Normal view MARC view ISBD view

Detection of DDoS attack in cloud computing and its prevention: a systematic review

By: Ali Raza.
Publisher: Tamil Nadu i-manager's 2022Edition: Vol.9(1), Jan-Jun.Description: 1-8p.Subject(s): Computer EngineeringOnline resources: Click here In: i-manager's journal on cloud computing (JCC)Summary: Cloud computing is one of the latest and greatest environments for delivering Software as a Service (SaaS), Infrastructure as a Service (IaaS), and Platform as a Service (PaaS) in digital communications infrastructure. Cloud computing helps the user remotely access the required service as needed through the Internet. But this technological advancement, due to its remote availability in the cloud, leads to new attacks. One of the biggest threats to cloud infrastructure is Distributed Denial of Service (DDoS) flooding attacks. DDoS flooding attacks are clearly trying to exploit the availability of services for a legitimate user. An attacker gains access to a large number of computers (i.e., botnets) by exploiting the vulnerabilities, and then uses the botnets to initiate an organized attack with a large number of targets. This paper analyses the latest methods for detecting and preventing Distributed Denial of Service (DDoS) attacks. It also provided methods and technologies for preventing, detecting, and responding to DDoS flood attacks.
Tags from this library: No tags from this library for this title. Log in to add tags.
    average rating: 0.0 (0 votes)
Item type Current location Call number Status Date due Barcode Item holds
Articles Abstract Database Articles Abstract Database School of Engineering & Technology
Archieval Section
Not for loan 2022-2004
Total holds: 0

Cloud computing is one of the latest and greatest environments for delivering Software as a Service (SaaS), Infrastructure as a Service (IaaS), and Platform as a Service (PaaS) in digital communications infrastructure. Cloud computing helps the user remotely access the required service as needed through the Internet. But this technological advancement, due to its remote availability in the cloud, leads to new attacks. One of the biggest threats to cloud infrastructure is Distributed Denial of Service (DDoS) flooding attacks. DDoS flooding attacks are clearly trying to exploit the availability of services for a legitimate user. An attacker gains access to a large number of computers (i.e., botnets) by exploiting the vulnerabilities, and then uses the botnets to initiate an organized attack with a large number of targets. This paper analyses the latest methods for detecting and preventing Distributed Denial of Service (DDoS) attacks. It also provided methods and technologies for preventing, detecting, and responding to DDoS flood attacks.

There are no comments for this item.

Log in to your account to post a comment.

Click on an image to view it in the image viewer

Unique Visitors hit counter Total Page Views free counter
Implemented and Maintained by AIKTC-KRRC (Central Library).
For any Suggestions/Query Contact to library or Email: librarian@aiktc.ac.in | Ph:+91 22 27481247
Website/OPAC best viewed in Mozilla Browser in 1366X768 Resolution.

Powered by Koha