Controlling various network based ADoS Attacks in cloud computing environment: By Using Port Hopping Technique

Journal Title: INTERNATIONAL JOURNAL OF ENGINEERING TRENDS AND TECHNOLOGY - Year 2013, Vol 4, Issue 5

Abstract

 Cloud computing security is sub-domain of computer security, network security, and information security. It refers to a broad set of security policies, technologies, and flow controls deployed to protect data, applications, and the associated infrastructure resources of cloud computing. There are a number of security issues/concerns associated with cloud computing .We provide security to cloud resources by Denial of Service (DoS) attacks and their related sub-domains. Application Denial of service (ADoS) attacks comes under DDOS attacks these are concentrate on SaaS in cloud computing. In this we present different types of cloud based DDOS Attacks and their solutions, also give most dangerous Application DoS attacks scenario and their remedy mechanisms, Introduce new port hopping i.e True Random Number Generation(TRNG) Based Port Hopping in cloud computing request/response environment. In previous port hopping by using Pseudo Random number Generation (PRNG) over comes the disadvantage of prediction of the port hopping sequence and is periodic in nature. Finally overcome/prevent the ADOS attack by using TRNG.

Authors and Affiliations

T. Siva#1 , E. S. Phalguna Krishna#

Keywords

Related Articles

 Exergy Analysis of Gas Turbine Power Plant

 The exergy analysis is carried out by conducting mass, energy and exergy balance of each component in the gas turbine plant. Parametric analysis of the influence of various factors namely compression ratio (rp),...

 Constant Power Control Of 15 DFIG Wind Turbines With Superconducting Magnetic Energy Storage System

 With the increasing penetration of wind power into electric power grids, energy storage devices will be required to dynamically match the intermittency of wind energy. This paper proposes a novel two-layer consta...

 FPGA Implementation of 4-D DWT and BPS based Digital Image Watermarking

 In order to protect copyrighted material from illegal  duplication, two typical technologies have been developed they are key-based cryptographic techniques and digital watermarks which enable the appropriate...

 Remote Sensing: Essentials and Applications

 Remote sensing has been developed from earlier technologies such as surveying, photogrammetry, cartography, mathematics and statistics. In 1970s, first remote sensing satellite Landsat -1 was launched which provide...

 A Novel Paradigm: Detection & Prevention of Wormhole Attack in Mobile Ad Hoc Networks

 This paper emphasized to propose and develop a scheme for the prevention of wormhole attack from intermediate and surrounding threads.In wireless ad hoc networks, it is difficult to detect wormhole attacks becaus...

Download PDF file
  • EP ID EP135866
  • DOI -
  • Views 87
  • Downloads 0

How To Cite

T. Siva#1, E. S. Phalguna Krishna# (2013).  Controlling various network based ADoS Attacks in cloud computing environment: By Using Port Hopping Technique. INTERNATIONAL JOURNAL OF ENGINEERING TRENDS AND TECHNOLOGY, 4(5), 2099-2104. https://europub.co.uk/articles/-A-135866