Survey on DDoS Attack in Cloud Network
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Open Access | Fully Refereed | Peer Reviewed International Journal

ISSN: 2319-7064

Views: 149 , Downloads: 107 | CTR: 72 %

Survey Paper | Computer Science & Engineering | India | Volume 3 Issue 11, November 2014

Survey on DDoS Attack in Cloud Network

Monalisa Shinde, Shripadrao Biradar

Cloud is now a major computing platform. Consequently a question arises about its security. One major type of attack is, a denial-of-service (DDoS) or distributed denial-of-service (DDoS). This attack attempts to make a machine or network resource unavailable to its intended users like bandwidth of network, data structures, operating system and computing power. So we can overcome DDoS attacks in a cloud environment. Here is a survey which provides a depth study on this attack. After the analysis of various scenarios of DDoS attack and cloud environment, we can say that DDoS attack can be minimize. But some strong techniques should be implemented which are suggested in solutions.

Keywords: Cloud Computing, DDoS Attack, Intrusion Prevention System, Dynamic Resource Allocation, DNS

Edition: Volume 3 Issue 11, November 2014

Pages: 2071 - 2074

Share this Article

How to Cite this Article?

Monalisa Shinde, Shripadrao Biradar, "Survey on DDoS Attack in Cloud Network", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=OCT141340, Volume 3 Issue 11, November 2014, 2071 - 2074

149 PDF Views | 107 PDF Downloads

Download Article PDF



Similar Articles with Keyword 'Cloud Computing'

Views: 203 , Downloads: 174 | CTR: 86 % | Weekly Popularity: ⮙2

Survey Paper, Computer Science & Engineering, India, Volume 7 Issue 1, January 2018

Pages: 81 - 84

Novel Approach to Virtual Machine Migration In Cloud Computing Environment - A Survey

Priyanka H, Dr. Mary Cherian

Share this Article

Views: 122 , Downloads: 96 | CTR: 79 % | Weekly Popularity: ⮙1

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 5, May 2016

Pages: 2242 - 2246

Efficient and Secure Auditing of Cloud Data with Key -Updating

Niranjana S, Manjusha M S

Share this Article

Views: 151 , Downloads: 97 | CTR: 64 % | Weekly Popularity: ⮙3

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 7, July 2015

Pages: 2483 - 2487

Accountability of Data usage in Cloud Computing

Nitin P. Doiphode, Hemlata Channe

Share this Article

Views: 151 , Downloads: 97 | CTR: 64 % | Weekly Popularity: ⮙5

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 8, August 2015

Pages: 1939 - 1946

An Approach for Video Compression Technique for Efficient Data Backup and Recovery in Public Cloud

Nagaraj S Kolhar, Dr. Suvarna Nandyal

Share this Article

Views: 134 , Downloads: 97 | CTR: 72 % | Weekly Popularity: ⮙3

Review Papers, Computer Science & Engineering, India, Volume 10 Issue 1, January 2021

Pages: 594 - 596

A Review of Replication Strategies to Increase Data Availability for Data Intensive Applications in Cloud

K. Sreelatha

Share this Article

Similar Articles with Keyword 'DDoS Attack'

Views: 120 , Downloads: 98 | CTR: 82 % | Weekly Popularity: ⮙2

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 10, October 2015

Pages: 1612 - 1616

Survey Paper on Mitigation Mechanisms for Distributed Denial of Service Attacks

Vishal Mahale, Deepali Gothawal

Share this Article

Views: 139 , Downloads: 99 | CTR: 71 % | Weekly Popularity: ⮙2

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 5, May 2015

Pages: 2832 - 2836

Minimization of DDoS Attack using Firecol an Intrusion Prevention System

Bhagyashri Kotame, Shrinivas Sonkar

Share this Article

Views: 138 , Downloads: 102 | CTR: 74 % | Weekly Popularity: ⮙5

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 1368 - 1371

Spam and Zombie Detection System with Machine Learned Spot Algorithm

Manishankar.S, Sobin E. S

Share this Article

Views: 129 , Downloads: 102 | CTR: 79 % | Weekly Popularity: ⮙2

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 2982 - 2984

Protection of Server from Proxy Based HTTP Attacks

Poonam Uttam Patil, Y. V. Chavan

Share this Article

Views: 131 , Downloads: 102 | CTR: 78 % | Weekly Popularity: ⮙1

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 4, April 2015

Pages: 1747 - 1751

Identification and Avoidance of DDoS Attack for Secured Data Communicationin Cloud

Aaqib Iqbal Wani, Janaki Raman V., N. Priya

Share this Article

Similar Articles with Keyword 'Intrusion Prevention System'

Views: 139 , Downloads: 99 | CTR: 71 % | Weekly Popularity: ⮙2

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 5, May 2015

Pages: 2832 - 2836

Minimization of DDoS Attack using Firecol an Intrusion Prevention System

Bhagyashri Kotame, Shrinivas Sonkar

Share this Article

Views: 131 , Downloads: 102 | CTR: 78 % | Weekly Popularity: ⮙1

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 4, April 2015

Pages: 1747 - 1751

Identification and Avoidance of DDoS Attack for Secured Data Communicationin Cloud

Aaqib Iqbal Wani, Janaki Raman V., N. Priya

Share this Article

Views: 131 , Downloads: 105 | CTR: 80 % | Weekly Popularity: ⮙1

Comparative Studies, Computer Science & Engineering, India, Volume 4 Issue 4, April 2015

Pages: 1966 - 1971

Comparative Analysis of Hybrid Intrusion Detection System and Intrusion Prevention System for MANET

Pallavi P Puri, Nitin R. Chopde

Share this Article

Views: 149 , Downloads: 107 | CTR: 72 %

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 2071 - 2074

Survey on DDoS Attack in Cloud Network

Monalisa Shinde, Shripadrao Biradar

Share this Article

Views: 159 , Downloads: 124 | CTR: 78 % | Weekly Popularity: ⮙4

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 7 Issue 5, May 2018

Pages: 1623 - 1626

Detecting DOS Attacks in Software Defined Networking and Cloud Computing

Roniya Ssan Jacob, Dr. Kalimuthu.M

Share this Article

Similar Articles with Keyword 'Dynamic Resource Allocation'

Views: 131 , Downloads: 102 | CTR: 78 % | Weekly Popularity: ⮙1

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 4, April 2015

Pages: 1747 - 1751

Identification and Avoidance of DDoS Attack for Secured Data Communicationin Cloud

Aaqib Iqbal Wani, Janaki Raman V., N. Priya

Share this Article

Views: 132 , Downloads: 104 | CTR: 79 % | Weekly Popularity: ⮙6

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 5, May 2015

Pages: 2616 - 2618

Dynamic Resource Allocation in Cloud Computing using Virtualization Technology

A. D. Gawali, S. K. Sonkar

Share this Article

Views: 149 , Downloads: 107 | CTR: 72 %

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 2071 - 2074

Survey on DDoS Attack in Cloud Network

Monalisa Shinde, Shripadrao Biradar

Share this Article

Views: 136 , Downloads: 108 | CTR: 79 % | Weekly Popularity: ⮙4

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 1230 - 1232

Dynamic Resource Allocation for Cloud Computing Including the Feasibility Study on Green Computing (Using Need Based Resource Allocation Scheme)

B. Karthikeyan, T. Sasikala, M. DilliBabu

Share this Article

Views: 153 , Downloads: 116 | CTR: 76 % | Weekly Popularity: ⮙5

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 5, May 2014

Pages: 744 - 748

A Skewness Algorithm Scheduling Approach for the Energetic Distribution of Resources for Cloud Computing Environment using Virtual Machines

Asha T N, Dr. Antony P J

Share this Article

Similar Articles with Keyword 'DNS'

Views: 128 , Downloads: 104 | CTR: 81 % | Weekly Popularity: ⮙2

Research Paper, Computer Science & Engineering, India, Volume 8 Issue 12, December 2019

Pages: 1360 - 1363

Enhanced Topology Discovery Protocol for SDN

Ajeesh S, Betty Mary Jacob, Nisha Mohan P M

Share this Article

Views: 149 , Downloads: 107 | CTR: 72 %

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 2071 - 2074

Survey on DDoS Attack in Cloud Network

Monalisa Shinde, Shripadrao Biradar

Share this Article

Views: 131 , Downloads: 108 | CTR: 82 % | Weekly Popularity: ⮙5

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 1742 - 1746

An Analytic Research on HTTP ,Web Servers, Web-Services & Efficient DNS Querying

Shaik Khaja Hafeezuddin, P.V.S.Srinivas

Share this Article

Views: 144 , Downloads: 109 | CTR: 76 % | Weekly Popularity: ⮙2

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 9, September 2014

Pages: 1292 - 1295

Stream Authentication Using Trapdoor Hash Function

Dodla Padmaja, P. Srilatha

Share this Article

Views: 134 , Downloads: 110 | CTR: 82 % | Weekly Popularity: ⮙3

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1669 - 1671

A Crypto Framed Data Protection for Trusted Aware Email System

Depuri Sandeep Kumar, Punugoti Pavan Kumar

Share this Article
Top