A review on mitigation of the DDoS Attack in cloud in regulated environment
DOI:
https://doi.org/10.14419/ijet.v7i2.8.10492Keywords:
Distributed Denial Of Servic (DDoS), Puzzle GenerationAbstract
Distributed Denial of Service (DDoS) attacks are aimed at exhausting various resources of victim hosts, thereby preventing legitimate usage of their computational capabilities. In this paper, a proper and systematic mitigation technique presented to mitigate the DDoS attack in cloud environment. A robust mechanism is presented which consists of software based puzzle generation method to validate the real customer of cloud services provider from non-reals’ ones to provide better DDoS attack mitigation solution.
References
[1] IEEE,and Ren PingLiu,Member, IEEE,†A System for Denial-of- Service Attack Detection Based on Multivariate Correlation Analysis.â€, IEEE Transactions On Parallel And Distributed Systems.
[2] Subramaniam.T.K,Deepa.B“Preventing distributed denial of service attacks in cloud environmentsâ€, Internationl Journal of Information Technology, Control and Automation (IJITCA) Vol. 6, No.2, April 2016
[3] Isha Chawla,Pawan Luthra,Daljeet Kaur,“DDoS Attack In Cloud And Mitigation Techniquesâ€International journal of innovative Science ,Engineering & Technology, July 2015.
[4] Dr.S.SaravanaKumar,R.SenthilKumar,R.Arunprasad,S.Thiraviam,J.Vignesh,ʺ Detecting and Preventing DDoS Attacks in Cloudâ€, International Journal of Innovative Research in Computer and Communication Engineering , March 2015
[5] Preeti Daffu,Amanpreet Kaur,“Mitigation Of DDoS Attacks In Cloud Computingâ€,978-1-5090-0893-3/16/$31.00 ©2016 IEEE
[6] Gaurav Somani,Manoj Singh Gaur,Dheeraj Sanghi,Mauro Conti,Muttukrishna Rajaran,Rajkumar Buyya,“Combating Ddos Attacks In The Cloud:Requirements,Trends And Future Directionsâ€,IEEE 2017
[7] Smita Miraje , Manisha Bharati , "Implementation of Different Software Puzzle Methods against DDOS Attackâ€, International Journal of Innovative Research in Science,Engineering and Technology, Vol. 5, Issue9, September2016.
[8] T. Padmapriya and V.Saminadan, “Handoff Decision for Multi-user Multiclass Traffic in MIMO-LTE-A Networksâ€, 2nd International Conference on Intelligent Computing, Communication & Convergence (ICCC-2016) – Elsevier - PROCEDIA OF COMPUTER SCIENCE, vol. 92, pp: 410-417, August 2016.
[9] S.V.Manikanthan and K.srividhya "An Android based secure access control using ARM and cloud computing", Published in: Electronics and Communication Systems (ICECS), 2015 2nd International Conference on 26-27 Feb. 2015,Publisher: IEEE,DOI: 10.1109/ECS.2015.7124833.
[10] S.V.Manikanthan and T.Padmapriya “Recent Trends In M2m Communications In 4g Networks And Evolution Towards 5gâ€, International Journal of Pure and Applied Mathematics, ISSN NO:1314-3395, Vol-115, Issue -8, Sep 2017.
Downloads
How to Cite
Received date: March 22, 2018
Accepted date: March 22, 2018
Published date: March 19, 2018