Identification and Avoidance of DDoS Attack for Secured Data Communicationin Cloud
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Open Access | Fully Refereed | Peer Reviewed International Journal

ISSN: 2319-7064



Downloads: 104

Research Paper | Computer Science & Engineering | India | Volume 4 Issue 4, April 2015

Identification and Avoidance of DDoS Attack for Secured Data Communicationin Cloud

Aaqib Iqbal Wani, Janaki Raman V., N. Priya

Cloud is turning into a prevalent computing platform. Certainly, a question arises on the off chance that we can crush the scandalous DDoS attacks in a cloud environment. A DDoS attack can collapse the whole system in a Cloud Server environment, however in case of cloud it is not that powerful but still to some extend disturbs the normal activity of the system. At the point when a DDoS attack occurs in a client environment, we devote the idle resources of the cloud to clone adequate Intrusion Prevention Systems for the exploited client in order to rapidly channel out attack packets and ensure the QoS (Quality of Service) for benign users simultaneously. In the proposed model we deploy multiple Intrusion Prevention System (IPS) to screen client activity and filter the requests in light of the conduct and forward to the corresponding servers through cloud server. Each server would have certain space designated in the cloud server. The IPS-s continually monitor the activity of the users to counteract DDoS attacks.

Keywords: Cloud computing, DDoS attacks, Dynamic Resource allocation, System Modelling

Edition: Volume 4 Issue 4, April 2015

Pages: 1747 - 1751

Share this Article

How to Cite this Article?

Aaqib Iqbal Wani, Janaki Raman V., N. Priya, "Identification and Avoidance of DDoS Attack for Secured Data Communicationin Cloud", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=SUB153431, Volume 4 Issue 4, April 2015, 1747 - 1751

Enter Your Email Address




Similar Articles with Keyword 'Cloud computing'

Downloads: 180

Survey Paper, Computer Science & Engineering, India, Volume 7 Issue 1, January 2018

Pages: 81 - 84

Novel Approach to Virtual Machine Migration In Cloud Computing Environment - A Survey

Priyanka H, Dr. Mary Cherian

Share this Article

Downloads: 5 | Weekly Hits: ⮙3 | Monthly Hits: ⮙5

Review Papers, Computer Science & Engineering, India, Volume 10 Issue 7, July 2021

Pages: 613 - 616

Categorize & Compare Cloud Automation & Devops Tools

Pardeep Singh Virdi

Share this Article

Similar Articles with Keyword 'DDoS attacks'

Downloads: 102 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 5, May 2015

Pages: 2832 - 2836

Minimization of DDoS Attack using Firecol an Intrusion Prevention System

Bhagyashri Kotame, Shrinivas Sonkar

Share this Article

Downloads: 102

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 10, October 2015

Pages: 1612 - 1616

Survey Paper on Mitigation Mechanisms for Distributed Denial of Service Attacks

Vishal Mahale, Deepali Gothawal

Share this Article

Similar Articles with Keyword 'Dynamic Resource allocation'

Downloads: 104 | Monthly Hits: ⮙15

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 5, May 2015

Pages: 2616 - 2618

Dynamic Resource Allocation in Cloud Computing using Virtualization Technology

A. D. Gawali, S. K. Sonkar

Share this Article

Downloads: 109

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 1230 - 1232

Dynamic Resource Allocation for Cloud Computing Including the Feasibility Study on Green Computing (Using Need Based Resource Allocation Scheme)

B. Karthikeyan, T. Sasikala, M. DilliBabu

Share this Article

Similar Articles with Keyword 'Cloud'

Downloads: 180

Survey Paper, Computer Science & Engineering, India, Volume 7 Issue 1, January 2018

Pages: 81 - 84

Novel Approach to Virtual Machine Migration In Cloud Computing Environment - A Survey

Priyanka H, Dr. Mary Cherian

Share this Article

Downloads: 5 | Weekly Hits: ⮙3 | Monthly Hits: ⮙5

Review Papers, Computer Science & Engineering, India, Volume 10 Issue 7, July 2021

Pages: 613 - 616

Categorize & Compare Cloud Automation & Devops Tools

Pardeep Singh Virdi

Share this Article

Similar Articles with Keyword 'computing'

Downloads: 180

Survey Paper, Computer Science & Engineering, India, Volume 7 Issue 1, January 2018

Pages: 81 - 84

Novel Approach to Virtual Machine Migration In Cloud Computing Environment - A Survey

Priyanka H, Dr. Mary Cherian

Share this Article

Downloads: 1

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 1884 - 1886

Performance Analysis of Clustal W Algorithm on Linux Cluster

Swati Jasrotia, Salam Din

Share this Article

Similar Articles with Keyword 'DDoS'

Downloads: 37

Research Paper, Computer Science & Engineering, Sri Lanka, Volume 10 Issue 4, April 2021

Pages: 139 - 144

Analysis onto the Evolving Cyber-Attack Trends during COVID-19 Pandemic

Senthuran Nallainathan

Share this Article

Downloads: 102

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 2, February 2015

Pages: 1809 - 1812

Efficient Flow Marking IP Traceback System

Sonali H. Mane, S. Pratap Singh

Share this Article

Similar Articles with Keyword 'attacks'

Downloads: 1

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 2786 - 2790

Survey: Detection Schemes Against Selective Forwarding Attack

Harpal Singh, Vaibhav Pandey

Share this Article

Downloads: 1 | Monthly Hits: ⮙1

Research Paper, Computer Science & Engineering, India, Volume 10 Issue 6, June 2021

Pages: 1240 - 1249

Secure Methods for Supplychain Management to Protect from Attacks in Blockchain

B. Ratnakanth, K. Venkata Ramana

Share this Article

Similar Articles with Keyword 'Dynamic'

Downloads: 104

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 5, May 2014

Pages: 1751 - 1754

Joining Delay; Packet Delivery and Limitations of EGMP

G. Anandhi, Dr. S. K. Srivatsa

Share this Article

Downloads: 153

Research Paper, Computer Science & Engineering, India, Volume 6 Issue 8, August 2017

Pages: 868 - 874

Study of Power Management in Adhoc Networks

Anandhi Giri, S. K. Srivatsa

Share this Article

Similar Articles with Keyword 'Resource'

Downloads: 156

Research Paper, Computer Science & Engineering, India, Volume 6 Issue 11, November 2017

Pages: 338 - 384

Managing Uncertainty in Supply Chain Operating Cost Using Genetic Algorithm

Dr. Niju P. Joseph, Dr. Priyanka Surendran

Share this Article

Downloads: 180

Survey Paper, Computer Science & Engineering, India, Volume 7 Issue 1, January 2018

Pages: 81 - 84

Novel Approach to Virtual Machine Migration In Cloud Computing Environment - A Survey

Priyanka H, Dr. Mary Cherian

Share this Article

Similar Articles with Keyword 'allocation'

Downloads: 1 | Monthly Hits: ⮙1

Student Project, Computer Science & Engineering, India, Volume 10 Issue 7, July 2021

Pages: 662 - 665

Optimal Inventory Allocation in Supply Chain Using Decision Optimization

S Suraj, Dr. K Badari Nath

Share this Article

Downloads: 101

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 2067 - 2070

A Survey on QOS Guaranteed Bandwidth Shifting and Redistribution in Mobile Cloud Environment

Swati Nagpure

Share this Article

Similar Articles with Keyword 'System'

Downloads: 173 | Monthly Hits: ⮙1

Research Paper, Computer Science & Engineering, Bangladesh, Volume 5 Issue 6, June 2016

Pages: 1523 - 1527

Multifunctional Remote Controlled Robot Using Android Application

T. A. Mithu, T. S. Reddy

Share this Article

Downloads: 156

Research Paper, Computer Science & Engineering, India, Volume 6 Issue 11, November 2017

Pages: 338 - 384

Managing Uncertainty in Supply Chain Operating Cost Using Genetic Algorithm

Dr. Niju P. Joseph, Dr. Priyanka Surendran

Share this Article

Similar Articles with Keyword 'Modelling'

Downloads: 105

Research Paper, Computer Science & Engineering, India, Volume 9 Issue 5, May 2020

Pages: 1596 - 1599

Building Information Modelling (BIM) Application in Construction Industry

Deepa Patil

Share this Article

Downloads: 109

Survey Paper, Computer Science & Engineering, India, Volume 2 Issue 3, March 2013

Pages: 354 - 356

Secure Routing to Prevent Sybil Attack in Sensor Networks

Mohammed Abrar, P. Subhadra

Share this Article



Top