Abstract—DDoS attacks are launched through sending a large quantity of packets to a target machine, using instantaneous teamwork of multiple hosts which are distributed throughout the Grid computing environment. Today DDoS attacks on the Internet in general and especially in Grid Computing environment has become a visible issue in computer networks. DDoS attacks are easy to generate but their detection is a very difficult task and therefore, an attractive weapon for hackers. DDoS streams do not have familiar characteristics, therefore currently available IDS cannot detect these attacks perfectly. Similarly, there implementation is a challenging task. In practice, Gossip based DDoS attacks detection mechanism is used to detect such types of attacks in network, by exchanging traffic over line. Gossip based techniques results in network congestion and have overhead of extra packets. Keeping the above drawbacks in mind, we are going to propose a DDoS detection and prevention mechanism, that has the beauty of being easy to adapt and more reliable than existing counterparts. We are going to introduce entropy based detection mechanism for DDoS attack detection. Our proposed solution has no overhead of extra packets, hence resulting in good QoS. Once DDoS is detected, any prevention technique can be used to prevent DDoS in Grid environment.
Index Terms—Normalized entropy (NE), denial of service (DoS), grid simulator (GridSim).
Muhammad Zakarya and Muazzam Ali Khattak are with Department of
Computer Science, Abdul Wali Khan University, Mardan, Pakistan (email: email@example.com, firstname.lastname@example.org).
Izaz Ur Rahman is with Department of Computing & Mathematics, Brunel University, London, UK (e-mail: email@example.com).
Ayaz Ali Khan is with COMSATS Institute of Information Technology, Islamabad, Pakistan (e-mail: firstname.lastname@example.org).
Cite: Muhammad Zakarya, Muazzam Ali Khattak, Izaz Ur Rahman, and Ayaz Ali Khan, "Grid High Availability and Service Security Issues with Solutions," International Journal of Engineering and Technology vol. 4, no. 6, pp. 729-729, 2012.