Abstract
Virtual Machines (VM) are very commonly used resources in a cloud environment. However, due to Distributed Denial of Service attacks, VM’s became more vulnerable and its performance gets degraded. Hence, there is an inherent need for improving the security mechanism to detect and prevent the DDoS attacks in a VM. The crux for such mechanism is about guaranteeing that fast and early detection with minimal false alarm rate and ensures that the legitimate requests are not affected. At this end, a secure framework which includes cryptographic hash functions such as MD5 and SHA256 which are suggested and used in this work to create unique hash keys for each and every cloudlet (client request) into the virtual machines to identify illegitimate users in a VM. This work also conducts experimental comparisons on the computational overheads and it is proven that SHA-256 is more secure when compared to MD5. The obtained results show that the robustness and significance of the model towards mitigating the DDoS attacks in a virtual environment with maximum accuracy.
Keywords
Introduction
Cloud computing is defined as a set of computers organized and collected together in the same or different locations, operating together to serve various clients with distinct needs and provides on-demand services with the support of virtualization technology. Cloud computing is the most user-friendly approach for customers to deal with their requirements individually through the internet. To utilize various cloud services, customers need a browser with an internet connection. In recent days the cloud services like Gmail, Hotmail, Yahoo mail, Facebook, Dropbox, etc. are extensively used. Cloud computing provides Infrastructure as a Service; the cloud infrastructure is completely virtualized to make use of hardware through the massive database and remote servers as data centers trusted third party or cloud service providers will guard the cloud infrastructure and its maintenance [1]. This makes huge IT companies and other industries attracted to adopt cloud computing for their business to minimize the cost. The latest advancement in the cloud computing platform proved to be extremely helpful to various industries and individual clients in terms of getting a number of on-demand virtual services and resources through the internet. Virtualization is one of the essential technologies which make cloud computing achievable [33, 34, 37]. However, security issues are a concern to be a major challenge to a cloud environment [4, 35, 36]. Due to the lack of security in the cloud, many organizations are not willing to trust to relocate their activities because many security issues are making the cloud resource vulnerable as well as threatening the cloud users. As the cloud environment offers numerous benefits to the user concurrently it offers the ability to the intruders. In recent years several security attacks are encountered in the cloud environment [9, 12, 32]. Among all of them, Distributed Denial of Service attack (DDoS) [4, 5, 9] is one the considerable trouble to the availability of resources in the cloud. There is a high increase of DDoS attack reported events to make it one of the most considerable threats among many attacks [6, 12]. DDoS is performed conductive to agitate the services afforded by the cloud providers. The intruder can extremely disrupt the network connectivity of the victim or completely degrade the quality of the service. The malicious user initially compromises numerous agents and then utilizes them to degrade the performance of the target system. The main intention of a DDoS attack is to make the target system not capable to provide the resources to the intended/genuine user. Several mitigation techniques have been adopted to avoid Denial of Service attacks in the past few years [19], such as encryption mechanisms [3], classification methods [2, 4, 6, 22], Scaling of resources [22, 23], service resizing [10] and Software Defined Networking [26]. As DDoS attacks can be implemented in several forms [17, 2, 6, 13], the type/form of this kind of attacks cannot be anticipated in a virtual environment. In this paper, a novel detection mechanism is proposed, that is proficient to identify the typical DDoS attacks [29] which cripple downs the performance of the virtual machine. This work primarily attempts to answer the following significant questions,
How to identify and mitigate DDoS attacks in VMs by using hash-based mechanisms? Are VMs more vulnerable under DDoS attacks? If so, to what extent does their performance damages?
In this connection, a couple of dynamic hash-based defense techniques (MD5 and SHA256) is introduced in this paper which helps to identify as well as prevent DDoS attacks by generating unique hash keys to each and every client request known as cloudlet which compraises client ID, Client IP, arrival time of cloudlet, length and size of cloudlet. The hash mechanisms which are introduced in this work can be proficient to protect the virtual machines in a cloud environment from malicious entries. This dynamic attack detection method will not only improve the detection rate of the attack but also helps to improve the performance. This work provides a practical approach towards securing the virtual machine using the cloudsim simulator. Experimental results show that this methodology reduces the malicious utilization of computation time, performance cost and network bandwidth of a VM in a cloud environment. Additionally, this work provides experimental evaluations of two hashing mechanisms individually. The rest of paper is organized as follows: In Section 2, a concise description of related/existing work is presented, Section 3 describes the scenario of DDoS attacks in VMs and illustrates the hash-based mechanisms employed in this work. Section 4 presents the experimental results and analysis. Finally, this paper concludes in Section 5.
Securing and protecting the virtual machine against Denial of Service (DoS) and Distributed Denial of Service attacks are an extremely essential part of a cloud environment [27, 30]. In recent years, various defense mechanisms have been proposed to resolve this issue [3, 7, 9, 21]. In this section, few existing mitigation mechanisms against DDoS attacks are considered briefly.
Intrusion Detection System (IDS) can be considered as the most widely used anomaly detection strategies used to identify malicious attacks which endeavours to trade off the security goals [20, 28, 31]. However, this technique arguably fails to distinguish the most potential attributes for DoS attacks which should be tended to its initial occurrence [15, 16]. [29] focused on identifying some of the potential properties of DoS attacks in view of computing weight for each of the features using the Shannon entropy calculation. However, this work doesn’t specify performance measures. [24] proposes a DDoS attack detection and prevention mechanism by using a feature selection method and Intensive Care Request Processing Unit (ICRPU). This mechanism is used to classify the incoming requests. A self-tuning Cloud examining and administration mode is developed for expansion of virtual resources in [8]. But, attack prevention schemes are clearly not specified in this work moreover this mechanism is depending on co-operative intelligent agents. Nevertheless, this method supports only small infrastructures. A mitigation scheme described in [19] comprises of constant traffic separating through field firewalls, which can contrarily channel the attack packets; disconnected particular based traffic examination by means of VNFs in the neighbourhood servers. However, this mechanism probably identifies only DDoS attacks not another type of attacks [11]. [14] describes low rate DDoS attacks which abuse the cloud flexibility keeping in order to inflict extra operational expenses to cloud service providers. Advanced deep packet inspection-based methodologies using Software Defined Networking are examined in [7]. This mechanism describes how to effectively and quickly shield virtual machines from malicious attacks without consuming its resources. However, this approach will lead to scalability issues [1]. Describes the experimental evaluation of a DDoS attack on the OpenStack cloud platform. The analysis shows that DDoS attacks [14, 26] can consume the system resources and have a very negative effect as far as performance and cost incurred to cloud customers as well as providers. [14] illustrate the hypothesis test based on tstatistic to identify Low-rate DoS assault flow in a cloud environment. Depending upon services input workloads, authors identify suspicious activities by inspecting with real thermal data. A novel and promising technology called Software Defined Networking (SDN) is discussed by [26]. This architecture provides a dynamic networking architecture for cloud computing. A variety of abilities in SDN like centralized control, software-based traffic analysis, global view of the network, dynamic updating of forwarding rules will motivate the easier identification of DDoS attacks. However, some scalability and performance issues are considered as the drawbacks of this dynamic network architecture.
A novel filtering mechanism against DDoS is proposed by [7, 25, 26]. To scrutinize the strategic communications between a malicious user as well as a defender, a prominent decoy system known as honeypot-based detection strategy is introduced by [18]. Nevertheless, the best drawback of honeypot mechanism is its thin field of view. Usually, honeypots just observe what action is coordinated against them. When a malicious user breaks into a particular system and targets an assortment of frameworks, the honeypot will be wilfully ignorant of the movement except if it is condemned exactly. Availability issues of the cloud due to a DoS attack suggested in [12], in this work, authors presented a consolidated survey of security issues in a cloud environment. [6] presents an overview of DoS and DDoS attacks that are carried out in the cloud. In addition, various defensive methods, tools, and methods were discussed. But, this kind of approaches is difficult to implement in real time scenario. The main intention of this work is designing, examining the hash-based mechanism that is used for detecting and mitigating the Distributed Denial of Service attacks in VM’s.
Proposed mechanism for categorization of DDoS attack flow from the normal flow
In this work, we are performing an experimental study of the simulation of DDoS attacks on the virtual machine instance to analyse the impact on the computing time, performance cost and accumulated bandwidth of the virtual machine which is functioning under the ideal/normal environment as well as under attack environment. Evidently, cloud services are provided to cloud customers on demand (pay per use). All the cloud services that are provided to customers are responded by virtual machines which are shared in cloud infrastructure. If any kind of DDoS attacks takes place in the virtual machine then, certainly it will increase the cost, time and bandwidth to process the incoming task/request. However, this scenario leads to the denial of service to genuine/legitimate users to process their request or task. As cloud resources and services are available to cloud clients on pay per use provision, such malicious attacks cause the customer to pay more to avail the cloud resources or services. In addition, CSP is unable to satisfy its customers needs properly.
Flowchart of the proposed mechanism.
Accordingly, we can find out virtualization technology in almost all the data centers. On the other hand, it remains strange whether virtual machines are more exposed and vulnerable to external malicious activities. If it is the case, up to which extent the performance of virtual machine degrades? We come up with a couple of hash-based mechanisms to identify, discriminate, analyse and examine the performance of virtual machines under a typical denial-of-service attack. The proposed DDoS attack detection mechanism is deployed in every virtual machine in the cloud environment. This secure approach can be proficient to perform suspicion-based traffic shaping by using hash mechanisms such as MD5 and SHA256. This approach is capable enough to prevent the illegitimate entries into the virtual machine and allows only the legitimate traffic. As a result, the performance of the VM increases and cost decreases. The basic pseudo code for identifying a DDoS attack in a VM with the assistance of hashing techniques is illustrated below.
Here, each cloudlet is represented as a request from the client to VM to perform a particular task. The flow of the proposed mechanism is illustrated in Fig. 1. Whenever a client sends a request (cloudlet) to VM, each cloudlet contains distinct client ID, client IP, cloudlet arrival time, cloudlet length (size of cloudlet executed in cloud resource) and at last the file size. All these are considered as input parameters and for each and every incoming set of above parameters, MD5 and SHA mechanisms will generate a unique hash key (Fig. 1). If the malicious user submits the same cloudlet again and again, then the resources will be allocated to those cloudlets and consequently, the regular user will suffer for the unavailability of resources.
Architecture of the attack mitigation mechanism in the virtual machine.
Therefore, in this mechanism, whenever the attacker creates duplicate cloudlets to flood the virtual machine, subsequently redundant hash keys can be generated as specified in Fig. 1. Whenever the redundant entries (cloudlets) are crossing the limit of the predefined threshold function then those can be treated as an illegitimate entry and that will be avoided from entering into the VM. Figure 2 depicts the architecture of a mitigation mechanism which is deployed in every virtual machine in the cloud and here input specifies incoming request of cloudlet. Each and every cloudlet encompasses unique client ID, client IP, cloudlet arrival time and size. This architecture illustrates the typical DDoS attack mitigation framework which is deployed in VM at the time of VM launching. This mechanism chiefly identifies suspicion-based incoming traffic shaping with the assistance of the secure generation of unique hash-keys of each and every request to the VM. Here, each and every cloudlet This approach can be able to identify malicious traffic and protects the VM from harmful resource consumption. This work also evaluates the performance of the virtual machine under attacks from multiple sources and inputs by examining different computational parameters like network bandwidth, computational cost, processing time and network bandwidth. By considering the obtained outcomes, it is proven that our proposed system is efficient enough to classify the legitimate and illegitimate entries into the system.
The effect of DDoS attack and consequent performance degradation of a virtual machine is measured by considering the parameters like computational time which is usually defined as measure of time for which a processing unit (CPU) was utilized for processing a cloudlet (task), processing cost which is referred as the cost per second a cloud resource (cost per unit of storage, cost per unit of memory, cost per unit of used bandwidth) charge to execute a particular cloudlet. Moreover, network bandwidth. Here, cloudlet is nothing but a client request to VM to perform a particular task. Moreover, Cloud clients (SaaS suppliers) need to pay for the expenses of memory and capacity when they make and instantiate VMs, though the expenses for system utilization are just acquired in case of transfer of data. The processing time of the cloudlet managed by a virtual machine is given by
where pt is processing time of a particular cloudlet (c), ct is nothing but current simulation time, cores (p) is a number of cores (processing elements) required by the cloudlet and capacity are defined as processing strength of individual elements.
MD5 (Message-Digest) algorithm
Message Digest 5 (MD5) algorithm is commonly used for the secure hash algorithm. This algorithm takes input as a message of arbitrary length and produces a fixed length output which is used for authenticating the original input message. However, MD5 is designed to be utilized as a cryptographic hash function.
Here, client Id, client Ip, cloudlet arrival time, cloudlet length and file size are the inputs and message digest for this input need to find out.
The processing involves the following steps:
Append the padded bits. The input message is padded so that the length of the message is congruent to 448, modulo 512. It means that it extended to 64 bits shy of being of 512 bits long. (At this point, single “1” bit is appended to the input message, and the remaining “0” bits are appended such that the length of the total bit equals 448 modulo 512). Append length. A 64-bit representation of input message is appended to the outcome (result) of step1 (The resultant message has a length that is an accurate multiple of 512 bits. Initialize Message Digest buffer. To calculate the message, digest a four-word buffer is used and here each of the words is a 32 bit register. These registers are initialized as a certainly fixed constant as follows:
Word A: 01 23 45 67 Word B: 89 ab cd ef Word C: fe dc ba 98 Word D: 76 54 32 10 Process message in 16-word blocks. Four auxiliary functions which receive as input message, three 32-bit words and generates as output one 32-bit word. F (X, Y, Z) = XY v not (X) Z G (X, Y, Z) = XZ v Y not (Z) H (X, Y, Z) = X xor Y xor Z I (X, Y, Z) =Y xor (X v not (Z)) (If the bits of X,Y AND Z are unbiased, the each bit of F (X, Y, Z), G (X, Y, Z), H (X, Y, Z) and I (X, Y, Z) will be unbiased and independent.) Output. The message digest produced as output is A, B, C and D. That is, output begins with the low-order byte of A and ends with a high-order byte of D.
SHA-256 is a cryptographic hash function with a length of 256 bits. In this function, a message is handled/processed by blocks of 512
Basic operations
In this algorithm, boolean operations AND, XOR and OR are used. Respectively, Bitwise complement operator and Integer addition modulo 2
Functions and constants
The algorithm uses following functions C (X, Y, Z)
Padding
To guarantee that the input message has a length of 512 bits, a bit1 is appended then, k bits 0 are appended, with k being the smallest positive number to such an extent that l
Block decomposition
For each block M {0, 1}
The first 16 are obtained by dividing M into 32-bit squares.
The remaining 48 are attained with the formula:
Hash computation
Initial, eight factors are set to their initial values, given by the first 32 bits of the fractional part of the square root of the first 8 prime numbers and the blocks M
Input and output
The input and output of this function are described as follows:
Input: M is a chain of bytes of arbitrary length
Output: a positive integer in the interval {0, 2
Cloudsim and its basic model
Cloudsim is software developed by “The cloud computing and distributed systems (CLOUDS) laboratory, University of Melbourne”. For this work, we use version 3.03. This software provided cloud framework for modelling and simulation of cloud services and infrastructures. So, under cloudsim, simulation of the virtualized data center and the creation of virtual machines can be done. This simulator allows us to create and schedule the simulated jobs. Figure 3 shows that the basic entities which are included in the cloudsim framework and the interactions among them. Initially, the cloudsim framework creates one entity named as Cloud Information Service (CIS) which is nothing but a kind of registry which contains the resources that are available on the cloud. Here, the resources are nothing but the data center and each data center contains some hosts and each host contains some virtual machine. Subsequently, the data center will be created and once it is created it must be registered in the CIS. The registration process will be done by the CIS. Each data center is having some characteristics those are nothing but the properties of the resource like resource ID, operating system, management policies (space shared or time shared), etc. Every data center may have at least one host and each host may have some hardware configurations, those are nothing but, a number of processing elements, RAM, bandwidth, etc.
Cloudsim basic framework.
In the virtualized environment, the host will be virtualized into a number of virtual machines. Eventually, every data center has some host, every host has some virtual machines. Each virtual machine again has hardware configurations like bandwidth, RAM, etc. Moreover, in this simulator, it is possible to construct the virtual machine configurations based upon the user needs. User can able to configure the critical characteristics of a virtual machine-like storage and memory. As per the cloudsim framework, whenever the data center is created then it just needs to register with the CIS. Once the registration process is done then, the broker is created which is nothing but a data center broker class and it is responsible for submitting tasks to the data entered. This broker basically retrieves the resource information which is registered with the CIS. Whenever the data center is registered with CIS then the broker retrieves the data center characteristics. Once, broker retrieves the data center characteristics subsequently, the set of cloudlets (tasks) will be submitted to the broker. Eventually, the broker is having all the details of the registered data center then, it will directly interact with the data center and assign the cloudlets to the VMs which are running on a particular host. Hence the three entities like CIS, data center and broker plays a major role in this cloud simulation model. So, this is the basic framework that cloudsim tool provides. Here, more than one task can be submitted to the virtual machines based on scheduler policies. This simulation framework provides three different kinds of policies those are nothing but, VM allocation policy, VM scheduler policy, and Cloudlet scheduler policy. All the policies are either time shared or space shared. Therefore, the above specified policies and entities will govern the cloudsim framework.
The effectiveness of the proposed secure hash mechanisms could be evaluated over simulator named as CloudSim. The simulation environment is intel core i5, 2.10 GHz and 8 GB memory. This work additionally brings out tentative comparisons upon computational resources of two hashing approaches such as MD5 and SHA-256 independently. In this work, we analyse the degradation of performance experienced by the virtual machine. Evidently, the performance degradation is evaluated by considering the variations of time and cost in attack and non-attack scenarios.
Performance evaluation of computation time in attack and non-attack scenario.
Performance evaluation of processing cost in attack and non-attack scenario.
Performance evaluation of accumulated bandwidth cost in attack and non-attack scenario.
Primarily, a random set of cloudlets (client requests to VM) (100, 300, 500, 1000, 1500, 2000, 2500, 3000) were submitted to the virtual machine then, processing time (time taken to process a particular cloudlet) and cost (total cost for running the cloudlet in the cloud resource) for each set of cloudlets to be calculated in attack as well as non-attack scenarios. Tables 2–4 show the difference in processing time, cost as well as accumulated bandwidth when a virtual machine is operating under attack/non-attack environments as well as the secured environment. As we observed, the computation time, cost and bandwidth are significantly affected and increased by the DDoS attack. Subsequently, our proposed hash-based mechanisms were applied to the set of cloudlets individually and according to the predefined threshold, redundant or illegitimate entries can be able to identify.
The proposed mechanism considers five parameters of the cloudlet such as client id, client IP, requesting time, cloudlet length and file size which are used to classify the incoming cloudlets. Here, we analyze and compare the fluctuations of computational time, processing cost and accumulated bandwidth with legitimate as well as an increasing number of incoming illegitimate cloudlets. Later, we analyze the time and cost of the virtual machine after applying the MD5 and SHA algorithms. As the results are shown in Tables 2–4 the proposed dynamic hashing mechanism is the potential to detect the incoming illegitimate entries into the system. This method is stable enough to resist the DDoS attacks in a virtual environment with maximum accuracy. Moreover, the observations of this work were compared with the computational overheads of two hashing strategies, i.e., MD5 and SHA-256. However, the running time of MD5 is faster than SHA256 because of output hash key size. The comparison of computation time between MD5 and SHA-256 algorithms. However, when considering the performance cost and accumulated bandwidth, SHA256 is more efficient then MD5. The execution comparisons between MD5 and SHA algorithms proves that SHA is more efficient and secure than MD5 on the other hand MD5 is faster than SHA.
Hash collisions occur whenever those two given inputs give a similar hash output. It is simple to generate collisions in MD5. Comparatively, MD5 offers poor security against collisions than SHA256. Contrarily, SHA 256 it is not simple to produce a collision in SHA256 (collision resistant) and this algorithm is currently unbroken or in other words “massive” (a greater number of operations than SHA-1, yet with a similar structure).
Comparison between MD5 and SHA-256
Comparison between MD5 and SHA-256
SHA256 is considerably more secure as it does not currently have any known attacks against hash collisions. Generally, Hash collisions demonstrate that two unique entries (cloudlets) that have the same hash values compromise the respectability of incoming data. Comparatively, SHA-256 offers longer hashes and therefore increased difficulty in finding collisions. MD5 approach no longer measured cryptographically protected as hash collisions and disruptions have been initiate. In contrast, SHA-256 begins by depicting by padding the incoming message with its possible length a 1 and 0’s preceding at that point part it into 32-bits. This approach incorporates rightward moves in the bits as one of its activities extending the collection of tasks past those in the SHA-1 series. Moreover, SHA256 has more rounds i.e, these rounds have an additional rotation of bits and the combining of state terms/words are somewhat distinct. This comparative study of MD5 and SHA-256 algorithms is helped to understand the proper way and different methods to secure cloud resources from unauthorized access and guarantee integrity over the incoming traffic.
We first measure the effect of DoS activity on the usage of computation time while the virtual machine sits out of idle. To this end, the measurements were performed by observing the time consumption of the different set of cloudlets as shown in Table 2. To outline the impact of enabling DDoS flooding on a virtual machine, Table 2 depicts the usage of computational time when DDoS attacks are enabled and in addition when they are disabled. Under the DDoS attack, the virtual machine consumes more computational time. The proposed hash-based mechanism provides a promising solution to categorize the malicious entries from genuine ones and keeps the attack packets before they extend and gives more accurate results. This paper is an early work to discuss mitigating DDoS attacks in a virtual machine and analysing the performance of virtual machines under DDoS attacks. As a new research field, there are numerous issues to be additionally explored and improved. There are many promising avenues to be investigated further. We show some of them here in view of our comprehension. Initially, a couple of hash-based mechanisms such as MD5 and SHA256 to mitigate DDoS attacks in a cloud environment are implemented, which simplifies as well as improves our analysis and makes our experiments feasible by filtering malicious entries into the system.
Performance evaluation based on computational time
Performance evaluation based on computational time
As we increase the attack rate the relating increment in CPU use show that the virtual machine will keep on degrading as they are uncovered to higher attack rates. The obtained results show that the proposed hash-based mitigation mechanism facilitates to reduce malicious entries into the system. Moreover, comparison of computation time between MD5 and SHA-256 algorithm is analysed. Resultantly, the running time of the Secure Hashing Algorithm is slower than MD5 algorithm.
In this work, we also focused on the processing cost as a chief parameter to analyze the performance evaluation of a virtual machine. Cloud computing offers the dynamic provision of resources. Because of DDoS attacks considerable resource utilization experienced by the virtual machines. As can be seen, high resource utilization is available for VM in the DDoS case (Table 3).
Performance evaluation based on processing cost
Performance evaluation based on processing cost
This reveals that high resource consumption phenomenon is experienced at whatever point the VM encounters a DDoS stream that contains malicious entries at a high rate. We likewise tried a various set of cloudlet bundles and found that this flooding of cloudlets sent at a high rate achieving the end system prompts these phenomena. In addition, these attacks look to devour the accessible data transfer capacity (bandwidth) of the virtual network, to such an extent that legitimate traffic can’t achieve its destination. Table 4 shows the bandwidth consumption when an attack is taken place. The high saturation of bandwidth leads to large performance degradation as well as unavailability of resources to genuine clients. Additionally, a comparison of parameters like computation cost and accumulated bandwidth between MD5 and the SHA-256 algorithm is analysed. Subsequently, SHA256 is efficient and more secure than MD5 algorithm.
Performance evaluation based on accumulated bandwidth cost
We systematically analyzed the individual efficiency of MD5 and SHA256 for concern parameters in the system, such as computation time, performance cost, network bandwidth and prominently, the obtained results showed that SHA256 is more efficient and secure then MD5. From this, the performance degradation of virtual machines under DDoS attacks are illustrated. parameter-based analysis and simulation confirm that one can identify and mitigate DDoS attacks in a virtual environment. Considering more number of parameters would certainly improve the efficiency and robustness of the proposed approach. The identification and incorporation of additional parameters for the detection of DDoS attacks are needed.
VMs are very commonly used resources in a cloud environment. However, DDoS attacks degrade the performance of the virtual machine and make its services unavailable to the intended users. In this scenario, it is essential to develop a system which is based on the categorization to ensure cloud security and availability. This work provides a secure framework that incorporates a couple of cryptographic hash functions such as MD5 and SHA256 which are used to produce unique hash keys for each and every entry into the virtual machines. The obtained result shows both mechanisms are proficient to identify the attacks accurately and it results in performance improvement as well as a reduction of cost. Moreover, comparative analysis of computational overheads of both MD5 and SHA-256 approaches is done in this work. Noticeably, SHA256 is more efficient and secure then MD5. This comparison provides appropriate ways and various techniques to secure virtual resources from unauthorized access and assurance the integrity over the insecure networks. As a part of our future work, we want to explore this hash-based model for malicious attack resource consumption in a real cloud environment.
Footnotes
Authors’ Bios
