A swift unrest horde system for curtail SDO hit in cloud computing
-
2018-02-05 https://doi.org/10.14419/ijet.v7i1.7.10641 -
Horde, Cloud Computing, SDO -
Abstract
One of the immense risk to benefit accessibility in distributed computing is Distributed Denial of Service. Here a novel approach has been proposed to limit SDO [Strewn Defiance of Overhaul] assaults. This has been wanted to accomplish by a canny quick motion horde organize. An astute horde arrange is required to guarantee independent coordination and portion of horde hubs to play out its handing-off tasks. Clever Water Drop calculation has been adjusted for appropriated and parallel advancement. The quick motion system was utilized to keep up availability between horde hubs, customers, and servers. We have intended to reproduce this as programming comprising of different customer hubs and horde hubs
-
References
[1] R. Geetha and E. Kannan, “A Novel Resource Constraint Secure(Rcs) Routing Protocol For Wireless Sensor Network†in Journal of Engineering Science and Technology,Vol. 12, No. 2 (2017) 518 – 529
[2] C. Dixon, T. Anderson, and A. Krishnamurthy, “Phalanx: Withstanding Multimillion-Node Botnets,†Proc. 5th USENIX Symp. Networked Systems Design and Implementation, San Francisco, CA, 2008.
[3] S. Kandula et al., “Botz-4-Sale: Surviving Organized SDO Attacks That Mimic Flash Crowds,†Proc. 2nd Symp. Networked Systems Design and Implementation, 2005.
[4] A. D. Keromytis, V. Misra, and D. Rubenstein, “SOS: Secure Overlay Services,â€SIGCOMM Comp. Commun. Rev., vol. 32, 2002, pp. 61–72.
[5] R. Mahajan et al., “Controlling High Bandwidth Aggregates in the Network,â€SIGCOMM Comp. Commun. Rev., vol. 32, 2002, pp. 62–73.
[6] M. J. Carmel Mary Belinda and E. Kannan , “Straight Line Routing on Next Hop Graph in Wireless Sensor Networks†in Journal of Computer Science
[7] S.Ravikumar , M.Viswanathan and G.S.Raj, “A Dossier Fortification With Cover-Up And Load Balanced Structure†in International Journal of Applied Engineering Research Volume 10, Number 7 (2015) pp. 18469-18476 © Research India Publications.
[8] C. Saranya Jothi, Ravikumar S, Antony Kumar K and A.Suresh , “An Approach for verifying correctness of web service compositions†in International Journal of Engineering &Technology, 7 (1.7) (2018) 5-10
[9] Antony Kumar K, C Saranya Jothi, S Ravikumar, and V Usha, “Wireless body area network using data communication protocol†in International Journal of Engineering &Technology, 7 (1.7) (2018) 112-114
-
Downloads
-
How to Cite
Ravikumar, S., & Kannan, E. (2018). A swift unrest horde system for curtail SDO hit in cloud computing. International Journal of Engineering & Technology, 7(1.7), 156-160. https://doi.org/10.14419/ijet.v7i1.7.10641Received date: 2018-03-26
Accepted date: 2018-03-26
Published date: 2018-02-05