A Review of Techniques to Detect and Prevent Distributed Denial of Service (DDoS) Attack in Cloud Computing Environment
نویسندگان
چکیده
منابع مشابه
A Fuzzy Logic based Defense Mechanism against Distributed Denial of Service Attack in Cloud Computing Environment
Cloud defines a new age of computing solution that provides services to customers with its unique features of agility and multi-tenancy. As the critical resources are hosted at cloud provider’s end, security is a big challenge in cloud computing. If the cloud environment is compromised and attackers get the access of core data centers, the availability of the critical resources becomes a big co...
متن کاملA Novel Cloud Computing Security Model to Detect and Prevent Dos and Ddos Attack
Cloud computing has been considered as one of the crucial and emerging networking technology, which has been changed the architecture of computing in last few years. Despite the security concerns of protecting data or providing continuous service over cloud, many organisations are considering different types cloud services as potential solution for their business. We are researching on cloud co...
متن کاملRESCUE: Reputation based Service for Cloud User Environment
Exceptional characteristics of Cloud computing has replaced all traditional computing. With reduced resource management and without in-advance investment, it has been victorious in making the IT world to migrate towards it. Microsoft announced its office package as Cloud, which can prevent people moving from Windows to Linux. As this drift is escalating in an exponential rate, the cloud environ...
متن کاملClassifier System in Cloud Environment to Detect Denial of Service Attack
Cloud Computing is a modernize computer services in 21 century. This system has some of similarities with distributed systems, through using network environment features. Therefore the security requirement is one of most critical issues in this type of environment. Because of vast number of online users over network with times, the possibility for attacker or malicious actions to perform destru...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: International Journal of Computer Applications
سال: 2015
ISSN: 0975-8887
DOI: 10.5120/20173-2370