A review on mitigation of the DDoS Attack in cloud in regulated environment

  • Authors

    • Syed Asia Ayaz Andrabi
    • Sachi Pandey
    • Akthar Nazir
    2018-03-19
    https://doi.org/10.14419/ijet.v7i2.8.10492
  • Distributed Denial Of Servic (DDoS), Puzzle Generation
  • Distributed Denial of Service (DDoS) attacks are aimed at exhausting various resources of victim hosts, thereby preventing legitimate usage of their computational capabilities. In this paper, a proper and systematic mitigation technique presented to mitigate the DDoS attack in cloud environment. A robust mechanism is presented which consists of software based puzzle generation method to validate the real customer of cloud services provider from non-reals’ ones to provide better DDoS attack mitigation solution.

  • References

    1. [1] IEEE,and Ren PingLiu,Member, IEEE,†A System for Denial-of- Service Attack Detection Based on Multivariate Correlation Analysis.â€, IEEE Transactions On Parallel And Distributed Systems.

      [2] Subramaniam.T.K,Deepa.B“Preventing distributed denial of service attacks in cloud environmentsâ€, Internationl Journal of Information Technology, Control and Automation (IJITCA) Vol. 6, No.2, April 2016

      [3] Isha Chawla,Pawan Luthra,Daljeet Kaur,“DDoS Attack In Cloud And Mitigation Techniquesâ€International journal of innovative Science ,Engineering & Technology, July 2015.

      [4] Dr.S.SaravanaKumar,R.SenthilKumar,R.Arunprasad,S.Thiraviam,J.Vignesh,ʺ Detecting and Preventing DDoS Attacks in Cloudâ€, International Journal of Innovative Research in Computer and Communication Engineering , March 2015

      [5] Preeti Daffu,Amanpreet Kaur,“Mitigation Of DDoS Attacks In Cloud Computingâ€,978-1-5090-0893-3/16/$31.00 ©2016 IEEE

      [6] Gaurav Somani,Manoj Singh Gaur,Dheeraj Sanghi,Mauro Conti,Muttukrishna Rajaran,Rajkumar Buyya,“Combating Ddos Attacks In The Cloud:Requirements,Trends And Future Directionsâ€,IEEE 2017

      [7] Smita Miraje , Manisha Bharati , "Implementation of Different Software Puzzle Methods against DDOS Attackâ€, International Journal of Innovative Research in Science,Engineering and Technology, Vol. 5, Issue9, September2016.

      [8] T. Padmapriya and V.Saminadan, “Handoff Decision for Multi-user Multiclass Traffic in MIMO-LTE-A Networksâ€, 2nd International Conference on Intelligent Computing, Communication & Convergence (ICCC-2016) – Elsevier - PROCEDIA OF COMPUTER SCIENCE, vol. 92, pp: 410-417, August 2016.

      [9] S.V.Manikanthan and K.srividhya "An Android based secure access control using ARM and cloud computing", Published in: Electronics and Communication Systems (ICECS), 2015 2nd International Conference on 26-27 Feb. 2015,Publisher: IEEE,DOI: 10.1109/ECS.2015.7124833.

      [10] S.V.Manikanthan and T.Padmapriya “Recent Trends In M2m Communications In 4g Networks And Evolution Towards 5gâ€, International Journal of Pure and Applied Mathematics, ISSN NO:1314-3395, Vol-115, Issue -8, Sep 2017.

  • Downloads

  • How to Cite

    Asia Ayaz Andrabi, S., Pandey, S., & Nazir, A. (2018). A review on mitigation of the DDoS Attack in cloud in regulated environment. International Journal of Engineering & Technology, 7(2.8), 497-499. https://doi.org/10.14419/ijet.v7i2.8.10492