SECURING MOBILE ADHOC NETWORKS AND CLOUD ENVIRONMENT

Abstract

Securing mobile adhoc networks and cloud environment in opposition to denial of service attack by examine and predict the network traffic. DDoS attacks are most important threats next to the accessibility of cloud services. Prevention mechanisms to protect next to DDoS attacks are not forever efficient on their own. Unite dissimilar method (load balancing, throttling and Honey pots) to build hybrid defense method, in meticulous with dissimilar cloud computing layers, is extremely recommended. In this paper, a variety of DDoS attacks have been presented. We as well highlighted the defense methods to counter attack dissimilar types DDoS attacks in the cloud environment. This paper proposes SVM-based algorithm to anomaly intrusion detection. A multiclass SVM algorithm with parameter optimized by PSO (MSVM-PSO) is accessible to find out a classifier to detect multiclass attacks. This paper will extend the proposed techniques to new computing environments Mobile Ad-Hoc Networks to detect anomalous physical or virtual nodes.

Authors and Affiliations

Keywords

Related Articles

INCREASING SINGLE SKILLS IN THE EMPTY RAW HANDS THROUGH AUDIOVISUAL MEDIA

This research was motivated by the decline in the achievements of regional athletes of the Indonesian Pencak Silat Association (IPSI). Tangerang district, in Banten Province Fifth Regional Student Sports Week Championshi...

A PROFICIENT DETECTION AND RESCUE ASSISTING SYSTEM TO COMBAT FIRE ACCIDENTS OCCURRING IN UNDERGROUND COAL MINES

Working in the field of Coal Mining (CM) is well known and considered among the most dangerous occupations when matched to many other industrial sectors[1], the safety issues associated with the CM workings gets worse wh...

THE RESEARCH, DEVELOPMENT, EXTENSION AND TRAINING EXPERIENCES OF MARINDUQUE STATE COLLEGE, PHILIPPINES: BASIS FOR EXCELLENCE IN EDUCATION

The study showcases the development of the R&D Unit of Marinduque State College (MSC) which started from almost zero budget into a thriving research institution to produce research outputs that were accepted and presente...

CORPORATE COMPLIANCE WITH INTERNATIONAL FINANCIAL REPORTING STANDARDS: A CASE STUDY OF SELECTED SMALL AND MEDIUM-SIZED ENTERPRISES (SMES) IN THE CAPE COAST METROPOLIS

The purpose of the study was to explore the extent to which Small and Medium Enterprises (SMEs) in the Cape Coast Metropolis (CCM) comply with International Financial Reporting Standards (IFRSs). The study further looked...

VIABILITY OF THE HOBBY STORE BUSINESS MODEL FOR NEW ENTREPRENEURS THE CASE OF BARRANQUILLA, COLOMBIA

In this article, eight Colombian’s entrepreneurs were interviewed to analyze the research questions to identify the scopes, the strengths and weaknesses of the interviewed business men to find the requirements to start a...

Download PDF file
  • EP ID EP282902
  • DOI 10.5281/zenodo.1197527
  • Views 121
  • Downloads 0

How To Cite

(2018). SECURING MOBILE ADHOC NETWORKS AND CLOUD ENVIRONMENT. INTERNATIONAL JOURNAL OF ENGINEERING TECHNOLOGIES AND MANAGEMENT RESEARCH, 5(2), 84-89. https://europub.co.uk/articles/-A-282902