A review on mitigation of the DDoS Attack in cloud in regulated environment

Authors

  • Syed Asia Ayaz Andrabi

  • Sachi Pandey

  • Akthar Nazir

How to Cite

Asia Ayaz Andrabi, S., Pandey, S., & Nazir, A. (2018). A review on mitigation of the DDoS Attack in cloud in regulated environment. International Journal of Engineering and Technology, 7(2.8), 497-499. https://doi.org/10.14419/ijet.v7i2.8.10492

Received date: March 22, 2018

Accepted date: March 22, 2018

Published date: March 19, 2018

DOI:

https://doi.org/10.14419/ijet.v7i2.8.10492

Keywords:

Distributed Denial Of Servic (DDoS), Puzzle Generation

Abstract

Distributed Denial of Service (DDoS) attacks are aimed at exhausting various resources of victim hosts, thereby preventing legitimate usage of their computational capabilities. In this paper, a proper and systematic mitigation technique presented to mitigate the DDoS attack in cloud environment. A robust mechanism is presented which consists of software based puzzle generation method to validate the real customer of cloud services provider from non-reals’ ones to provide better DDoS attack mitigation solution.

References

  1. [1] IEEE,and Ren PingLiu,Member, IEEE,†A System for Denial-of- Service Attack Detection Based on Multivariate Correlation Analysis.â€, IEEE Transactions On Parallel And Distributed Systems.

    [2] Subramaniam.T.K,Deepa.B“Preventing distributed denial of service attacks in cloud environmentsâ€, Internationl Journal of Information Technology, Control and Automation (IJITCA) Vol. 6, No.2, April 2016

    [3] Isha Chawla,Pawan Luthra,Daljeet Kaur,“DDoS Attack In Cloud And Mitigation Techniquesâ€International journal of innovative Science ,Engineering & Technology, July 2015.

    [4] Dr.S.SaravanaKumar,R.SenthilKumar,R.Arunprasad,S.Thiraviam,J.Vignesh,ʺ Detecting and Preventing DDoS Attacks in Cloudâ€, International Journal of Innovative Research in Computer and Communication Engineering , March 2015

    [5] Preeti Daffu,Amanpreet Kaur,“Mitigation Of DDoS Attacks In Cloud Computingâ€,978-1-5090-0893-3/16/$31.00 ©2016 IEEE

    [6] Gaurav Somani,Manoj Singh Gaur,Dheeraj Sanghi,Mauro Conti,Muttukrishna Rajaran,Rajkumar Buyya,“Combating Ddos Attacks In The Cloud:Requirements,Trends And Future Directionsâ€,IEEE 2017

    [7] Smita Miraje , Manisha Bharati , "Implementation of Different Software Puzzle Methods against DDOS Attackâ€, International Journal of Innovative Research in Science,Engineering and Technology, Vol. 5, Issue9, September2016.

    [8] T. Padmapriya and V.Saminadan, “Handoff Decision for Multi-user Multiclass Traffic in MIMO-LTE-A Networksâ€, 2nd International Conference on Intelligent Computing, Communication & Convergence (ICCC-2016) – Elsevier - PROCEDIA OF COMPUTER SCIENCE, vol. 92, pp: 410-417, August 2016.

    [9] S.V.Manikanthan and K.srividhya "An Android based secure access control using ARM and cloud computing", Published in: Electronics and Communication Systems (ICECS), 2015 2nd International Conference on 26-27 Feb. 2015,Publisher: IEEE,DOI: 10.1109/ECS.2015.7124833.

    [10] S.V.Manikanthan and T.Padmapriya “Recent Trends In M2m Communications In 4g Networks And Evolution Towards 5gâ€, International Journal of Pure and Applied Mathematics, ISSN NO:1314-3395, Vol-115, Issue -8, Sep 2017.

Downloads

How to Cite

Asia Ayaz Andrabi, S., Pandey, S., & Nazir, A. (2018). A review on mitigation of the DDoS Attack in cloud in regulated environment. International Journal of Engineering and Technology, 7(2.8), 497-499. https://doi.org/10.14419/ijet.v7i2.8.10492

Received date: March 22, 2018

Accepted date: March 22, 2018

Published date: March 19, 2018