본문 바로가기
  • Home

An Encrypted Response Model using Application Access Failure information for the Attack of IP Spoofing in a Cloud Computing Environment

  • Journal of Knowledge Information Technology and Systems
  • Abbr : JKITS
  • 2015, 10(6), pp.643-651
  • Publisher : Korea Knowledge Information Technology Society
  • Research Area : Interdisciplinary Studies > Interdisciplinary Research
  • Published : December 31, 2015

Yang Liu 1 KimSangBok 1 PARK JAE HEUNG 1 BAEJONGMIN 1

1경상대학교

Accredited

ABSTRACT

The big data is typically collect a large amount of information. It is processed of receiving a service and is based on a cloud computing environment. These environments are easily exposed to illegal accesses, which use IP Spoofing compared to that of a single system. In this study traceback information is used to identify normal users in order to response to illegal accesses in a cloud computing environment. Then, services are provided after the identification process for the normal access frequency of users by comparing it with access failure information within a specific time. If there exists mismatches in traceback information or the access failure information exceeds a critical value, the access will be identified as an illegal access. Then, the access is immediately interrupted and is recorded as illegal access information. In addition, as an access that is attempted at an unexpected location, which is not registered in the existing user traceback information due to movements of normal users, is presented, the data will be provided after encrypting it for responding illegal accesses due to leaks of OTP. The model presented in this study is safe for authorized users against illegal accesses, which use IP Spoofing in a cloud computing based big data collecting environment, and improves service availabilities.

Citation status

* References for papers published after 2023 are currently being built.