Downloads: 104 | Views: 278
Research Paper | Computer Science & Engineering | India | Volume 4 Issue 4, April 2015 | Popularity: 6.2 / 10
Identification and Avoidance of DDoS Attack for Secured Data Communicationin Cloud
Aaqib Iqbal Wani, Janaki Raman V., N. Priya
Abstract: Cloud is turning into a prevalent computing platform. Certainly, a question arises on the off chance that we can crush the scandalous DDoS attacks in a cloud environment. A DDoS attack can collapse the whole system in a Cloud Server environment, however in case of cloud it is not that powerful but still to some extend disturbs the normal activity of the system. At the point when a DDoS attack occurs in a client environment, we devote the idle resources of the cloud to clone adequate Intrusion Prevention Systems for the exploited client in order to rapidly channel out attack packets and ensure the QoS (Quality of Service) for benign users simultaneously. In the proposed model we deploy multiple Intrusion Prevention System (IPS) to screen client activity and filter the requests in light of the conduct and forward to the corresponding servers through cloud server. Each server would have certain space designated in the cloud server. The IPS-s continually monitor the activity of the users to counteract DDoS attacks.
Keywords: Cloud computing, DDoS attacks, Dynamic Resource allocation, System Modelling
Edition: Volume 4 Issue 4, April 2015
Pages: 1747 - 1751
Make Sure to Disable the Pop-Up Blocker of Web Browser
Downloads: 656 | Views: 2004
Computer Science & Engineering, India, Volume 9 Issue 7, July 2020
Pages: 1454 - 1458Heart Disease Prediction with Machine Learning Approaches
Megha Kamboj
Downloads: 401 | Views: 722
Computer Science & Engineering, India, Volume 7 Issue 11, November 2018
Pages: 1951 - 1955Hadoop Performance Improvement using Metadata and Securing with Oauth Token
Swapnali A. Salunkhe, Amol B. Rajmane
Downloads: 386 | Views: 703
Computer Science & Engineering, India, Volume 9 Issue 12, December 2020
Pages: 1 - 3Comparative Study of Conventional Desktop Computer and Compute Stick
Aadarsh Sooraj, Sooraj G.
Downloads: 354 | Views: 700
Computer Science & Engineering, India, Volume 3 Issue 6, June 2014
Pages: 629 - 632Review Paper on Secure Hashing Algorithm and Its Variants
Priyanka Vadhera, Bhumika Lall
Downloads: 336 | Views: 690
Computer Science & Engineering, India, Volume 3 Issue 6, June 2014
Pages: 2148 - 2152The Impact and Application of 3D Printing Technology
Thabiso Peter Mpofu, Cephas Mawere, Macdonald Mukosera