Article Preview
TopIntroduction
Internet of Things connects all kind of physical devices across the world in order to make all the devices communicate each other without human intervention. To establish IoT environment, Sensors act as input devices and Actuators works as output devices. Across the globe there are millions of sensors are fixed and generated data can be stored in the cloud server for data processing. IoT data are time sensitive for most of the applications like Health care management, mining industries, Industrial IoT and so on. Hence the significant of processing IoT data is highly Time sensitive, so delay of millisecond may cause very serious problem. In order to protect the IoT data from attackers, suitable attack detection mechanism is required to maintain the IoT services (Samalia et al., 2017).
Mantra of cloud computing is its resource abstraction nature, for example, cloud users need not install any particular hardware or software for difficult operations. Security issues are major hurdles for adopting cloud computing. Cloud Data Center has to maintain some security standards to protect resource from attackers to sustain resource availability (Jegadeeswari et al., 2016; Iyengar et al., 2015). Cloud Computing achieves greater benefits by incorporating various distributed networking technologies like distributed computing, grid computing, and virtualization (Reddy et al., 2016). Challenging security threat for availability of the Datacenter resource is Distributed Denial of Service (DDoS) attack (Durairaj & Manimaran, 2015). DDoS attacker intention is to collapse the entire cloud network or memory resources of Data Center (Figure 1) either by exhausting of victim bandwidth or by stealing the sensitive information from the victim end (Girma et al., 2015; Chandrika & Bharadwaj, 2016). Security issue like resource availability heavily affects the IoT environment because of resource requirement at the right time is the core features of IoT services. In order to provide the IoT data to its legitimate end users, need to propose the mechanism to detect DDoS attacks to protect the IoT sensor generated data from attackers (Jing et al., 2014).
The existing attack detection mechanisms are not effective when incoming traffic rate is high. Hence, suitable attack detection mechanism needs to be devised for protecting DC resources from DDoS attack to provide service to the legitimate users. Attackers are mainly using IP Spoofing technique to denial resource availability for the legal users by generating DDoS attack (TCP SYN flood, UDP flood, and ICMP flood) and control over virtual machines (Nandwani et al., 2016). Objective of this paper is to improve resource availability of Data Center and to provide effective mechanism to protect resources from attackers in order to render service to legal users. DDoS attacks make use of vulnerability of sharing network in cloud environment and adversary can discover the traffic on VMs and saturates it, and in due course which also affect the other VMs within this subnet (Mahmoud et al., 2015). Reasons for this kind of attacks are that network of data center is usually under – provisioned, critical, shared resource nature, and VMs located in the cloud are easily deployed and terminated (Piraghaj et al., 2015).