A Nalysis of Ddos a Ttacks and S Olutions for C Loud C

نویسنده

  • Jayant Shekhar
چکیده

-Cloud Computing makes computing real as a tool and in the form of sevices.Cloud Computing is simply defined as a type of computing that depends on sharing computing resources rather than having local servers or personal devices to handle applications. Cloud Computing is typically a metaphor for the internet. Cloud Computing, we observe an increasing need for cloud Benchmarks, In order to assess the performance of cloud infrastructures an software stacks,to assist with provisioning decisions for cloud users and to compare cloud offerings. The cloud computing model has the ability to scale computer resources on demand, and give users a number of advantages to progress their business process. In fact the total cost of going towards cloud is almost zero when resources are not in use. Therefore it is no wonder that academic research and industry are moving towards cloud computing. However, Security should in fact be implemented it alongside functionality and performance. One of the most serious threats to cloud computing security itself comes from Distributed Denial of service attacks. At virtual level DDOS (Distributed Denial of service attacks) is the biggest threat of availability in cloud computing. In Denial of service attack an attacker prevent legitimate users of service from using the desired resources by flood a network or by consuming bandwidth. An analysis on available technique to prevent the DDOS ATTACK and also the limitation of these techniques which we want to focus are DST (Dempster Shafer Theory), NIEF (Network Egress and Ingress Filtering) and various type of CAPTCHA.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

F-STONE: A Fast Real-Time DDOS Attack Detection Method Using an Improved Historical Memory Management

Distributed Denial of Service (DDoS) is a common attack in recent years that can deplete the bandwidth of victim nodes by flooding packets. Based on the type and quantity of traffic used for the attack and the exploited vulnerability of the target, DDoS attacks are grouped into three categories as Volumetric attacks, Protocol attacks and Application attacks. The volumetric attack, which the pro...

متن کامل

MG7: A fast horizontally scalable tool based on cloud computing and graph databases for microbial community profiling

Methods: MG7 i s a n ope n s ource t ool i mplemented i n J ava a nd Scala, ba sed on c loud c omputing ( Amazon W eb S ervices). The g raph da ta platform B io4j ( www.bio4j.com) i s us ed f or r etrieving t axonomy r elated information, w hile N ispero ( http://ohnosequences.com/nispero) i s used f or distributing and coordinating compute tasks. Results: MG7 i s a n ope n-source, f ast a nd h...

متن کامل

The Effect of Portulacaoleracea L Consumption and Regular Exercise on Levels of Cathepsin S, Cystatin C and C-Reactive Protein in Diabetic Women

Abstract       Background and Objectives: Diabetes induced oxidative stress plays an important role in pathological damage to the heart and liver by increased production of extracellular matrix. It is thought that the use of medicinal plants, particularly Portulaca oleracea. L and regular exercise are effective. The aim of this study was to evaluate the effects...

متن کامل

DME Synthesis over MSU-S Catalyst through Methanol Dehydration Reaction

MSU-S mesoporous catalyst with [SiO2]/[Al2O3] ratio of 55 was synthesized using tetrapropylammonium hydroxide (TPAOH) as a structure directing agent and hexadecyltrimethylammonium bromide (CTAB) as a surfactant. The catalytic activity of the calcined sample was evaluated for the dehydration of methanol to dimethyl ether (DME) in a vertical fixed bed microreactor...

متن کامل

Neural Network Based Protection of Software Defined Network Controller against Distributed Denial of Service Attacks

Software Defined Network (SDN) is a new architecture for network management and its main concept is centralizing network management in the network control level that has an overview of the network and determines the forwarding rules for switches and routers (the data level). Although this centralized control is the main advantage of SDN, it is also a single point of failure. If this main contro...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2015