Identification and Avoidance of DDoS Attack for Secured Data Communicationin Cloud

Journal Title: UNKNOWN - Year 2015, Vol 4, Issue 4

Abstract

Cloud is turning into a prevalent computing platform. Certainly, a question arises on the off chance that we can crush the scandalous DDoS attacks in a cloud environment. A DDoS attack can collapse the whole system in a Cloud Server environment, however in case of cloud it is not that powerful but still to some extend disturbs the normal activity of the system. At the point when a DDoS attack occurs in a client environment, we devote the idle resources of the cloud to clone adequate Intrusion Prevention Systems for the exploited client in order to rapidly channel out attack packets and ensure the QoS (Quality of Service) for benign users simultaneously. In the proposed model we deploy multiple Intrusion Prevention System (IPS) to screen client activity and filter the requests in light of the conduct and forward to the corresponding servers through cloud server. Each server would have certain space designated in the cloud server. The IPS-s continually monitor the activity of the users to counteract DDoS attacks.

Authors and Affiliations

Keywords

Related Articles

Cost Reduction through Cost Effective Construction Techniques

Low cost housing construction technologies aim to cut down construction cost by using alternatives to conventional methods and Input. “It is effective budgeting and technique which help in reducing cost of construction t...

Influence of Selenium on Lead Caused Variations of Phosphofructokinase in different Brain Regions of Fresh Water Teleosts

Influence of Selenium on Lead Caused Variations of Phosphofructokinase in different Brain Regions of Fresh Water Teleosts

E-Learning-Future of Education

This paper studies the e-learning standards in present and future digital age. Because of rapid growth and development of computers and internet in education a large number of e-learning systems developed. Now e-learning...

Three Part Proximal Humerus Fracture Fixation with K-wires Vs Minimally Invasive Locking Plate

Abstract: Background: Treatment of proximal humerus fractures is controversial and various operative modalities have been tried. The aim of the present study was to evaluate functional outcome after open reduction and in...

Enhancement of LVRT Capability of DFIG Wind Turbine by Using Advanced Control Strategy

In this paper, doubly fed induction generator (DFIG) based wind turbine (WT) low voltage ride through (LVRT) capability is enhanced by using advanced control strategy for the rotor side converter (RSC) and grid side conv...

Download PDF file
  • EP ID EP366276
  • DOI -
  • Views 158
  • Downloads 0

How To Cite

(2015). Identification and Avoidance of DDoS Attack for Secured Data Communicationin Cloud. UNKNOWN, 4(4), -. https://europub.co.uk/articles/-A-366276