Research Paper | Computer Science & Engineering | India | Volume 4 Issue 4, April 2015
Identification and Avoidance of DDoS Attack for Secured Data Communicationin Cloud
Aaqib Iqbal Wani | Janaki Raman V. | N. Priya 
Abstract: Cloud is turning into a prevalent computing platform. Certainly, a question arises on the off chance that we can crush the scandalous DDoS attacks in a cloud environment. A DDoS attack can collapse the whole system in a Cloud Server environment, however in case of cloud it is not that powerful but still to some extend disturbs the normal activity of the system. At the point when a DDoS attack occurs in a client environment, we devote the idle resources of the cloud to clone adequate Intrusion Prevention Systems for the exploited client in order to rapidly channel out attack packets and ensure the QoS (Quality of Service) for benign users simultaneously. In the proposed model we deploy multiple Intrusion Prevention System (IPS) to screen client activity and filter the requests in light of the conduct and forward to the corresponding servers through cloud server. Each server would have certain space designated in the cloud server. The IPS-s continually monitor the activity of the users to counteract DDoS attacks.
Keywords: Cloud computing, DDoS attacks, Dynamic Resource allocation, System Modelling
Edition: Volume 4 Issue 4, April 2015,
Pages: 1747 - 1751
Similar Articles with Keyword 'Cloud computing'
Novel Approach to Virtual Machine Migration In Cloud Computing Environment - A Survey
Priyanka H  | Dr. Mary Cherian