Skip to main content

A Unified and End-to-End Methodology for Predicting IP Address for Cloud and Edge Computing

  • Conference paper
  • First Online:
Advances in Systems, Control and Automations (ETAEERE 2020)

Abstract

The extensive usage of Internet is the major cause of more cyber-attacks. And these attacks are mainly with IP spoofing. So, the IOT devices must be secured to stop the IP spoofing and that involves the authorization of the source address of IP packets which are received at the gateway. This is important to stop an user who is unsanctioned from utilizing the IP address as the flooding packets and source to the gateway. From then on, the assigned bandwidth to allow users is used. All unique file names and file attributes are registered daily by tenants on the virtual machine and from these file lists and IP events often import specific data into CSP. Then, the assessing task will be done by the TWCP for remaining everyday log details and mailing the security risk information to all the tenants. We designed and implemented the DTOS program (DNS TRAFFIC QUERY PROGRAM) to analyze the DNS traffic. The previous IP address and also the calculation of the next IP address were performed. The analyzing and the prediction of the IP address is done mainly in two important cloud computing providers and discovered that the real entropy given by the specified IP addresses is restricted. Here, we consider many predictive models, such as the Markov process model which produces prediction data of the addresses from the connected IP addresses.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 299.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 379.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 379.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. M.A. Venkatesulu, IP routing, in Linux TCP/IP Architecture, Design and Implementation. 2008, Press: Wiley-IEEE. 900 p.

    Google Scholar 

  2. D.E., Comer Internetworking With the concepts, protocols, and architecture of TCP/IP Ed., Sixth Edition. 1. 1. 1. 2014: PHI PVT-learning. LTD.

    Google Scholar 

  3. C.M., Kozierok TCP/IP Guide A Reference Comprehensive, Illustrated Internet Protocols. 2005: Publisher and distributor Shroff PVT. LTD. India

    Google Scholar 

  4. M.S. Reynolds, DDoS Internet based attacks of the next decade, in IEEE Systems Assurance Conference, Man and Cybernetics Knowledge Society, 2003

    Google Scholar 

  5. A. Mukaddam, et al., IP detection spoofing using changed hop count, in 28th International Conference on Advanced Knowledge Networking and Applications (IEEE), 2014

    Google Scholar 

  6. C. Jin, N. Agrawal, K.G. Shin, Protection against spoofed IP traffic using Filtering Hop-Count. IEEE/ACM Netw. Trans. 15(1), 40–53 (2007)

    Google Scholar 

  7. S. Tapaswi, N.A. Agrawal, Lightweight approach to detect spoofed cloud DDoS attacks at low/high rate IP, in IEEE 7th International Symposium on Cloud Computing and Infrastructure (SC2) in 2017, Aug 2017

    Google Scholar 

  8. S.G. Bhirud, V. Katkar, Light weight strategy for identification and prevention of IP-ARP spoofing, in 2011 Second International Internet Conference of the Asian Himalayas (AH-ICI), Aug 2011

    Google Scholar 

  9. C. Fancy, K.R. Santhosh, A dedicated setup for spoofing identification via IP-traceback, in International Conference on Smart Sustainable Systems (ICISS), 2017

    Google Scholar 

  10. K. Benton, et al., Filtering spoofing of source IP using feasible reverse path forwarding with SDN, in 2015 IEEE Communications and Network Security Conference (CNS), Aug 2015

    Google Scholar 

  11. A. Christy, P. Thambidurai, Efficient information extraction using machine learning and classification using genetic and C4. 8 algorithms. Inform. Technol. J. 5, 1023–1027 (2006)

    Article  Google Scholar 

  12. M.P. Selvan, R. Selvaraj, Monitoring Fishy activity of the user in social networking, in 2017 International Conference on Information Communication and Embedded Systems (ICICES), Feb 2017. IEEE (2017), pp. 1–5

    Google Scholar 

  13. E. Weippl, K. Krombholz, J. Ullrich A. Dabrowski, H. Hobel, Security IPv6: Attacks and countermeasures in nutshell, in The 8th USENIX Offensive Technology Workshop (WOOT 14), San Diego, CA: Asociación USENIX, 2014

    Google Scholar 

  14. P. Kieseberg, J. Ullrich, K. Krombholz, Recognition with IPv6: a pattern-based approach to scanning, in 10th International Conference on Availability, Reliability and Security 2015, Aug 2015, pp. 186–192

    Google Scholar 

  15. M. Selvi, P.M. Joe Prathap, WSN data aggregation of dynamic routing by QoS analysis. J. Adv. Res. Dyn. Control Syst. 9(18), 2900–2908 (2017)

    Google Scholar 

  16. S. Prince Mary, D. Usha Nandini, B. Ankayarkanni, R. Sathyabama Krishna, Big data deployment for an efficient resource prerequisite job. J. Comput. Theor. Nanosci. 16(8), 3211–3215 (2019)

    Google Scholar 

  17. Sheela, A.C. Santha, C. Kumar, Duplicate web pages detection with the support of 2D table approach. J. Theor. Appl. Inf. Technol. 67(1) (2014)

    Google Scholar 

  18. S.L. JanyShabu, C. Jayakumar, Multimodal image fusion and bee colony optimization for brain tumor detection. J. Eng. Appl. Sci. Asian Res. Publ. Netw. (ARPN) 13(8), 2899–2904 (2018)

    Google Scholar 

  19. J. Refonaa, M. Lakshmi, Machine learning techniques for rainfall prediction using neural network. J. Comput. Theor. Nanosci. 16(1–5), 1546–1955 issue to be indexed in SCOPUS (2019)

    Google Scholar 

  20. J.K. Karthika, V.M. Anu, A. Veeramuthu, An efficient attribute based cryptographic algorithm for securing trustworthy storage and auditing for healthcare big data in cloud (2006)

    Google Scholar 

  21. S.P. Deore, A. Pravin, On-line devanagari handwritten character recognition using moments features, in International Conference on Recent Trends in Image Processing and Pattern Recognition, Dec 2018 (Springer, Singapore, pp. 37–48)

    Google Scholar 

  22. J. Wu. LAS, J. Bi, Zhang, An successful method of antispoofing, using existing information, in 23rd International Electronic Communications and Networks Conference (ICCCN), 2014

    Google Scholar 

  23. Levy and Bremler-Barr, Prevention of spoofing process, in Proceedings IEEE, 24th Annual Joint IEEE Computer and Communications Societies Conference, 2005

    Google Scholar 

  24. R.I. Minu, G. Nagarajan, Bridging the IoT gap through edge computing, in Edge Computing and Computational Intelligence Paradigms for the IoT (IGI Global, 2019), pp. 1–9

    Google Scholar 

  25. T.P. Jacob, Implementation of randomized test pattern generation strategy. J. Theor. Appl. Inf. Technol. 73(1) (2015)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Vutukuri Manasa .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2021 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Manasa, V., Charishma Jayasree, A.C., Selvi, M. (2021). A Unified and End-to-End Methodology for Predicting IP Address for Cloud and Edge Computing. In: Bhoi, A.K., Mallick, P.K., Balas, V.E., Mishra, B.S.P. (eds) Advances in Systems, Control and Automations . ETAEERE 2020. Lecture Notes in Electrical Engineering, vol 708. Springer, Singapore. https://doi.org/10.1007/978-981-15-8685-9_60

Download citation

Publish with us

Policies and ethics