Mitigating Distributed Denial of Service Attack in Cloud Computing Environment using Threshold based Technique
نویسندگان
چکیده
منابع مشابه
A Fuzzy Logic based Defense Mechanism against Distributed Denial of Service Attack in Cloud Computing Environment
Cloud defines a new age of computing solution that provides services to customers with its unique features of agility and multi-tenancy. As the critical resources are hosted at cloud provider’s end, security is a big challenge in cloud computing. If the cloud environment is compromised and attackers get the access of core data centers, the availability of the critical resources becomes a big co...
متن کاملMitigating Distributed Denial-of-Service Attack with Deterministic Bit Marking
The Distributed Denial-of-Service attack is a serious threat in Internet and an effective method is needed for distinguishing the attack traffic from the legitimate traffic. We propose the concept of bit marking to identify and drop the attack packets. Bit marking is a variation of packet marking technique that modifies the packet header at each router. However bit marking differs from packet m...
متن کاملOn Mitigating Distributed Denial of Service Attacks
ON MITIGATING DISTRIBUTED DENIAL OF SERVICE ATTACKS
متن کاملData Replication-Based Scheduling in Cloud Computing Environment
Abstract— High-performance computing and vast storage are two key factors required for executing data-intensive applications. In comparison with traditional distributed systems like data grid, cloud computing provides these factors in a more affordable, scalable and elastic platform. Furthermore, accessing data files is critical for performing such applications. Sometimes accessing data becomes...
متن کاملDistributed Helios - Mitigating Denial of Service Attacks in Online Voting
One of many major issues that plagues Internet voting is the potential for a distributed denial of service attack on the voting servers. These denial of service attacks are harmful because they block voting during the downtime. In addition, most current online voting protocols are centralized with only one voting server, making such an attack likely to disenfranchise some voters. The question i...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Indian Journal of Science and Technology
سال: 2016
ISSN: 0974-5645,0974-6846
DOI: 10.17485/ijst/2016/v9i38/98811