SECURING MOBILE ADHOC NETWORKS AND CLOUD ENVIRONMENT

Abstract

Securing mobile adhoc networks and cloud environment in opposition to denial of service attack by examine and predict the network traffic. DDoS attacks are most important threats next to the accessibility of cloud services. Prevention mechanisms to protect next to DDoS attacks are not forever efficient on their own. Unite dissimilar method (load balancing, throttling and Honey pots) to build hybrid defense method, in meticulous with dissimilar cloud computing layers, is extremely recommended. In this paper, a variety of DDoS attacks have been presented. We as well highlighted the defense methods to counter attack dissimilar types DDoS attacks in the cloud environment. This paper proposes SVM-based algorithm to anomaly intrusion detection. A multiclass SVM algorithm with parameter optimized by PSO (MSVM-PSO) is accessible to find out a classifier to detect multiclass attacks. This paper will extend the proposed techniques to new computing environments Mobile Ad-Hoc Networks to detect anomalous physical or virtual nodes.

Authors and Affiliations

Keywords

Related Articles

A STUDY OF THE CHANGING CONSUMER BUYING BEHAVIOUR IN ORGANISED RETAILING IN LUCKNOW CITY

The major factor of consumer behaviour in organised retailing is the changing buying behaviour. Various management thinkers have conducted several studies to understand the relationship of buying behaviour and organised...

EFFECT OF SERVICE QUALITY AND PROMOTION ON PURCHASE DECISIONS AND THEIR IMPLICATIONS ON CUSTOMER SATISFACTION

This study aims to analyze the effect of Service Quality and Promotion on Purchasing Decisions and Their Implications on Customer Satisfaction. In accordance with the Presidential Regulation of the Republic of Indonesia...

INFLUENCE OF MOLDING METHOD ON PRODUCTS MADE OF MAGNESIA BINDER

This paper presents effect vibrovacuumizing (vibration+vacuum) on the strength of magnesia binder. The specimens were prepared at the water-cement ratio of 0.8 and they were tested at 1, 3, 7 days of curing. Some interes...

EVALUATION OF BER PERFORMANCE OF FFT-OFDM FOR WIRELESS COMMUNICATION NETWORKS

Orthogonal Frequency Division Multiplexing (OFDM) is used to enhance Bit Error Rates (BER) performance for error free transmission in free space in free pace. OFDM-based systems operate in the hostile multipath radio env...

WINNING THE TALENT WAR: UNDERSTANDING MALAYSIAN ISLAMIC FINANCE GRADUATE TALENTS JOB AND ORGANIZATION ATTRIBUTES PREFERENCES USING CHOICE BASED CONJOINT ANALYSIS

The talent crunch and consequent war of talent poses serious risk for the success and sustainability of industries all over the globe. This is most especially so in the Malaysian Islamic finance industry which has been w...

Download PDF file
  • EP ID EP282902
  • DOI 10.5281/zenodo.1197527
  • Views 115
  • Downloads 0

How To Cite

(2018). SECURING MOBILE ADHOC NETWORKS AND CLOUD ENVIRONMENT. INTERNATIONAL JOURNAL OF ENGINEERING TECHNOLOGIES AND MANAGEMENT RESEARCH, 5(2), 84-89. https://europub.co.uk/articles/-A-282902