Mitigating Distributed Denial of Service Attack in Cloud Computing Environment using Threshold based Technique

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Fuzzy Logic based Defense Mechanism against Distributed Denial of Service Attack in Cloud Computing Environment

Cloud defines a new age of computing solution that provides services to customers with its unique features of agility and multi-tenancy. As the critical resources are hosted at cloud provider’s end, security is a big challenge in cloud computing. If the cloud environment is compromised and attackers get the access of core data centers, the availability of the critical resources becomes a big co...

متن کامل

Mitigating Distributed Denial-of-Service Attack with Deterministic Bit Marking

The Distributed Denial-of-Service attack is a serious threat in Internet and an effective method is needed for distinguishing the attack traffic from the legitimate traffic. We propose the concept of bit marking to identify and drop the attack packets. Bit marking is a variation of packet marking technique that modifies the packet header at each router. However bit marking differs from packet m...

متن کامل

On Mitigating Distributed Denial of Service Attacks

ON MITIGATING DISTRIBUTED DENIAL OF SERVICE ATTACKS

متن کامل

Data Replication-Based Scheduling in Cloud Computing Environment

Abstract— High-performance computing and vast storage are two key factors required for executing data-intensive applications. In comparison with traditional distributed systems like data grid, cloud computing provides these factors in a more affordable, scalable and elastic platform. Furthermore, accessing data files is critical for performing such applications. Sometimes accessing data becomes...

متن کامل

Distributed Helios - Mitigating Denial of Service Attacks in Online Voting

One of many major issues that plagues Internet voting is the potential for a distributed denial of service attack on the voting servers. These denial of service attacks are harmful because they block voting during the downtime. In addition, most current online voting protocols are centralized with only one voting server, making such an attack likely to disenfranchise some voters. The question i...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Indian Journal of Science and Technology

سال: 2016

ISSN: 0974-5645,0974-6846

DOI: 10.17485/ijst/2016/v9i38/98811