Controlling various network based ADoS Attacks in cloud computing environment: By Using Port Hopping Technique

Journal Title: INTERNATIONAL JOURNAL OF ENGINEERING TRENDS AND TECHNOLOGY - Year 2013, Vol 4, Issue 5

Abstract

 Cloud computing security is sub-domain of computer security, network security, and information security. It refers to a broad set of security policies, technologies, and flow controls deployed to protect data, applications, and the associated infrastructure resources of cloud computing. There are a number of security issues/concerns associated with cloud computing .We provide security to cloud resources by Denial of Service (DoS) attacks and their related sub-domains. Application Denial of service (ADoS) attacks comes under DDOS attacks these are concentrate on SaaS in cloud computing. In this we present different types of cloud based DDOS Attacks and their solutions, also give most dangerous Application DoS attacks scenario and their remedy mechanisms, Introduce new port hopping i.e True Random Number Generation(TRNG) Based Port Hopping in cloud computing request/response environment. In previous port hopping by using Pseudo Random number Generation (PRNG) over comes the disadvantage of prediction of the port hopping sequence and is periodic in nature. Finally overcome/prevent the ADOS attack by using TRNG.

Authors and Affiliations

T. Siva#1 , E. S. Phalguna Krishna#

Keywords

Related Articles

 Design of Vehicle Bus Data Acquisition and Fault Diagnosis System using CAN

 The vehicle bus data acquisition and fault diagnosis system, focusing on its lower computer system and the upper computer system is designed. This system is based on the widely used CAN bus technology, to extr...

 Double Encryption Based Secure Biometric Authentication System

 Nowadays bio-metric authentication systems are widely used in order to provide authentication without possessing any physical materials. Bio-metric authentication systems are mainly concentrating on security, revoc...

 Fault Tolerance Mechanism using Clustering for Power Saving in Wireless Sensor Networks

 The dependability of wireless device networks (WSN) is laid low with faults which will occur attributable to varied reasons like malfunctioning hardware, software system glitches, dislocation, or environmental haza...

Modelling of Photovoltaic Cell/Module under Environmental Disturbances using MATLAB /Simulink

Integration of photovoltaic power to grid is one of the major interests. Design, study and analysis of key components in a photovoltaic power system from generation of power to integration to main grid are very crucial....

 Survey of Watermarking Algorithms For Medical Images

 Watermarking is a branch of information hiding which is used to hide proprietary information in digital media like photographs, digital music, or digital video. And also which has seen a lot of research interest...

Download PDF file
  • EP ID EP135866
  • DOI -
  • Views 132
  • Downloads 0

How To Cite

T. Siva#1, E. S. Phalguna Krishna# (2013).  Controlling various network based ADoS Attacks in cloud computing environment: By Using Port Hopping Technique. INTERNATIONAL JOURNAL OF ENGINEERING TRENDS AND TECHNOLOGY, 4(5), 2099-2104. https://europub.co.uk/articles/-A-135866