Free Essay

Secure Cloud Node

In:

Submitted By kambizzle09
Words 2565
Pages 11
SECURING CLOUD NETWORK NODES AGAINST DoS ATTACKS

Turnitin Score 15%
Boman K. Avong
Health Informatics and Administration
University of Maryland University College

Author Note
This research paper is prepared for ITEC 610 9043 taught by Dr. Richard Taylor of the University of Maryland University College

Abstract
Cloud computing is an emerging technological advancement and in recent times the technology has gained popularity because of its ability to increase system performance, efficient use of computer resources and also scalability. As with any internet technology, security is a big challenge for cloud computing services. Denial of Service (DoS) attacks targeted at cloud end node systems are possible because of how vulnerable these node systems are. The level of security at the node systems is not matched to that at the server level. Cloud node networks are the major entry points for DoS attacks and other malicious attacks in a cloud computing environment.
This paper will discuss various DoS attacks and techniques and also discuss the role of Distributed Denial of Service (DDoS) on distributed computer networks. I will also discuss how DoS attacks are the major threats to cloud services, entry points of DoS which are cloud end nodes and recommend how these attacks can be mitigated. DoS attacks on the cloud node computers are the major security challenges cloud services face. I will also recommend techniques that can prevent DoS on cloud node networks.
Introduction
Denials of Service (DoS) are malicious attacks made in an attempt to breach security by an intruder on vulnerable computer networks. Malicious messages are broadcasted to occupy the resources of a network node to disable functionality. The affected network node or server processes unwanted computing cycle and thereby network response becomes slow. It keeps node resources unavailable. How an adversary commits a DoS attack may vary. The most common form of attack is temporarily or permanently suspends host services connected to the internet. While DoS breaches through one network node, Distributed Denial of Service (DDoS) attacks are breached through multiple network nodes targeting one victim.
Many forms of DoS or DDoS attacks violate the security of a network such as Ping of Death, Operating System Attacks, Teardrop, Locking Authentication, SYN Flooding and Snork attacks. Attacks are targeted towards financial services, user traffic, DNS server, administrative servers and credit card payment gateways(Caroline, 2009). Because cloud services are vulnerable, server level security is needed to ensure cloud node from DoS attacks.

Fig 1: DoS Attack; Intermediate node zombie comprised by hacker and computer virus
Fig1 shows how a hacker using a hacker control server controls zombie terminals across the globe to target a victim node. This type of DoS is common because shutting down the source of the attack is very difficult because there are so many terminals that will need to be brought down.

What is Denial of Service Attacks (DoS)?
Denial of Service (DoS) attack is an attempt to lose valuable resources which may have sensitive critical enterprise system. Some types of DoS attacks even use up all of the process in cloud server. The receiving end of a DoS attack may reduce useful performances, such as e-mail solutions, Internet connections or Web access. Some forms of DoS attacks can occupy all the bandwidth or even can utilize full system resource, such as server memory(Hallberg, 2005). Some of the worst-case circumstances we analyze over previous times several decades are a Website, used by many individuals having to stop function because of excessive DoS attack.
Types of DoS attacks
DoS attacks usually do not result theft or security loss, however the effect can lead to loss of resources leading to millions of dollars when services are interrupted. Some types of DoS attacks are outlined below.
Ping of Death Attack: Intruders send traffic beyond what a server can handle, ping requests are more than 65,536 of data. When the packet data exceeds 65, 536 packets are splitted into small fragments and reassembled when data goes through the network. This is also vulnerability because attackers split packets and the total packets received will still be more than the allowed amount. Even if a network admin restricts more data transfer usage, still this is not an adequate security against a ping of death attack.
Teardrop Attack: It is an attack taking advantage of a weak point when restoring IP packet and potentially confuses the receiving system. The attacker forms a sequence of IP fragments with extending offset fields. When this excessive size of packets are received the received nodes tries to reassemble the malformed fragments and fails. As a result the node reboots or gives a critical error message.
Buffer Overflow: Data transferred to a buffer exceeds the amount of the storage capacity of the buffer. And as a result, data flows to another buffer where it is not meant to be stored. Buffers can only hold a certain amount of data and this leads to corruption of data because of overflow. Malicious attackers usually launch these buffer attacks with the intention of corrupting data, a special code with instructions on how to carry out the attack is sometimes imbedded in the overflow.
TCP SYN Attack: SYN flooding is an attack taking advantage of the TCP three-way handshake. An attacker sends large volume of connection that cannot be completed. Connection queues up and prevents service to authentic TCP users.
Smurf Attack: When a hacker knows the transmitted servers in a network, the hacker issues a ping command. The source IP address in this ping command is counterfeit and it searches as if the ping comes from an inner network. When the broadcast server gets the ping request, then it relays the ping request to the entire network and all the machines in the network return a response. These responses are again rerouted by the transmitted server to the target machine.
DDoS Attacks and Techniques
DDoS is an advanced level of DoS attack. Similar to DoS, DDoS also tries to stick the valuable services running on a server by broadcasting packets to the receiving server in a manner that the server cannot handle it(Ronghua & Peng, 2008).
Generally, DDoS follows of 3 segments: Master, slave and victim. The master is the main attacker who is the person behind machine. The slave is the network node which is controlled by Master. Victim (can be cloud node) is the target resourceful server. Master informs the slaves to launch attack on the victim’s computer. This is a coordinated attack. The attacker logs into the master node and commands the slave to launch an attack on a particular victim. Slaves then react by starting a TCP or Smurf attack on the victim. Distributed network environments are more vulnerable to DDoS attacks because of the presence of multiple machines. Each master pc controls a large number of slave computer as zombie server to perform the attack. So the real scenario is big enough for blustering the attack from a large number of machines rather from specific node.
Extremely DDoS attacks pay attention to the transport and network layers of OSI model. These layers are known as layer 3 and 4 accordingly. Through these layers, the attacker tries to flood the network and sends fake broadcast request like ICMP request or flood attacks. Attackers generally spoof all information in sending packets as well as the source IP packet size; the receiver now sees the request as a real request.
Methodology to Overcome DoS on Cloud Network Nodes
To protect cloud node and cloud network from becoming vulnerable to DoS attacks, many precautionary alternatives are applied by network administrators which include: * Implement router filters. This will reduce the exposure to several denial-of-service attacks. If attack is committed to the system, security patches need to install for preventing TCP SYN flooding. * All the inner and outer traffic must go through content filter or firewall so that malware, viruses and data sniffing can be prevented. The system administrator must have authority to monitor all users’ activity whenever needed. * Disable any unwanted network services. This can restrict the ability of an intruder to take advantage of those solutions to perform a DoS attack. * Restrict service and user by quota systems. Monitor the system efficiency and set up baselines for common action. Use the baseline to evaluate uncommon levels of disk activity, CPU utilization, or network traffic. * Routinely analyze physical security with regard to present needs. * Use “Packet Tracer”, “Nagios” or a similar tool to identify changes in settings information or other files. * Ensure spare parts and redundant server so that any critical server affected by DoS attack can be replaced immediately without service interruption. * Establish and sustain frequent back-up plans and guidelines, particularly for important settings information. * Establish and sustain appropriate security password guidelines, especially access to extremely privileged accounts such as UNIX root or Microsoft Windows Administrator.
By capturing traffic with Wireshark (a packet monitoring tool), a DoS attack can be identified. DoS attacks are commonly recognized as inflow of SYN floods from different networks. The GeoIP localization will need to be enabled if the source of the packet must be traced(Sang & Tae, 2003).

Fig 2: Wireshark window for packet capturing
How DoS affects Information Security System
Any purposeful attempt to cut off web application or network from its desired clients qualifies as a DoS attack. Such attacks have been efficiently implemented against cloud services. DoS attacks render services to go offline costing damages in millions of dollars. This also force IT staff to spend useful sources protecting network resources against intruders.

Future Improvements
Security issues are rising in the cloud computing environment. Cloud system authentication and access control are principle concern for secure data transaction. A user in the Cloud Computing environment has to complete the user validation process required by the service provider before attempting login. Validation keys will have to be strong to lower the level of risk to information stored in the database.
There are no solid security technologies in Cloud Computing. Since we consider Cloud Computing as the extension of the existing IT technologies so it is possible to apply access control and user authentication process from IT perspective. Access control is a security technique that restricts a process from another. Technologies used to authenticate a user are Id/password, public key validation, security question etc. Boost memory, higher bandwidth, capacity and reliability ensure server availability at any timestamp. Also improving security through advanced redundancy and error checking features will keep user material safe and secure in the cloud server(Thomas & Thomas, 2003).
Users of cloud environment complete the user authentication process as mandatory for the service provider whenever they use new cloud service. Generally a client signs up with personal information and a service provider provides a user ID and authentication method for user verification after the signup is completed. After then the client uses the ID and the verification technique to function user validation when the user accesses to use the offered cloud computing service. Unfortunately, there is a probability that safety of verification technique can be penetrated by an attack during the process of verification, and then it could cause several informative losses.

Conclusion
Cloud computing is a rapidly growing field, as new technology emerges it adopts these technology. Despite the security challenges of cloud computing, benefits of using cloud services outweighs the bad. The paper tries to explain all these security challenges of cloud computing and vulnerabilities. The impact of security vulnerability on cloud users and providers is usually DoS. Attackers target the cloud network nodes which are easier to penetrate and securing these cloud nodes with server level security will help reduce the risk of DoS attacks.

References
Almorsy, M., Grundy, J., & Ibrahim, A. S. (2011, 4-9 July 2011). Collaboration-Based Cloud Computing Security Management Framework. Paper presented at the Cloud Computing (CLOUD), 2011 IEEE International Conference on.
Amanatullah, Y., Lim, C., Ipung, H. P., & Juliandri, A. (2013, 13-14 June 2013). Toward cloud computing reference architecture: Cloud service management perspective. Paper presented at the ICT for Smart Society (ICISS), 2013 International Conference on.
Bradley, R., Pratt, R., Thrasher, E., Byrd, T., & Thomas, C. (2012, 4-7 Jan. 2012). An Examination of the Relationships among IT Capability Intentions, IT Infrastructure Integration and Quality of Care: A Study in U.S. Hospitals. Paper presented at the System Science (HICSS), 2012 45th Hawaii International Conference on.
Bush, A. A., Tiwana, A., & Arun, R. (2010). Complementarities Between Product Design Modularity and IT Infrastructure Flexibility in IT-Enabled Supply Chains. Engineering Management, IEEE Transactions on, 57(2), 240-254. doi: 10.1109/tem.2010.2040741
Caroline, M. (2009). Twitter crippled by denial-of-service attack. Retrieved from http://www.cnet.com/news/twitter-crippled-by-denial-of-service-attack/
Da Silva, L. F., & Brito e Abreu, F. (2010, Sept. 29 2010-Oct. 2 2010). An IT Infrastructure Patterns Approach to Improve IT Service Management Quality. Paper presented at the Quality of Information and Communications Technology (QUATIC), 2010 Seventh International Conference on the.
Gholami, B., Kaviani, F., & Zabihi, E. (2009, 28-30 Dec. 2009). Web 2.0, a Boost in IT Infrastructure Flexibility and Team Collaboration. Paper presented at the Computer and Electrical Engineering, 2009. ICCEE '09. Second International Conference on.
Hallberg, B. (Ed.). (2005). Networking: A Beginners Guide (4th Edition ed.): McGraw-Hill.
Jie, W., Jian, C., Leckie, J. O., & Shensheng, Z. (2004, 14-16 Sept. 2004). Managing e-government IT infrastructure: an approach combining autonomic computing and awareness based collaboration. Paper presented at the Computer and Information Technology, 2004. CIT '04. The Fourth International Conference on.
Lynda, M., Robert, D., & Deborah, L. (2009). Corporate Information Strategy and Management: Text and Cases: McGraw- Hill Irwin.
Mark, S. (2011). Information Security: Principles and Practice. New Jersy: John Wiley & Sons.
Marques, F., Sauve, J., & Moura, A. (2006, 3-7 April 2006). Business-Oriented Capacity Planning of IT Infrastructure to Handle Load Surges. Paper presented at the Network Operations and Management Symposium, 2006. NOMS 2006. 10th IEEE/IFIP.
Png, I. L., Tan, B. C. Y., & Khai-Ling, W. (2001). Dimensions of national culture and corporate adoption of IT infrastructure. Engineering Management, IEEE Transactions on, 48(1), 36-45. doi: 10.1109/17.913164
Riliskis, L., & Osipov, E. (2013, 23-26 Oct. 2013). Coexistence of cloud technology and IT infrastructure in higher education. Paper presented at the Frontiers in Education Conference, 2013 IEEE.
Ronghua, W., & Peng, N. (2008). Containing Denial-of-Service Attacks in Broadcast Authentication (pp. 1-3).
Sang, H., & Tae, H. (2003). Fuzzy Logic Anomaly Detection Scheme for Directed Diffusion Based Sensor Networks.
Scheibenberger, K., & Pansa, I. (2008, 7-7 April 2008). Modelling dependencies of IT Infrastructure elements. Paper presented at the Business-driven IT Management, 2008. BDIM 2008. 3rd IEEE/IFIP International Workshop on.
Shaikh, F. B., & Haider, S. (2011, 11-14 Dec. 2011). Security threats in cloud computing. Paper presented at the Internet Technology and Secured Transactions (ICITST), 2011 International Conference for.
Thomas, D., & Thomas, D. (2003). Past and Future Internet Disasters: DDoS attacks survey and analysis (pp. 10-12).
Zhijun, K. (2008, 19-19 Dec. 2008). A Framework for Investigating the Impact of IT Infrastructure and E-Commerce Capability on Firm Performance. Paper presented at the Business and Information Management, 2008. ISBIM '08. International Seminar on.

Similar Documents

Premium Essay

Emergent Topics Cloud Computing

...Title: Emergent Topics – Cloud Computing I work for a medium size corporation and they need to integrate an abundance of data, but the current infrastructure is not enough for the BI functionality that is required. Purchasing backend hardware for data storage is becoming a thing of the past. In house costs of support, hardware purchase and maintenance, and facilities management can be extremely expensive. Modern technology has spawned cost effective alternatives that can challenge in-house infrastructure performance and cost. Our recent network, bandwidth upgrade has increased our options for effective data storage and BI solutions. Cloud computing technology has come leaps and bounds from its inception. Cloud computing is basically the use of remote servers over a network, typically, the internet for data storage and retrieval. The servers are located in a data center managed by IT professionals and monitored all day, every day. Customers lease the infrastructure on a usage basis and are typically supported by a service level agreement . An intriguing new, cloud based, data warehouse service has just been released by Amazon which is fast, fully managed and offers petabyte-scale storage. The product named Amazon Redshift is also fully supportive of all our existing business intelligence tools including Jaspersoft, Microstrategy, Pentaho, Tableau, Business Objects and Cognos. There are no new languages to learn. You just load your cluster, connect your favorite...

Words: 704 - Pages: 3

Free Essay

Exalogic

...Oracle White Paper—Oracle Exalogic Elastic Cloud Brief Introduction An Oracle White Paper March 2011 Oracle Exalogic Elastic Cloud: A Brief Introduction Oracle White Paper—Oracle Exalogic Elastic Cloud Brief Introduction Disclaimer The following is intended to outline our general product direction. It is intended for information purposes only, and may not be incorporated into any contract. It is not a commitment to deliver any material, code, or functionality, and should not be relied upon in making purchasing decisions. The development, release, and timing of any features or functionality described for Oracle‘s products remains at the sole discretion of Oracle. Oracle White Paper—Oracle Exalogic Elastic Cloud Brief Introduction Introduction For most enterprise IT organizations, years of innovation, expansion, and acquisition have resulted in sprawling infrastructure that stretches the limits of manageability. While the individual IT systems and applications in service are often well considered and expertly implemented, the sheer scale of the ongoing IT investment itself has emerged as the dominant concern. Even when best-of-breed technologies, open standards, market-leading vendors, and modern architectural practices like SOA have been employed pervasively, most enterprises now find themselves with too many platforms, too many technologies, too many domains of expertise, and too many vendors to coordinate and manage. In response, a number of technologies...

Words: 3116 - Pages: 13

Premium Essay

Mobile Cloud Computing

...of built-in sensing and better data exchange capabilities of mobile devices. As a result, mobile applications seamlessly integrate with real-time data streams and Web 2.0 applications, such as mashups, open collaboration, social networking and mobile commerce. The mobile execution platform is being used for more and more tasks, e.g., for playing games; capturing, editing, annotating and uploading video; handling finances; managing personal health, micro payments, ticket purchase, interacting with ubiquitous computing infrastructures. Even mobile device hardware and mobile networks continue to evolve and to improve, mobile devices will always be resource-poor, less secure, with unstable connectivity, and with less energy since they are powered by battery. Mobile devices can be seen as entry points and interface of cloud online services. Mobile devices (e.g., smartphone, tablet pcs, etc.) are increasingly becoming an essential part of human life as the most effective and convenient communication tools not bounded by time and place. Mobile users accumulate rich experience of various services from mobile applications (e.g., iPhone apps, Google apps, etc.), which run on the devices and/or on remote servers via wireless networks. The rapid progress of mobile computing (MC) becomes a powerful trend in the development of IT technology as well as commerce and industry fields. However, with mobility come its inherent problems such as resource scarceness, finite energy and low connectivity...

Words: 5635 - Pages: 23

Premium Essay

Gai Risk Assessment Paper

...Global Asset, Inc. (GAI) Risk Assessment Paper By _____________ May 3, 2015 CMIT 425 Professor Effective Network System In this paper I will show the management team of GLOBAL ASSET, INC. the importance/benefits of having an internally operational Information System, over the benefits they believe they will reap when they outsource such services. I will also convince and help them design a better and more secure Information System. Among the odds of outsourcing IT services there are benefits too, but the cons outdo the pros: benefits include; * Reduced operational and recruitment cost: as the cost of having an internal IT firm outdo the cost of outsourcing the same services by over 30% * Risk sharing: This helps to share some of the responsibilities with the company you are outsourcing to. * Swiftness and Expertise: Mostly the firms that take the outsourced contracts have been in the industry for a long time and have built a strong and positive company profile through the quality of service they provide. * Concentrating on main process rather than the supporting ones: Outsourcing the minor/supporting processes enables the organization to have more time to perfect or strengthen their main business operations However the disadvantages outweigh the benefits and include: * Risk of Exposing confidential data: When such an organizations outsources IT services it risks exposing its customers and companies information to third parties, as in the case...

Words: 3626 - Pages: 15

Premium Essay

Nt1330 Unit 1 Assignment 1

... Fig 1.1: Internet of Things 1.2 Cloud Computing Cloud Computing provides us means by which we can access the applications as utilities, over the internet. It allows us to create, configure and customize application online. Users can access database resources via the internet from anywhere with Cloud Computing, for as long as they need without worrying about any management or maintenance of actual resources. Fig 1.2: Cloud Computing...

Words: 1088 - Pages: 5

Premium Essay

Tech

...quality Internet-based storage should be taken for granted. It helps free developers from worrying about how they will store their data, whether it will be safe and secure, or whether they will have enough storage available. It frees them from the upfront costs of setting up their own storage solution as well as the ongoing costs of maintaining and scaling their storage servers. The functionality of Amazon S3 is simple and robust: Store any amount of data inexpensively and securely, while ensuring that the data will always be available when you need it. Amazon S3 enables developers to focus on innovating with data, rather than figuring out how to store it. Amazon S3 was built to fulfill the following design requirements: * Secure: Built to provide infrastructure that allows the customer to maintain full control over who has access to their data. Customers must also be able to easily secure their data in transit and at rest. * Reliable: Store data with up to 99.999999999% durability, with 99.99% availability. There can be no single points of failure. All failures must be tolerated or repaired by the system without any downtime. * Scalable: Amazon S3 can scale in terms of storage, request rate, and users to support an unlimited number of web-scale applications. It uses scale as an advantage: Adding nodes to the system increases, not decreases, its availability, speed, throughput, capacity, and robustness....

Words: 938 - Pages: 4

Premium Essay

Cloud Database

...No.2, April 2013 CLOUD DATABASE DATABASE AS A SERVICE Waleed Al Shehri Department of Computing, Macquarie University Sydney, NSW 2109, Australia waleed.alshehri@students.mq.edu.au ABSTRACT Cloud computing has been the most adoptable technology in the recent times, and the database has also moved to cloud computing now, so we will look into the details of database as a service and its functioning. This paper includes all the basic information about the database as a service. The working of database as a service and the challenges it is facing are discussed with an appropriate. The structure of database in cloud computing and its working in collaboration with nodes is observed under database as a service. This paper also will highlight the important things to note down before adopting a database as a service provides that is best amongst the other. The advantages and disadvantages of database as a service will let you to decide either to use database as a service or not. Database as a service has already been adopted by many e-commerce companies and those companies are getting benefits from this service. KEYWORDS Database, cloud computing, Virtualization, Database as a Service (DBaaS). 1. INTRODUCTION A database can be accessed by the clients via the internet from the cloud database service provider and is deliverable to the users when they demand it. In other words, cloud database is designed for virtualized computer environment. The cloud database is implemented...

Words: 5162 - Pages: 21

Premium Essay

Issc340 Final Paper

...For over the past several decades, information technology companies have been striving to figure out new and more effective ways to ensure that their computers and associative equipment, as well as, their clients’ devices are secure from unwanted intrusions. As computers and other electronic devices become more sophisticated and start storing more and more personal information, which includes, but is not limited to the development of technologies such as the fiber-optics, satellite communications, Bluetooth and the innovation of cloud storage, users are attempting to ensure their personal items are safe. However, while device users are trying to ensure their items are secure, there are the opposing parties that are constantly attacking and attempting to infiltrate any and all defenses posed by a target computer. An attacker can gain personal information, such as finance data, including credit card information as well as account numbers, and other important information relevant to your life. These attempts can eventually lead to success and jeopardize the people being attacked. These attacks are becoming more sophisticated and complex as well, meaning not only that technologies need to be evolved and enhanced, but also that the user needs to be more conscious than ever of exactly what they are doing on their systems. According to Dictionary.com Network security is “The protection of a computer network and its services from unauthorized modification, destruction, or disclosure”...

Words: 3328 - Pages: 14

Premium Essay

Design and Applied Research of the Distributed Real-Time Database in Smart Grid

...Design and Applied Research of the Distributed Real-time Database in Smart Grid Chunfeng Liu, Yan Jiang, Feng Zhao, Qiao Sun, Yang Zhang, Zhiqi Li, Chao Li Beijing Guodiantong Network Technology Company Ltd., No.1 Hangfeng Road, Fengtai District, Beijing, 100070, China {liuchunfeng, jiangyan, feng_zhao, sunqiao, zhangyang2, lizhiqi, lichao3}@sgepri.sgcc.com.cn database. Both timing constraints and data consistency should be taken into consider in real-time database systems when scheduling the transactions so that they can be accomplished by their corresponding deadlines[3]. For instance, both the query and update on the acquisition data of smart electricity meters, mainly working for the calculation of the multistep electricity price and electricity increment, must satisfy not only the database consistency constraints but also the time constrain, processed within the given deadlines. Apart from the time constraints that are out of the demand of continuously data tracking, timing correctness requirements are also proposed due to the need to keep data available for the decision-making activities of the controlling systems[4]. Based on these situations, real-time databases are used in a wide Keywords— Distributed, real-time database, smart grid, typical range of applications in the power industry. applications, electric energy data acquire system At the same time, the electricity data also has astounding I. INTRODUCTION quantities. In China, the scale of the data points in smart...

Words: 4176 - Pages: 17

Premium Essay

Nt1310 Unit 3 Assignment 3 Team Marketing Plan

...This topology eliminates the centralized point of failure concern seen in the star topology so if any device fails, the network will continue to function normally. Based on this advantage, low cost and ease to expand and add more devices to it, I find that the mesh topology will best serve the business needs. In addition, a large-scale project of expansion can be supported by creating multiple LANs and connecting them via fiber optic cabling into a mesh topology (LAN Network topologies, n.a.). This will create a secure network subsystems that can be assigned to each office department, limit accessibility and increase security based on credentials. It can also ease the headquarters IT navigation within the office network for troubleshooting, maintenance and...

Words: 749 - Pages: 3

Premium Essay

Windows Server

...employees and various roles required to manage their network. Windows Server 2012 will be installed to manage the following server roles. Exchange to manage company email, Active Directory to manage the domain to include users, computers, groups, sub domains, DHCP and DNS, file and print sharing, cloud storage, as well as backup solutions. There will be two locations which will require inter-site connectivity through a secure tunnel. The site in Los Angeles will house the majority of the employees while the New York location will have a smaller staff consisting of at least one employee from each department. New Features in Windows Server 2012 There are new features in Windows Server 2012 that Worldwide Advertising will be able to take advantage of. Some of these new features are as follows: You can leverage new features in Active Directory to enable employees and partners to access protected corporate data from their personal devices and at the same time manage risk and govern the use of corporate resources. Active Directory Domain Services (AD DS) in Windows Server 2012 includes new features that make it simpler and faster to deploy domain controllers (both on-premises and in the cloud), more flexible and easier to both audit and authorize access to files with Dynamic Access Control, and easier to perform administrative tasks at scale, either locally or remotely, through consistent graphical and scripted management experiences. Dynamic Host Configuration Protocol (DHCP) in...

Words: 1086 - Pages: 5

Premium Essay

Creatimg a Network Solution

...Create a Network Solution Name: Course: Tutor: Date: Create a Network Solution. Many methods of using computer networks for data storage have come up in recent years. The most common and popular approach which I personally prefer is the network attached storage (NAS).NAS allows businesses more affordably that before to store and retrieve large amounts of data. Most businesses do not consider the future expansion of their companies when creating their network solutions and end up exhausting their network resources. The increase in the data capacities of the electronic components used in today business world has led to the demand for a more convenient storage type. The ability to use a file server to store files has led to companies deploying large centralized NFS servers which are accessed by thousands of clients. Central file servers are seen as the basic solution to demands put forward. A file server is in basic terms a workstation or a personal computer hardware running on a network operating system (NOS).The NOS in this case boasts file sharing capabilities. The hard drives installed in the computers are used to provide the required storage space ranging from gigabytes to terabytes of memory space depending on the size of business. Many business owners are not justified by the use of a fully general-purpose computer as a server for simple storage services. This factor brought to the development of the network attached storage (NAS). NAS creates a system...

Words: 1467 - Pages: 6

Premium Essay

System Architecture

...new network architecture. With our insurance company moving to new headquarters in Denver, Colorado and the expansion of our company to include satellite offices on both the east and west coast we will need to have a better system architecture which would include new processors, new operating system for our computers and servers, proper data backup, cluster architecture and use of RAID. All these details are important to make sure we have the proper infrastructure in place to continue to have high availability and productive employees. Introduction With the expansion of our office into multiple locations, it is vital that we set up our architecture correctly so that we optimize our ability to process work and keep our data safe and secure. There are many options out there and many of the solutions would work just fine, but we need to make sure the options we decide on work best together...

Words: 3828 - Pages: 16

Premium Essay

Ddos Prevention Capabilities of Appcito

...CAFÉ Prepare, detect and mitigate DDoS attacks Introduction Consumers today use a wide variety of applications and smart devices to access information, make transactions and conduct business online. In addition, many enterprises have in-house applications that are used by employees to complete tasks and projects. Almost all the applications are deployed on the cloud because it offers a host of advantages. The cloud offers real time, elastic service with the option to pay as you use. But hosting the applications on the cloud also increases the possibility of attacks by malicious hackers. Most of these attacks are in the form of DDoS (distributed denial-ofservice). Virtually, there is no industry that has been spared from DDoS attacks. Such attacks prevent customers and business users from accessing applications. In a world where time is money, any application downtime is sure to affect businesses negatively. These costs range from financial losses and lost business opportunities to poor productivity. Internet and the OSI model At the heart of the cloud is the internet. Or, in other words, the cloud is an extension of the internet. The internet is a complex network connecting computers across the globe for easy transmission of data and information. This complexity arises because there are different types of hardware and software working in unison. In addition, rapid proliferation and adoption of new technologies has added to this complexity. Such a complex network...

Words: 2332 - Pages: 10

Premium Essay

Cloud Storage

...known it for the last four decades is facing significant internal and external pressures. The rapid growth of inexpensive or even free public cloud storage for consumers has created a bring-your-own storage grass-roots revolution demanding IT deliver simple self-service storage at costs far below current chargeback levels. At the same time the capacity requirements for user-generated content from sources like mobile applications is becoming a driving force in storage expansion. While public cloud options exist for enterprises they still have often unacceptable gaps in security and control despite their favorable economics compared to legacy on-premise storage. All of these factors are making it both technically and economically indefensible to just keep expanding your reliance on existing legacy NAS and SANs that suffer from years of vendor lock-in and are burdened by costly proprietary hardware. Something new is needed and the option of pushing data out to public cloud providers just isn’t feasible for organizations who need their storage to protect intellectual property and comply with regulations. But there is another cost-effective alternative. A new approach called Software-Defined Storage delivers reliable and secure private cloud storage far cheaper than legacy NAS/SAN storage and less than half the cost of business-grade public cloud storage. Building on...

Words: 4121 - Pages: 17