IJMTES – METHODS TO DEFEND AGAINST DDOS ATTACK AND CONTROLING VERIOUS NETWORK IN DDOS ATTACK IN CLOUD COMPUTING

Journal Title : International Journal of Modern Trends in Engineering and Science

Author’s Name : Anita Ramesh Sarap | Prajkta Chapke

Volume 02 Issue 02  Year 2015

ISSN no: 2348-3121

Page no: 7-10

Abstract Cloud computing is a revolution in IT technology by providing a shared pool of virtualizes resource for its user to pay as they used. This technology is based on two crucial concepts as abstraction, which increased the ability of on demand access through the available resources in the cloud without any investment in new infrastructure. Security is one of the most challenges for both cloud provider and cloud consumer. In recent years DDoS attack is one of the most serious threats against cloud computing. Since cloud built on the fundamental of distributed environment, it is easier for an intruder to launch a DDoS attack against available resources and services of a cloud computing environment. This paper introduces cloud computing, DDoS attack. DDoS attack also gives formal method and solution. A review and comparison of the existing methods against DDoS attack on cloud computing is presented as well.

Keywords— Cloud computing, DDoS attack, threat, intruder, distributed environment,  attack solution

Reference

[1] Sara Farahmandian, Mazdak Zamani, Ahad Akbarabadi, Joobin Moghimi Zadeh, Seyed Mostafa Mirhosseini, Sepideh Farahm“ A Survey on Metheds to Defend against DDoS Attack in Cloud Computing “.
[2] Zhang Fu, Marina Papatriantafilou, and Philippas Tsigas “Mitigating Distributed Denial of Service Attacks in Multiparty Applicationsin the Presence of Clock Drifts” Ieee Transactions On Dependable And Secure Computing, Vol.9, No.3, May/June (2012).
[3] Jain, P., D. Rane, and S. Patidar. A survey and analysis of cloud model-based security for computing secure cloud bursting and aggregation in renal environment. Information and Communication Technologies (WICT), (2011).
[4] T.Siva,E.S.Phalguna Krishn”aControlling various network based ADoS Attacks in cloud computing environment: By Using Congress on. (2011). IEEE By using cloud through the organization, attack.

Full Paper: Click Here