Detection of DDos Attack using HCIF Algorithm in Cloud Computing

Abstract

Cloud Computing is an emerging buzzword in the IT industry and offers three types of services as Software as a Service (SaaS), Infrastructure as a Service (IaaS) and Platform as a Service (PaaS). To launch a coordinated Denial of Service attack against one or more targets Distributed Denial of Service (DDoS) attack uses distributed computers. By using client/server architecture, the executioner is able to multiply the effectiveness of the DoS significantly by harnessing the resources of multiple unsuspecting accomplice computers which plays as an attack platform. DDoS is emerging as the weapon of choice for cyber-extortionists, hackers, and political "hacktivists". We use many Intrusion Detection Techniques (IDS) to detect DDoS attack like SNORT, Suricata etc. IDS is of different types like Active IDS, Passive IDS, Host Intrusion Detection Systems (HIDS), Distributed Intrusion Detection System (DIDS), Hybrid Intrusion Detection System and Network Intrusion Detection Systems (NIDS). In this paper proposed algorithm HCIF (Hop Count Inspection and Filtering) is used to detect and discard spoofed packets by considering transmission delay time and minimum, maximum thresholds which increases response time of Intrusion Detection Process in Cloud environment.

Authors and Affiliations

Bhoomika Gupta , M. Afshar Alam

Keywords

Related Articles

Modified Histogram Based Contrast Enhancement Using Unsharp masking Filter For Medical Images

Low contrast digital images analysis is major drawback in the medical image processing. An image with low contrast has a narrow histogram located typically toward the middle of the intensity scale. Low contrast digit...

Biometric Security Techniques For IRIS Recognition System

Iris recognition is an automated method of biometric identification that uses mathematical patternrecognition techniques on video images of the irides of an individual's eyes, whose complex random patterns are unique...

High Speed Design of an Information Lossless 8 Bit Carry Select Adder using CNT FET

Basic reasons for research on reversible logic are the power consumption and heat dissipation. Existing systems have designed carry select added using TSG gate, for four bit addition. In the proposed system an enhan...

An improved contourlet transform technique for image watermarking

In this paper, contourlet transform technique is explored to hide the information confidentially from the unauthorized users. The image is decomposed into subbands by using contourlet transform. These subbands are us...

Logo Matching And Recognition System Using Surf

Matching is an important part of a model based object recognition system. Matching is a difficult task because images do not present perfect data, noise and occlusions greatly complicate the task. Although no existin...

Download PDF file
  • EP ID EP28180
  • DOI -
  • Views 273
  • Downloads 2

How To Cite

Bhoomika Gupta, M. Afshar Alam (2015). Detection of DDos Attack using HCIF Algorithm in Cloud Computing. International Journal of Research in Computer and Communication Technology, 4(4), -. https://europub.co.uk/articles/-A-28180