Controlling various network based ADoS Attacks in cloud computing environment: By Using Port Hopping Technique

Journal Title: INTERNATIONAL JOURNAL OF ENGINEERING TRENDS AND TECHNOLOGY - Year 2013, Vol 4, Issue 5

Abstract

 Cloud computing security is sub-domain of computer security, network security, and information security. It refers to a broad set of security policies, technologies, and flow controls deployed to protect data, applications, and the associated infrastructure resources of cloud computing. There are a number of security issues/concerns associated with cloud computing .We provide security to cloud resources by Denial of Service (DoS) attacks and their related sub-domains. Application Denial of service (ADoS) attacks comes under DDOS attacks these are concentrate on SaaS in cloud computing. In this we present different types of cloud based DDOS Attacks and their solutions, also give most dangerous Application DoS attacks scenario and their remedy mechanisms, Introduce new port hopping i.e True Random Number Generation(TRNG) Based Port Hopping in cloud computing request/response environment. In previous port hopping by using Pseudo Random number Generation (PRNG) over comes the disadvantage of prediction of the port hopping sequence and is periodic in nature. Finally overcome/prevent the ADOS attack by using TRNG.

Authors and Affiliations

T. Siva#1 , E. S. Phalguna Krishna#

Keywords

Related Articles

DC-DC Converters Using PID Controller and Pulse Width Modulation Technique

This paper presents a boost converter along with a flyback converter. The Zero Voltage Switching (ZVS) technique is used to achieve soft switching. A bidirectional boost converter is connected with an output module as a...

Impact of Aquacult ure on Physico-Chemical Characteristics of Water and Soils in the Coastal Tracts of East and West Godavari Districts,Andhra Pradesh, India

The Physico-chemical characteristics of water and soil in aquaculture areas were investigated. Water samples were analysed with respect to PH, Phosphates, Sulphates, Total Alkalinity, Total Hardness, Total Dissolved Soli...

 A Novel Image Compression Scheme with Wavelet Packets Optimization Using Artificial Bee Colony Algorithm

 With advance in technology many applications came up which requires images in compressed form. Compression is necessary since storage of images required large space and money. Also transmission of such images can t...

 IMAGE STITCHING USING MATLAB

 Images are an integral part of our daily lives. Image stitching is the process performed to generate one panoramic image from a series of smaller, overlapping images. Stitched images are used in applications such a...

 Performance, Combustion and Emission Characteristics of Corn oil blended with Diesel

 Petroleum based fuels is a finite resource that is rapidly depleting. Consequently, petroleum reserves are not sufficient enough to last many years. Biodiesel is one of the alternative fuel made from vegetable oil,...

Download PDF file
  • EP ID EP135866
  • DOI -
  • Views 121
  • Downloads 0

How To Cite

T. Siva#1, E. S. Phalguna Krishna# (2013).  Controlling various network based ADoS Attacks in cloud computing environment: By Using Port Hopping Technique. INTERNATIONAL JOURNAL OF ENGINEERING TRENDS AND TECHNOLOGY, 4(5), 2099-2104. https://europub.co.uk/articles/-A-135866