Detection of distributed denial of service attacks in cloud computing by identifying spoofed IP
by N. Jeyanthi; Uttara Barde; M. Sravani; Venu Tiwari; N.Ch. Sriman Narayana Iyengar
International Journal of Communication Networks and Distributed Systems (IJCNDS), Vol. 11, No. 3, 2013

Abstract: Cloud computing is a booming field which will be predominating the IT industries soon. Cloud computing is a virtual dynamic version of the present day internet resource access which is static. Cloud computing provides high availability of various large-scale geographically distributed resources for users ranging from small to large-scale on demand. The two key advantages of this model are ease of use and cost effectiveness, i.e., cost as per the usage and maximum resource utilisation. The main issue identified in cloud computing is security. In the specific case of cloud computing systems, the impact of a flooding attack is expected to be amplified drastically as and when the cloud computing operating system notices the high workload on the flooded service, it will start to provide more computational power to cope with the additional workload. The attacker can flood a single, cloud-based address in order to perform a full loss of availability on the intended service. In this paper, the proposed spoofing detection algorithm to detect DDos attacks launched against a server inside a cloud.

Online publication date: Fri, 28-Feb-2014

The full text of this article is only available to individual subscribers or to users at subscribing institutions.

 
Existing subscribers:
Go to Inderscience Online Journals to access the Full Text of this article.

Pay per view:
If you are not a subscriber and you just want to read the full contents of this article, buy online access here.

Complimentary Subscribers, Editors or Members of the Editorial Board of the International Journal of Communication Networks and Distributed Systems (IJCNDS):
Login with your Inderscience username and password:

    Username:        Password:         

Forgotten your password?


Want to subscribe?
A subscription gives you complete access to all articles in the current issue, as well as to all articles in the previous three years (where applicable). See our Orders page to subscribe.

If you still need assistance, please email subs@inderscience.com