Techniques to Detect DoS and DDoS Attacks and an Introduction of a Mobile Agent System to Enhance it in Cloud Computing

Abstract

Security in cloud computing is the ultimate question that every potential user studies before adopting it. Among the important points that the provider must ensure is that the Cloud will be available anytime the consumer tries to access it. Generally, the Cloud is accessible via the Internet, what makes it subject to a large variety of attacks. Today, the most striking cyber-attacks are the flooding DoS and its variant DDoS. This type of attacks aims to break down the availability of a service to its legitimate clients. In this paper, we underline the most used techniques to stand up against DoS flooading attacks in the Cloud.

Authors and Affiliations

Abdelali Saidi, Mohamed El Marraki, Elmehdi Bendriss, Ali Kartit

Keywords

Related Articles

Techniques to Detect DoS and DDoS Attacks and an Introduction of a Mobile Agent System to Enhance it in Cloud Computing

Security in cloud computing is the ultimate question that every potential user studies before adopting it. Among the important points that the provider must ensure is that the Cloud will be available anytime the consumer...

An Effective Hybrid Butterfly Optimization Algorithm with Artificial Bee Colony for Numerical Optimization

In this paper, a new hybrid optimization algorithm which combines the standard Butterfly Optimization Algorithm (BOA) with Artificial Bee Colony (ABC) algorithm is proposed. The proposed algorithm used the advantages of...

Nature Inspired Range Based Wireless Sensor Node Localization Algorithms

Localization is one of the most important factors highly desirable for the performance of Wireless Sensor Network (WSN). Localization can be stated as the estimation of the location of the sensor nodes in sensor network....

Robust Artificial Immune System in the Hopfield network for Maximum k-Satisfiability

Artificial Immune System (AIS) algorithm is a novel and vibrant computational paradigm, enthused by the biological immune system. Over the last few years, the artificial immune system has been sprouting to solve numerous...

Detection of Lung Nodules on Medical Images by the Use of Fractal Segmentation

In the present paper, a method for the detection of malignant and benign tumors on the CT scan images has been proposed. In the proposed method, firstly the area of interest in which the tumor may exist is selected on th...

Download PDF file
  • EP ID EP328814
  • DOI 10.9781/ijimai.2017.4312
  • Views 154
  • Downloads 0

How To Cite

Abdelali Saidi, Mohamed El Marraki, Elmehdi Bendriss, Ali Kartit (2017). Techniques to Detect DoS and DDoS Attacks and an Introduction of a Mobile Agent System to Enhance it in Cloud Computing. International Journal of Interactive Multimedia and Artificial Intelligence, 4(3), 75-78. https://europub.co.uk/articles/-A-328814