred by
intelligent attacker to retrieve information of the target. On the basis of collected information, attacker tries to gain
access of the target. After successful access of the target, the attacker tries to get the enhanced privileges to achieve its goal. Malicious code is inserted by attacker after gaining the required privileges.



In this article, port-scan attack is...

References: Communication and Control Systems 2013 (CAC2S 2013),
Deharadun-India, Apr.2013, pp.638-641.
cloud computing, Miami, FL, Jul. 2010, pp.276-279.
Security, vol.4, no.3, Mar. 2007, pp. 328-339.
Computational Aspects of Social Networks (CASoN-2012), pp. 361365, 2012.
Computer Applications, vol. 36, no. 1, Jan. 2013, pp.42–57. dio:
no.10, Oct. 2011, pp. 1565-1581.
Intelligent Systems, John Wiley and Sons, USA, Volume 22, pp. 116, 2007.
Computer Applications, Elsevier Science, Volume 30, Issue 1, pp. 8198, 2007.
Security, Elsevier Science, Volume 24/4, pp. 295-307, 2005.
Continue Reading

Please join StudyMode to read the full document

You May Also Find These Documents Helpful

  • Ping Sweeps and Port Scans Essay
  • Essay on Ping Sweeps and Port Scans
  • Ping Sweeps Ports and Scans Essay
  • Ping Sweeps and Port Scans Essay
  • environment Essay
  • Essay on Distributed Cloud Computing
  • Threat Assessment of Ping Sweeps and Port Scans Essay
  • The Cloud Essay

Become a StudyMode Member

Sign Up - It's Free