Identification and Avoidance of DDoS Attack for Secured Data Communicationin Cloud
Journal: International Journal of Science and Research (IJSR) (Vol.4, No. 4)Publication Date: 2015-04-05
Authors : Aaqib Iqbal Wani; Janaki Raman V.; N. Priya;
Page : 1747-1751
Keywords : Cloud computing; DDoS attacks; Dynamic Resource allocation; System Modelling;
Abstract
Cloud is turning into a prevalent computing platform. Certainly, a question arises on the off chance that we can crush the scandalous DDoS attacks in a cloud environment. A DDoS attack can collapse the whole system in a Cloud Server environment, however in case of cloud it is not that powerful but still to some extend disturbs the normal activity of the system. At the point when a DDoS attack occurs in a client environment, we devote the idle resources of the cloud to clone adequate Intrusion Prevention Systems for the exploited client in order to rapidly channel out attack packets and ensure the QoS (Quality of Service) for benign users simultaneously. In the proposed model we deploy multiple Intrusion Prevention System (IPS) to screen client activity and filter the requests in light of the conduct and forward to the corresponding servers through cloud server. Each server would have certain space designated in the cloud server. The IPS-s continually monitor the activity of the users to counteract DDoS attacks.
Other Latest Articles
- An Improved Approach to Forecast Equity Market Using Time Series Method
- Implementation of Wavelet Based Enhanced Pyramid Decomposition Algorithm for Pixel-Level Image Fusion
- Secure and Improvised Edge Based Steganograghy
- Combination of Plasma Ultra-Sensitive CRP and Homocysteine as Diagnostic and Predictive Protocol for Acute Myocardial Infarction
- RTL Design and FPGA Implementation of Canny Edge Detector with Real Time Threshold Adjustment Capability
Last modified: 2021-06-30 21:44:39