Rate the Article: A Prevention of DDos Attacks in Cloud Using Honeypot , IJSR, Call for Papers, Online Journal
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064

Downloads: 132 | Views: 336

Research Paper | Computer Science & Engineering | India | Volume 3 Issue 11, November 2014 | Rating: 6.2 / 10


A Prevention of DDos Attacks in Cloud Using Honeypot

Kumar Shridhar, Nikhil Gautam


Abstract: Cloud computing is a type of internet based computing where different services such as server, storage and applications are shared on the internet. This makes cloud computing one of the most promising and rapidly growing technology. As it relies on sharing computer resources, it is prone to various security risks. One such security issue is Distributed Denial of Services attack on cloud. A DDos attack can originate from anywhere in the network and typically overwhelms the victim server by sending a huge number of packets. This paper deals with the prevention of DDos attacks and how honeypot approach can be used in cloud computing to counter DDos attacks.


Keywords: Cloud Computing, Honeypot, cloud attacks, DDos, cloud models


Edition: Volume 3 Issue 11, November 2014,


Pages: 2378 - 2383



Rate this Article


Select Rating (Lowest: 1, Highest: 10)

5

Your Comments (Only high quality comments will be accepted.)

Characters: 0

Your Full Name:


Your Valid Email Address:


Verification Code will appear in 2 Seconds ... Wait

Top