Controlling various network based ADoS Attacks in cloud computing environment: By Using Port Hopping Technique
Journal Title: INTERNATIONAL JOURNAL OF ENGINEERING TRENDS AND TECHNOLOGY - Year 2013, Vol 4, Issue 5
Abstract
Cloud computing security is sub-domain of computer security, network security, and information security. It refers to a broad set of security policies, technologies, and flow controls deployed to protect data, applications, and the associated infrastructure resources of cloud computing. There are a number of security issues/concerns associated with cloud computing .We provide security to cloud resources by Denial of Service (DoS) attacks and their related sub-domains. Application Denial of service (ADoS) attacks comes under DDOS attacks these are concentrate on SaaS in cloud computing. In this we present different types of cloud based DDOS Attacks and their solutions, also give most dangerous Application DoS attacks scenario and their remedy mechanisms, Introduce new port hopping i.e True Random Number Generation(TRNG) Based Port Hopping in cloud computing request/response environment. In previous port hopping by using Pseudo Random number Generation (PRNG) over comes the disadvantage of prediction of the port hopping sequence and is periodic in nature. Finally overcome/prevent the ADOS attack by using TRNG.
Authors and Affiliations
T. Siva#1 , E. S. Phalguna Krishna#
Design of Vehicle Bus Data Acquisition and Fault Diagnosis System using CAN
The vehicle bus data acquisition and fault diagnosis system, focusing on its lower computer system and the upper computer system is designed. This system is based on the widely used CAN bus technology, to extr...
Double Encryption Based Secure Biometric Authentication System
Nowadays bio-metric authentication systems are widely used in order to provide authentication without possessing any physical materials. Bio-metric authentication systems are mainly concentrating on security, revoc...
Fault Tolerance Mechanism using Clustering for Power Saving in Wireless Sensor Networks
The dependability of wireless device networks (WSN) is laid low with faults which will occur attributable to varied reasons like malfunctioning hardware, software system glitches, dislocation, or environmental haza...
Modelling of Photovoltaic Cell/Module under Environmental Disturbances using MATLAB /Simulink
Integration of photovoltaic power to grid is one of the major interests. Design, study and analysis of key components in a photovoltaic power system from generation of power to integration to main grid are very crucial....
Survey of Watermarking Algorithms For Medical Images
Watermarking is a branch of information hiding which is used to hide proprietary information in digital media like photographs, digital music, or digital video. And also which has seen a lot of research interest...