An Approach for Load Balancing Among Multi-Agents to Protect Cloud Against DDos Attack
Journal Title: INTERNATIONAL JOURNAL OF COMPUTER TRENDS & TECHNOLOGY - Year 2014, Vol 9, Issue 5
Abstract
Cloud Computing is widely used technology in present era. Cloud Computing is mainly used for on demand services over the distributed servers. So it is necessary to manage the working load of participating servers for uninterrupted services. DDOS attack is one of the most important issue in cloud environment which basically focuses on prevention in service providence to the authorize users. A Multi agent based framework cam be used to protect the cloud environment from DDOS attack, but there is a major issue of load distribution among agents participating in Intrusion detection. Here in this paper, another agent is used for load distribution among the agents (Intrusion detection agents) in cloud computing. Using this approach our system may be much stronger and then agent may work in a communicating and co-coordinating manner. For this, we will use a load balancing algorithm and by using this algorithm, an efficient approach to manage load among IDAs in cloud computing can be done. In Order to accomplish it the author is using the approach of centralize load distribution.
Authors and Affiliations
Rohit Srivastava , Avinash Verma , Shadab Hussain
Database Based Validation of Union of Two Multigranular Rough Sets
Most of the traditional tools for undertaking modeling, reasoning and other computing are found not only crisp but also highly deterministic and more precise in character which usually limits their applicability in real...
Cluster Based Secure Data Broadcast of CLAODV Protocol for MANET
Ad-hoc Networks are using multicast protocol to broadcast the messages. Multicast authentication in ad-hoc networks are very challenging based on below mentioned multiple factors such as nodes have limited computing, ban...
Energy Saving Technique in Wireless Mobile Ad-hoc Network for Reliable Communication
Mobile Ad hoc Network (MANET) consists of a group of mobile nodes that can be communicated with each other wirelessly without the need to any existed communications. Mobile Ad hoc Network (MANET) consists of a group of m...
Requirement and Result of Verifying the Program Code
The verification of Java/C++ codes is critical, especially for special projects where human life will be at stake. A system is required that uses integrated reasoning to split each verification condition into a conjuncti...
Efficient Fault-Tolerant Strategy Selection Algorithm in Cloud Computing
Cloud computing is upcoming a mainstream feature of information technology. More progressively enterprises deploy their software systems in the cloud environment. The applications in cloud are usually large scale and con...