Open Access   Article Go Back

Alleviation of DDOS Attacks to Achieve Data Asylum In Cloud Computing

Ashok Koujalagi1

Section:Research Paper, Product Type: Journal Paper
Volume-7 , Issue-3 , Page no. 972-975, Mar-2019

CrossRef-DOI:   https://doi.org/10.26438/ijcse/v7i3.972975

Online published on Mar 31, 2019

Copyright © Ashok Koujalagi . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Ashok Koujalagi, “Alleviation of DDOS Attacks to Achieve Data Asylum In Cloud Computing,” International Journal of Computer Sciences and Engineering, Vol.7, Issue.3, pp.972-975, 2019.

MLA Style Citation: Ashok Koujalagi "Alleviation of DDOS Attacks to Achieve Data Asylum In Cloud Computing." International Journal of Computer Sciences and Engineering 7.3 (2019): 972-975.

APA Style Citation: Ashok Koujalagi, (2019). Alleviation of DDOS Attacks to Achieve Data Asylum In Cloud Computing. International Journal of Computer Sciences and Engineering, 7(3), 972-975.

BibTex Style Citation:
@article{Koujalagi_2019,
author = {Ashok Koujalagi},
title = {Alleviation of DDOS Attacks to Achieve Data Asylum In Cloud Computing},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {3 2019},
volume = {7},
Issue = {3},
month = {3},
year = {2019},
issn = {2347-2693},
pages = {972-975},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=3949},
doi = {https://doi.org/10.26438/ijcse/v7i3.972975}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v7i3.972975}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=3949
TI - Alleviation of DDOS Attacks to Achieve Data Asylum In Cloud Computing
T2 - International Journal of Computer Sciences and Engineering
AU - Ashok Koujalagi
PY - 2019
DA - 2019/03/31
PB - IJCSE, Indore, INDIA
SP - 972-975
IS - 3
VL - 7
SN - 2347-2693
ER -

VIEWS PDF XML
239 218 downloads 129 downloads
  
  
           

Abstract

Data Security and privacy become the critical issue as cloud computing is getting famous for web-based services in modern era. Because cloud computing is providing Data access to everyone, data security become critical issue that limit many cloud based applications. Major issue of security in cloud computing because users can access sensitive data. One of these security challenges in cloud computing, Distributed Denial of Service (DDOS) attack is the major security threat to Web-applications as well as cloud computing. Attackers try to compromise the security with heavy traffic from different resources. This research will observe the effects of Distributed Denial of Service (DDOS) attacks on cloud server moreover mitigation technique will be discussed to prevent DDOS attacks on the cloud.

Key-Words / Index Term

Cloud Computing, Data Security and privacy, Data mitigation technique, DDOS

References

[1]. Balobaid. A, Alawad. W and Aljasim. H. 2016. Study on the impact of DoS and DDoS attacks on cloud and mitigation techniques. 2016 International Conference on Computer, Analytical and Security Trends (CAST), Pune, India, 1 (1): 416-421.
[2]. Changes. V and Ramachandran. M 2016. Towards the acquisition of data security with the cloud computing framework. IEEE transactions on a service computer, 9 (1): 138-151.
[3]. Li. Y, Gai. K., Qiu. L., Qiu. M and Zhao. H. 2017. Intelligent cryptographic approaches to deploy large data storage in cloud computers. Information Science, 387 (1): 103-115.
[4]. Manogaran. G, Thota. C and Kumar. M 2016. MetaCloudDataStorage Architecture for Great Data Security in Cloud Computing. Computer Science Procedures, 87 (1): 128-133.
[5]. Osanaiye. Oh, Choo. R, and Dlodlo M. 2016. Distributed Discontinuing Service (DDoS) in the Cloud: Cloud Vision Overview and DDoS Mitigation Framework. Computer Networks and Applications Journal, 67 (1): 147-165.
[6]. Osanaiye. O. 2015. Title: IP Spoofing Detection to Prevent DDoS Attacks in Cloud Computing. 2015 International Conference on Intelligence in Next Generation Network, Paris, 1 (1): 139-141.
[7]. Sabahi. F., 2011. Threats and cloud computer security responses. IEEE International Conference on Software and Communications Network, Xi`an, 1 (1): 245-249.
[8]. Sow. A, Earring. R and Radzik. T. 2016. Detection of known and unknown DDoS attacks via artificial neural networks. Neurocomputing, 172 (1): 385-393.
[9]. Shameli-Sendi. A, Pourzandi. M, Fekih-Ahmed. M and Cheriet. M. 2015. The reduced taxonomy of Denial of Service Blocking brings closer to the cloud computer. Computer Networks and Applications Journal, 58 (1): 165-179.
[10]. Somani. G, Gaur. M, Sanghi. D, Conti. M and Buyya. R. 2017. Resizing services for fast DDoS reduction in cloud computing environments. Annale van Telecommunicatie, 72 (5): 237-252.
[11]. Thapngam. T, Yu. S, Zhou. W and Makki. S. 2014. Service Disclaimer Tracking (DDoS) is exposed by traffic pattern analysis. Peer-to-peer Networks and Applications, 7 (4): 346-358.
[12]. Xiao. P, Li. Z, Qi. H, Qu. W and Yu. H. 2016. DDoS Detection Effective With Bloom Filter In SDN. 2016 IEEE Trustcom / BigDataSE / ISPA, Tianjin, China, 1 (1): 1-6.
[13]. Yu. S, Tian. Y, Guo. S and Wu. D. 2014. Can we defeat DDoS attacks in the cloud? IEEE transactions on parallel and distributed systems, 25 (9): 2245-2254.
[14]. Yang. L, Zhang. T, Song. J, Wang. J and Chen. P. 2012. DDoS attack defense for cloud computers. 2012 International Conference on Computer Science and Automation Engineering (CSAE), Zhangjiajie, China, 1 (1): 626-629.