SOAiCE: Simulation of Attacks in Cloud Computing Environment

Security of data is the most important concern on the network. When information is transmitted over the network, various attacks are launched by attacker on the information being sent by the source. In the present era, as per Insurance Regulatory and Development Authority all financial transaction involving payment of premiums towards renewal of the Customer's Insurance Policies are widely preferred on electronic commerce site. In this paper, a Policy Premium Payment application has been designed and developed in java for the purpose of secure financial transaction over the internet. This application is deployed on cloud. The web application is secure for the transaction. Google App engine which, a google cloud is used for the deployment of the financial transaction application. In this paper, various network attacks such as Brute force attack and Dictionary attack have been discussed and demonstrated.

[1]  Anurag Jain,et al.  Analysis of brute force attack using TG — Dataset , 2015, 2015 SAI Intelligent Systems Conference (IntelliSys).

[2]  P. D. Sheba Kezia Malarchelvi,et al.  A survey of jamming attack prevention techniques in wireless networks , 2014, International Conference on Information Communication and Embedded Systems (ICICES2014).

[3]  Keshav Jindal,et al.  Analyzing Spoofing Attacks in Wireless Networks , 2014, 2014 Fourth International Conference on Advanced Computing & Communication Technologies.

[4]  Dijana Oreski,et al.  Analysis of phishing attacks against students , 2016, 2016 39th International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO).

[5]  S. H. Krishnaveni,et al.  A Study of Data Storage Security Issues in Cloud Computing , 2015 .

[6]  Naresh Vurukonda,et al.  A Study on Data Storage Security Issues in Cloud Computing , 2016 .

[7]  Ian Lumb,et al.  A Taxonomy and Survey of Cloud Computing Systems , 2009, 2009 Fifth International Joint Conference on INC, IMS and IDC.

[8]  Athanasios V. Vasilakos,et al.  Security in cloud computing: Opportunities and challenges , 2015, Inf. Sci..

[9]  Rahul Johari,et al.  CAVEAT: Credit Card Vulnerability Exhibition and Authentication Tool , 2014, SSCC.

[10]  Nazim Agoulmine,et al.  State of the art and challenges of security SLA for cloud computing , 2017, Comput. Electr. Eng..

[11]  Jun Hu,et al.  Research of SQL injection attack and prevention technology , 2015, 2015 International Conference on Estimation, Detection and Information Fusion (ICEDIF).

[12]  Rahul Johari,et al.  EAST: Exploitation of Attacks and System Threats in Network , 2015 .

[13]  Paul Tavolato,et al.  Detection of Man-in-the-Middle Attacks on Industrial Control Networks , 2016, 2016 International Conference on Software Security and Assurance (ICSSA).

[14]  Jacob Jose,et al.  Securing passwords from dictionary attack with character-tree , 2016, 2016 International Conference on Wireless Communications, Signal Processing and Networking (WiSPNET).

[15]  K. Selvamani,et al.  Data Security Challenges and Its Solutions in Cloud Computing , 2015 .

[16]  Abeer Alsadoon,et al.  Distributed Denial of Service attack on cloud: Detection and prevention , 2015, 2015 International Conference and Workshop on Computing and Communication (IEMCON).

[17]  G. Murali,et al.  Security Issues in Service Model of Cloud Computing Environment , 2016 .

[18]  Manoj Singh Gaur,et al.  DDoS attacks in cloud computing: Issues, taxonomy, and future directions , 2017, Comput. Commun..

[19]  Guiran Chang,et al.  Surveying and Analyzing Security, Privacy and Trust Issues in Cloud Computing Environments , 2011 .