A review on mitigation of the DDoS Attack in cloud in regulated environment

  • Authors

    • Syed Asia Ayaz Andrabi
    • Sachi Pandey
    • Akthar Nazir
    https://doi.org/10.14419/ijet.v7i2.8.10492

    Received date: March 22, 2018

    Accepted date: March 22, 2018

    Published date: March 19, 2018

  • Distributed Denial Of Servic (DDoS), Puzzle Generation
  • Abstract

    Distributed Denial of Service (DDoS) attacks are aimed at exhausting various resources of victim hosts, thereby preventing legitimate usage of their computational capabilities. In this paper, a proper and systematic mitigation technique presented to mitigate the DDoS attack in cloud environment. A robust mechanism is presented which consists of software based puzzle generation method to validate the real customer of cloud services provider from non-reals’ ones to provide better DDoS attack mitigation solution.

  • References

    1. IEEE,and Ren PingLiu,Member, IEEE,” A System for Denial-of- Service Attack Detection Based on Multivariate Correlation Analysis.”, IEEE Transactions On Parallel And Distributed Systems.
    2. Subramaniam.T.K,Deepa.B“Preventing distributed denial of service attacks in cloud environments”, Internationl Journal of Information Technology, Control and Automation (IJITCA) Vol. 6, No.2, April 2016
    3. Isha Chawla,Pawan Luthra,Daljeet Kaur,“DDoS Attack In Cloud And Mitigation Techniques”International journal of innovative Science ,Engineering & Technology, July 2015.
    4. Dr.S.SaravanaKumar,R.SenthilKumar,R.Arunprasad,S.Thiraviam,J.Vignesh,ʺ Detecting and Preventing DDoS Attacks in Cloud”, International Journal of Innovative Research in Computer and Communication Engineering , March 2015
    5. Preeti Daffu,Amanpreet Kaur,“Mitigation Of DDoS Attacks In Cloud Computing”,978-1-5090-0893-3/16/$31.00 ©2016 IEEE
    6. Gaurav Somani,Manoj Singh Gaur,Dheeraj Sanghi,Mauro Conti,Muttukrishna Rajaran,Rajkumar Buyya,“Combating Ddos Attacks In The Cloud:Requirements,Trends And Future Directions”,IEEE 2017
    7. Smita Miraje , Manisha Bharati , "Implementation of Different Software Puzzle Methods against DDOS Attack”, International Journal of Innovative Research in Science,Engineering and Technology, Vol. 5, Issue9, September2016.
    8. T. Padmapriya and V.Saminadan, “Handoff Decision for Multi-user Multiclass Traffic in MIMO-LTE-A Networks”, 2nd International Conference on Intelligent Computing, Communication & Convergence (ICCC-2016) – Elsevier - PROCEDIA OF COMPUTER SCIENCE, vol. 92, pp: 410-417, August 2016.
    9. S.V.Manikanthan and K.srividhya "An Android based secure access control using ARM and cloud computing", Published in: Electronics and Communication Systems (ICECS), 2015 2nd International Conference on 26-27 Feb. 2015,Publisher: IEEE,DOI: 10.1109/ECS.2015.7124833.
    10. S.V.Manikanthan and T.Padmapriya “Recent Trends In M2m Communications In 4g Networks And Evolution Towards 5g”, International Journal of Pure and Applied Mathematics, ISSN NO:1314-3395, Vol-115, Issue -8, Sep 2017.
  • Downloads

  • How to Cite

    Asia Ayaz Andrabi, S., Pandey, S., & Nazir, A. (2018). A review on mitigation of the DDoS Attack in cloud in regulated environment. International Journal of Engineering and Technology, 7(2.8), 497-499. https://doi.org/10.14419/ijet.v7i2.8.10492