A Novel Cloud Computing Security Model to Detect and Prevent DoS and DDoS Attack
Journal Title: International Journal of Advanced Computer Science & Applications - Year 2014, Vol 5, Issue 6
Abstract
Cloud computing has been considered as one of the crucial and emerging networking technology, which has been changed the architecture of computing in last few years. Despite the security concerns of protecting data or providing continuous service over cloud, many organisations are considering different types cloud services as potential solution for their business. We are researching on cloud computing security issues and potential cost effective solution for cloud service providers. In our first paper we have revealed number of security risks for cloud computing environment, which has focused on lack of awareness of cloud service providers. In our second paper, we have investigated on technical security issues involved in cloud service environment, where it’s been revealed that DoS or DDoS is one of the common and significant dangers for cloud computing environment. In this paper, we have investigated on different techniques that can be used for DoS or DDoS attack, have recommended hardware based watermarking framework technology to protect the organisation from these threats.
Authors and Affiliations
Masudur Rahman, Wah Cheung
Android Malware Detection & Protection: A Survey
Android has become the most popular smartphone operating system. This rapidly increasing adoption of Android has resulted in significant increase in the number of malwares when compared with previous years. There exist l...
Three Levels Quality Analysis Tool for Object Oriented Programming
In terms of evolution of software engineering methods for complex software developments techniques, new concepts have been emerged in the software languages, which used to develop software quality models. In this researc...
Detection of SQL Injection Using a Genetic Fuzzy Classifier System
SQL Injection (SQLI) is one of the most popular vulnerabilities of web applications. The consequences of SQL injection attack include the possibility of stealing sensitive information or bypassing authentication procedur...
Detection and Classification of Mu Rhythm using Phase Synchronization for a Brain Computer Interface
Phase synchronization in a brain computer interface based on Mu rhythm is evaluated by means of phase lag index and weighted phase lag index. In order to detect and classify the important features reflected in brain sign...
New Criteria for Comparing Global Stochastic Derivative-Free Optimization Algorithms
For many situations, the function that best models a situation or data set can have a derivative that may be difficult or impossible to find, leading to difficulties in obtaining information about the optimal values of t...