Protect Cyber Attacks In The Cloud System

Twitter0
Google+0
LinkedIn0
Facebook0
Pinterest0

Recent cyber breaches awakened the concerns about cyber Security in the SCADA systems. Advances in business model require the SCADA network to be connected with corporate networks. This means that the SCADA system is subject to be under the same potential cyber attacks as other corporate networks are. Moreover, the communication architecture is more relying on the open standard communication protocols. The use of the open communication protocols renders the SCADA system more vulnerable to cyber attacks.

CYBER THREATS IN THE CLOUD COMPUTING SYSTEM

1. CHOPCHOP ATTACK

 The attacker intercepts an encrypted frame and uses the Access Point to guess the clear text. The attack is performed as follows:

The intercepted encrypted frame is chopped from the last byte. Then, the attacker builds a new frame 1 byte smaller than the original frame. The attacker makes a guess on the last clear byte. To validate the guess he/she made, the attacker will send the new frame to the base station using a multicast receive address. If the frame is not valid (i.e., the guess is wrong), then the frame is silently discarded by the access point. The frame with the right guess will be relayed back to the network. The hacker can then validate the guess he/she made.  The operation is repeated until all bytes of the clear frame are discovered.

2. FRAGMENTATION ATTACK

          The attacker sends a frame as a successive set of fragments. The access point will assemble them into a new frame and send it back to the wireless network. Since the attacker knows the clear text of the frame, he can recover the key stream used to encrypt the frame. The attacker can use the key stream to encrypt new frames or decrypt a frame

3.  DURATION ATTACK

          The attacker exploits vulnerability in the virtual carrier-sense mechanism and sends a frame with the NAV field set to a high value (32 ms). This will prevent any station from using the shared medium before the NAV timer reaches zero. Before expiration of the timer, the attacker sends another frame. By repeating this process, the attacker can deny access to the wireless network.

  • PROJECT DESCRIPTION

It is proposed to apply an innovative technique for data encryption based on the random sequence generation using the recurrence matrices and a quadruple vector.

  • The new algorithm provides data encryption at two levels

     Level 1: Transposition

     Level 2: Encrypt using recurrence matrices and a quadruple vector

 Hence security against crypto – analysis is achieved at relatively low computational overhead. We propose to use a different recurrence matrix and quadruple vector to achieve this proposed objective.

Untitled

The symmetric encryption used in the encryption and decryption process has a less overhead mathematical calculation but of a high degree of security. As there is a dual transposition at two different level, the encryption will be of very high standard, unbreakable and can be ported anywhere when there is a demand for high degree of sensitivity is involved. The present work addresses all type of possible intrusion/cyber attacks in LAN environment. Same technology can be used to effectively defend any kind of attacks in advanced CCS.

The following two tabs change content below.

Annie Steffi Sydney

The author is a computer science engineer and she is currently pursuing MBA. She has received many National Awards in different fields.She has a passion for writing, social service and Bharatanatyam.

Latest posts by Annie Steffi Sydney (see all)