New Age Cyber Threat Mitigation for Cloud Computing Networks 9815136127, 9789815136128

Increasingly global and online social interactions and financial transactions involve digital data, computing devices an

149 7 3MB

English Pages 182 Year 2023

Report DMCA / Copyright

DOWNLOAD EPUB FILE

Table of contents :
Cover
Title
Copyright
End User License Agreement
Contents
Foreword
Preface
Ransomware: Rising Threat of New-Age Digital Extortion
1. INTRODUCTION
2. RANSOMWARE VARIANTS & PROPAGATION
2.1. Crypto-Ransomware
2.2. Locker Ransomware
3. RANSOMWARE ATTACK & PROTECTION
4. RESEARCH METHODOLOGY
5. PROPOSED MALWARE SOLUTION
5.1. Environment Setup
5.2. Malware Code Analysis Environment
5.3. Malware Reporting Environment
6. RESULTS OBTAINED
CONCLUSION
CONSENT FOR PUBLICATION
CONFLICT OF INTEREST
ACKNOWLEDGEMENT
REFERENCES
Design A Resilient Network Infrastructure Security Policy Framework
1. INTRODUCTION
2. INFORMATION SECURITY POLICY
2.1. Stage #1: Security Policy Design
2.2. Stage #2: Security Policy Design
3. PROPOSED NETWORK SECURITY POLICY FRAMEWORK
3.1. Architectural Foundation Model
3.2. Operational Security Design
4. RESEARCH WORK
CONCLUSION
DISCLOSURE
CONSENT FOR PUBLICATION
CONFLICT OF INTEREST
ACKNOWLEDGEMENT
REFERENCES
Security Algorithms For Cloud Computing
1. INTRODUCTION
2. ASYMMETRIC ALGORITHMS
2.1. RSA
2.2. Diffie-Hellman Key Exchange (D-H)
3. SYMMETRIC ALGORITHMS
4. RELATED WORK PERFORMED
4.1. Comparison Parameters
4.2. Performance Evaluation
5. PERFORMANCE RESULTS
CONCLUSION
DISCLOSURE
CONSENT FOR PUBLICATION
CONFLICT OF INTEREST
ACKNOWLEDGEMENT
REFERENCES
Solutions for DDoS Attacks on Cloud Environment
1. INTRODUCTION
2. REPORTS AND TRENDS
2.1. Types of DDoS Attacks
3. PROPOSED SOLUTIONS
3.1. On-Premise-based Solution
3.2. ISP DDoS Solution
3.3. Scrubbing Defense DDoS Mitigation
4. MULTI-TIERED NETWORK ARCHITECTURE
CONCLUSION
DISCLOSURE
CONSENT FOR PUBLICATION
CONFLICT OF INTEREST
ACKNOWLEDGEMENT
REFERENCES
Three-tier Network Architecture to Mitigate DDoS Attacks on Hybrid Cloud Environments
1. INTRODUCTION
2. DDOS IMPACT ANALYSIS
3. TRADITIONAL SECURITY V/S NEW-AGE DDOS ATTACKS
4. EXISTING DDOS SOLUTIONS
4.1. On-premise Based
4.2. Cloud-Based Security Services
4.3. Hybrid Cloud-based Security
5. PROPOSED DDOS SOLUTION
5.1. Infrastructure Setup
5.2. Parameters For Data Analysis
5.3. Performance Analysis
5.3.1. Single-Tier Network Architecture
5.3.2. Three-Tier Network Architecture
CONCLUSION
DISCLOSURE
CONSENT FOR PUBLICATION
CONFLICT OF INTEREST
ACKNOWLEDGEMENT
REFERENCES
Review of Solutions for Securing End-User Data Over Cloud Applications
1. INTRODUCTION
2. CHALLENGES IN CLOUD COMPUTING
2.1. End User Challenges in Cloud
2.2. Gaps around End User Computing Applications
3. LITERATURE REVIEW
4. PROPOSED SOLUTIONS TO CLOUD DATA SECURITY ISSUES
4.1. End-user Security using Public Key Cryptography
4.2. Use Multi-factor Authentication
4.3. Use of Cloud Aware Applications
5. RESEARCH WORK PERFORMED
CONCLUSION
DISCLOSURE
CONSENT FOR PUBLICATION
CONFLICT OF INTEREST
ACKNOWLEDGEMENT
REFERENCES
DDoS Attacks, New DDoS Taxonomy, And Mitigation Solutions
1. INTRODUCTION
2. RELATED WORK
2.1. As per the Degree of Attack Automation
2.2. As per Exploitation of Vulnerabilities
2.3. As per Attack Rate Dynamics
2.4. As per the Impact of Attacks
3. REVIEW OF DDOS RESEARCH
4. EFFECTIVE DDOS DETECTION PARAMETERS
5. PARAMETERS FOR DDOS COUNTERMEASURE
CONCLUSION
• FUNCTIONALITY – BE ABLE TO REDUCE, IF NOT BLOCK, THE IMPACT OF THE DDOS ATTACK, NO MATTER HOW LARGE OR POWERFUL THE DDOS FLOOD ATTACK IS
DISCLOSURE
CONSENT FOR PUBLICATION
CONFLICT OF INTEREST
ACKNOWLEDGEMENT
REFERENCES
Designing A Framework For Cloud Service Agreements For Cloud Environments
1. INTRODUCTION
2. CLOUD SERVICE AGREEMENTS OVERVIEW
3. LITERATURE REVIEW
4. CSA METRICS
4.1. CSA Metrics for SaaS
4.2. CSA Metrics for IaaS
4.3. CSA Metrics for PaaS
4.4. CSA Metrics for STaaS
4.5. Proposed Framework for Cloud Service Agreement (CSA)
CONCLUSION
DISCLOSURE
CONSENT FOR PUBLICATION
CONFLICT OF INTEREST
ACKNOWLEDGEMENT
REFERENCES
Comparing Single-Tier And Three-Tier Infrastructure Designs Against DDoS Attacks
1. INTRODUCTION
2. LITERATURE SURVEY
3. DDOS ATTACK IMPLEMENTATION
3.1. Architecture Design and Implementation
4. PERFORMANCE ANALYSIS
4.1. Single Tier Logs and Data Analysis
4.2. Three-Tier Logs and Data Analysis
5. PERFORMANCE DATA VALIDATION
Interpreting the T-Test Results
5.1. T-Test Validation for Average ICMP
T-Test Summary
Test Interpretation
5.2. T-Test Validation for Page Load Response
Test Interpretation
5.3. T-Test Summary for Browser Throughput Parameters
Test Interpretation
5.4. T-Test Summary for Application Server Response Parameters
5.5. T-Test Summary for Application Server Response Parameters
Test Interpretation
CONCLUSION
DISCLOSURE
CONSENT FOR PUBLICATION
CONFLICT OF INTEREST
ACKNOWLEDGEMENT
REFERENCES
Security Challenges For Cloud-Based Email Infrastructure
1. INTRODUCTION
2. LIMITATIONS OF EMAIL PROTOCOLS
3. LITERATURE SURVEY
4. RESEARCH PERFORMED
4.1. Survey of Email Service Providers
Survey Results for Survey#1
4.2. Survey of Email Practices by Users
Survey Results for Survey#2
4.3. Survey of Email User Awareness
Survey Results for Survey#3
5. SECURITY ADVANTAGES OF CLOUD-BASED EMAIL SOLUTIONS
CONCLUSION
DISCUSSIONS AND RECOMMENDATION
DISCLOSURE
CONSENT FOR PUBLICATION
CONFLICT OF INTEREST
ACKNOWLEDGEMENT
REFERENCES
Efficient Fault Tolerance in Cloud Environments
1. INTRODUCTION
2. FAULT TOLERANCE FOR CLOUD ENVIRONMENTS
3. LITERATURE SURVEY
4. RESEARCH WORK
4.1. Fault Tolerance Assessment Algorithm
4.2. Fault Tolerance Case Evaluations
4.3. Reliability for Cloud Models
CONCLUSION
FUTURE SCOPE
DISCLOSURE
CONSENT FOR PUBLICATION
CONFLICT OF INTEREST
ACKNOWLEDGEMENT
REFERENCES
Subject Index
Back Cover

New Age Cyber Threat Mitigation for Cloud Computing Networks
 9815136127, 9789815136128

  • 0 0 0
  • Like this paper and download? You can publish your own PDF file online for free in a few minutes! Sign Up
Recommend Papers