Prevention of DDoS attacks in cloud environment
Title | Prevention of DDoS attacks in cloud environment |
Publication Type | Conference Paper |
Year of Publication | 2017 |
Authors | Manoja, I., Sk, N. S., Rani, D. R. |
Conference Name | 2017 International Conference on Big Data Analytics and Computational Intelligence (ICBDAC) |
ISBN Number | 978-1-5090-6400-7 |
Keywords | Big Data, cloud computing, cloud environment, cloud services, Collaboration, composability, computational assets, Computational Intelligence, computer network security, DDoS Attack, DDoS Attack Prevention, DDoS Defence procedures, distributed computing, distributed denial of service, endowment technological data, gigantic curiosity, Handheld computers, honeypot, Human Behavior, human factors, Metrics, Policy-Governed Secure Collaboration, pubcrawl, Resiliency, Scalability, science of security, touchy data, utility computing |
Abstract | Cloud computing emerges as an endowment technological data for the longer term and increasing on one of the standards of utility computing is most likely claimed to symbolize a wholly new paradigm for viewing and getting access to computational assets. As a result of protection problem many purchasers hesitate in relocating their touchy data on the clouds, regardless of gigantic curiosity in cloud-based computing. Security is a tremendous hassle, considering the fact that so much of firms present a alluring goal for intruders and the particular considerations will pursue to lower the advancement of distributed computing if not located. Hence, this recent scan and perception is suitable to honeypot. Distributed Denial of Service (DDoS) is an assault that threats the availability of the cloud services. It's fundamental investigate the most important features of DDoS Defence procedures. This paper provides exact techniques that been carried out to the DDoS attack. These approaches are outlined in these paper and use of applied sciences for special kind of malfunctioning within the cloud. |
URL | https://ieeexplore.ieee.org/document/8070840/ |
DOI | 10.1109/ICBDACI.2017.8070840 |
Citation Key | manoja_prevention_2017 |
- endowment technological data
- utility computing
- touchy data
- Science of Security
- Scalability
- Resiliency
- pubcrawl
- Policy-Governed Secure Collaboration
- Metrics
- Human Factors
- Human behavior
- honeypot
- Handheld computers
- gigantic curiosity
- Big Data
- distributed denial of service
- distributed computing
- DDoS Defence procedures
- DDoS Attack Prevention
- DDoS Attack
- computer network security
- computational intelligence
- computational assets
- composability
- collaboration
- cloud services
- cloud environment
- Cloud Computing