Views: 149 , Downloads: 107 | CTR: 72 %
Survey Paper | Computer Science & Engineering | India | Volume 3 Issue 11, November 2014
Survey on DDoS Attack in Cloud Network
Monalisa Shinde, Shripadrao Biradar
Cloud is now a major computing platform. Consequently a question arises about its security. One major type of attack is, a denial-of-service (DDoS) or distributed denial-of-service (DDoS). This attack attempts to make a machine or network resource unavailable to its intended users like bandwidth of network, data structures, operating system and computing power. So we can overcome DDoS attacks in a cloud environment. Here is a survey which provides a depth study on this attack. After the analysis of various scenarios of DDoS attack and cloud environment, we can say that DDoS attack can be minimize. But some strong techniques should be implemented which are suggested in solutions.
Keywords: Cloud Computing, DDoS Attack, Intrusion Prevention System, Dynamic Resource Allocation, DNS
Edition: Volume 3 Issue 11, November 2014
Pages: 2071 - 2074
How to Cite this Article?
Monalisa Shinde, Shripadrao Biradar, "Survey on DDoS Attack in Cloud Network", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=OCT141340, Volume 3 Issue 11, November 2014, 2071 - 2074
149 PDF Views | 107 PDF Downloads
Similar Articles with Keyword 'Cloud Computing'
Views: 203 , Downloads: 174 | CTR: 86 % | Weekly Popularity: ⮙2
Survey Paper, Computer Science & Engineering, India, Volume 7 Issue 1, January 2018
Pages: 81 - 84Novel Approach to Virtual Machine Migration In Cloud Computing Environment - A Survey
Priyanka H, Dr. Mary Cherian
Views: 122 , Downloads: 96 | CTR: 79 % | Weekly Popularity: ⮙1
Research Paper, Computer Science & Engineering, India, Volume 5 Issue 5, May 2016
Pages: 2242 - 2246Efficient and Secure Auditing of Cloud Data with Key -Updating
Niranjana S, Manjusha M S
Views: 151 , Downloads: 97 | CTR: 64 % | Weekly Popularity: ⮙3
M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 7, July 2015
Pages: 2483 - 2487Accountability of Data usage in Cloud Computing
Nitin P. Doiphode, Hemlata Channe
Views: 151 , Downloads: 97 | CTR: 64 % | Weekly Popularity: ⮙5
M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 8, August 2015
Pages: 1939 - 1946An Approach for Video Compression Technique for Efficient Data Backup and Recovery in Public Cloud
Nagaraj S Kolhar, Dr. Suvarna Nandyal
Views: 134 , Downloads: 97 | CTR: 72 % | Weekly Popularity: ⮙3
Review Papers, Computer Science & Engineering, India, Volume 10 Issue 1, January 2021
Pages: 594 - 596A Review of Replication Strategies to Increase Data Availability for Data Intensive Applications in Cloud
K. Sreelatha
Similar Articles with Keyword 'DDoS Attack'
Views: 120 , Downloads: 98 | CTR: 82 % | Weekly Popularity: ⮙2
Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 10, October 2015
Pages: 1612 - 1616Survey Paper on Mitigation Mechanisms for Distributed Denial of Service Attacks
Vishal Mahale, Deepali Gothawal
Views: 139 , Downloads: 99 | CTR: 71 % | Weekly Popularity: ⮙2
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 5, May 2015
Pages: 2832 - 2836Minimization of DDoS Attack using Firecol an Intrusion Prevention System
Bhagyashri Kotame, Shrinivas Sonkar
Views: 138 , Downloads: 102 | CTR: 74 % | Weekly Popularity: ⮙5
Research Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014
Pages: 1368 - 1371Spam and Zombie Detection System with Machine Learned Spot Algorithm
Manishankar.S, Sobin E. S
Views: 129 , Downloads: 102 | CTR: 79 % | Weekly Popularity: ⮙2
Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014
Pages: 2982 - 2984Protection of Server from Proxy Based HTTP Attacks
Poonam Uttam Patil, Y. V. Chavan
Views: 131 , Downloads: 102 | CTR: 78 % | Weekly Popularity: ⮙1
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 4, April 2015
Pages: 1747 - 1751Identification and Avoidance of DDoS Attack for Secured Data Communicationin Cloud
Aaqib Iqbal Wani, Janaki Raman V., N. Priya
Similar Articles with Keyword 'Intrusion Prevention System'
Views: 139 , Downloads: 99 | CTR: 71 % | Weekly Popularity: ⮙2
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 5, May 2015
Pages: 2832 - 2836Minimization of DDoS Attack using Firecol an Intrusion Prevention System
Bhagyashri Kotame, Shrinivas Sonkar
Views: 131 , Downloads: 102 | CTR: 78 % | Weekly Popularity: ⮙1
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 4, April 2015
Pages: 1747 - 1751Identification and Avoidance of DDoS Attack for Secured Data Communicationin Cloud
Aaqib Iqbal Wani, Janaki Raman V., N. Priya
Views: 131 , Downloads: 105 | CTR: 80 % | Weekly Popularity: ⮙1
Comparative Studies, Computer Science & Engineering, India, Volume 4 Issue 4, April 2015
Pages: 1966 - 1971Comparative Analysis of Hybrid Intrusion Detection System and Intrusion Prevention System for MANET
Pallavi P Puri, Nitin R. Chopde
Views: 149 , Downloads: 107 | CTR: 72 %
Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014
Pages: 2071 - 2074Survey on DDoS Attack in Cloud Network
Monalisa Shinde, Shripadrao Biradar
Views: 159 , Downloads: 124 | CTR: 78 % | Weekly Popularity: ⮙4
M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 7 Issue 5, May 2018
Pages: 1623 - 1626Detecting DOS Attacks in Software Defined Networking and Cloud Computing
Roniya Ssan Jacob, Dr. Kalimuthu.M
Similar Articles with Keyword 'Dynamic Resource Allocation'
Views: 131 , Downloads: 102 | CTR: 78 % | Weekly Popularity: ⮙1
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 4, April 2015
Pages: 1747 - 1751Identification and Avoidance of DDoS Attack for Secured Data Communicationin Cloud
Aaqib Iqbal Wani, Janaki Raman V., N. Priya
Views: 132 , Downloads: 104 | CTR: 79 % | Weekly Popularity: ⮙6
Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 5, May 2015
Pages: 2616 - 2618Dynamic Resource Allocation in Cloud Computing using Virtualization Technology
A. D. Gawali, S. K. Sonkar
Views: 149 , Downloads: 107 | CTR: 72 %
Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014
Pages: 2071 - 2074Survey on DDoS Attack in Cloud Network
Monalisa Shinde, Shripadrao Biradar
Views: 136 , Downloads: 108 | CTR: 79 % | Weekly Popularity: ⮙4
Research Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014
Pages: 1230 - 1232Dynamic Resource Allocation for Cloud Computing Including the Feasibility Study on Green Computing (Using Need Based Resource Allocation Scheme)
B. Karthikeyan, T. Sasikala, M. DilliBabu
Views: 153 , Downloads: 116 | CTR: 76 % | Weekly Popularity: ⮙5
M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 5, May 2014
Pages: 744 - 748A Skewness Algorithm Scheduling Approach for the Energetic Distribution of Resources for Cloud Computing Environment using Virtual Machines
Asha T N, Dr. Antony P J
Similar Articles with Keyword 'DNS'
Views: 128 , Downloads: 104 | CTR: 81 % | Weekly Popularity: ⮙2
Research Paper, Computer Science & Engineering, India, Volume 8 Issue 12, December 2019
Pages: 1360 - 1363Enhanced Topology Discovery Protocol for SDN
Ajeesh S, Betty Mary Jacob, Nisha Mohan P M
Views: 149 , Downloads: 107 | CTR: 72 %
Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014
Pages: 2071 - 2074Survey on DDoS Attack in Cloud Network
Monalisa Shinde, Shripadrao Biradar
Views: 131 , Downloads: 108 | CTR: 82 % | Weekly Popularity: ⮙5
Research Paper, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014
Pages: 1742 - 1746An Analytic Research on HTTP ,Web Servers, Web-Services & Efficient DNS Querying
Shaik Khaja Hafeezuddin, P.V.S.Srinivas
Views: 144 , Downloads: 109 | CTR: 76 % | Weekly Popularity: ⮙2
Research Paper, Computer Science & Engineering, India, Volume 3 Issue 9, September 2014
Pages: 1292 - 1295Stream Authentication Using Trapdoor Hash Function
Dodla Padmaja, P. Srilatha
Views: 134 , Downloads: 110 | CTR: 82 % | Weekly Popularity: ⮙3
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015
Pages: 1669 - 1671A Crypto Framed Data Protection for Trusted Aware Email System
Depuri Sandeep Kumar, Punugoti Pavan Kumar