Controlling various network based ADoS Attacks in cloud computing environment: By Using Port Hopping Technique

Journal Title: INTERNATIONAL JOURNAL OF ENGINEERING TRENDS AND TECHNOLOGY - Year 2013, Vol 4, Issue 5

Abstract

 Cloud computing security is sub-domain of computer security, network security, and information security. It refers to a broad set of security policies, technologies, and flow controls deployed to protect data, applications, and the associated infrastructure resources of cloud computing. There are a number of security issues/concerns associated with cloud computing .We provide security to cloud resources by Denial of Service (DoS) attacks and their related sub-domains. Application Denial of service (ADoS) attacks comes under DDOS attacks these are concentrate on SaaS in cloud computing. In this we present different types of cloud based DDOS Attacks and their solutions, also give most dangerous Application DoS attacks scenario and their remedy mechanisms, Introduce new port hopping i.e True Random Number Generation(TRNG) Based Port Hopping in cloud computing request/response environment. In previous port hopping by using Pseudo Random number Generation (PRNG) over comes the disadvantage of prediction of the port hopping sequence and is periodic in nature. Finally overcome/prevent the ADOS attack by using TRNG.

Authors and Affiliations

T. Siva#1 , E. S. Phalguna Krishna#

Keywords

Related Articles

 Managing Customer Relationships through Mobile CRM In Organized retail outlets

 Mobile Customer Relationship Management (mCRM) system is one of the recent advancements in CRM systems. Recent years, customers using mobile phone have presented a very fast growing on value added services, SMS and...

 FPGA Based Design and Implementation of Image Edge Detection Using Xilinx System Generator

Edge detection serves as a pre-processing step for many image processing algorithms such as image enhancement, image segmentation, tracking and image/video coding. The edge detection is one of the key stages in image p...

 Support Ranked Keyword on Remote Encrypted Data in Cloud

 Data owners outsource their complex data management systems from local sites to commercial public space for great flexibility and economic savings. However, the sensitive data should be kept extremely private from t...

Optimal Location of Multiple FACTS Device Using Sensitivity Methods

In recent years, electric power systems, greater demands have been placed on the transmission network. Maintaining power system stability becomes difficult and challenging problem. FACTS technology have new opportunities...

 ADVANCED MODELISTIC APPROACH OF FLOWSHOP SCHEDULING PROBLEM FOR 10-JOBS, 10-MACHINES BY HEURISTICS MODELS USING MAKESPAN CRITERION

 Production scheduling is generally considered to be the one of the most significant issue in the planning and operation of a manufacturing system. Better scheduling system has significant impact on cost reduct...

Download PDF file
  • EP ID EP135866
  • DOI -
  • Views 111
  • Downloads 0

How To Cite

T. Siva#1, E. S. Phalguna Krishna# (2013).  Controlling various network based ADoS Attacks in cloud computing environment: By Using Port Hopping Technique. INTERNATIONAL JOURNAL OF ENGINEERING TRENDS AND TECHNOLOGY, 4(5), 2099-2104. https://europub.co.uk/articles/-A-135866