Open Access Open Access  Restricted Access Subscription Access

Detection Mechanism of DDoS Attack in Cloud Computing


Affiliations
1 Gyan Ganga College of Technology, Jabalpur, M.P, India
 

 The Cloud Computing is a distributed computing model that was built to meet increasing demand for memory, storage and power due to industrialization and scientific research. In cloud environment, entire data resides over set of resources, which enables data to be accessed from Virtual Machines (VM). Availability of the cloud services is key security issues. Recently Distributed Denial of Service (DDoS) attacks are among one of the top threats to cloud environment and its being distributed in nature makes it simpler to launch. During DDoS, a program mostly occupies lots of computing resources, which prevents legitimate users from using services. This can be serious penalty for companies relying on cloud for their business. Thus, it becomes very important to reduce the impact of DDoS. This paper explains DDoS attack, & its effect in cloud computing and the important things which are to be needed while selecting defense mechanism for DDoS.


Keywords

Cloud Computing, Cloud Security, DDoS.
User
Notifications
Font Size

Abstract Views: 171

PDF Views: 3




  • Detection Mechanism of DDoS Attack in Cloud Computing

Abstract Views: 171  |  PDF Views: 3

Authors

Shalini Verma
Gyan Ganga College of Technology, Jabalpur, M.P, India
Saurabh Sharma
Gyan Ganga College of Technology, Jabalpur, M.P, India

Abstract


 The Cloud Computing is a distributed computing model that was built to meet increasing demand for memory, storage and power due to industrialization and scientific research. In cloud environment, entire data resides over set of resources, which enables data to be accessed from Virtual Machines (VM). Availability of the cloud services is key security issues. Recently Distributed Denial of Service (DDoS) attacks are among one of the top threats to cloud environment and its being distributed in nature makes it simpler to launch. During DDoS, a program mostly occupies lots of computing resources, which prevents legitimate users from using services. This can be serious penalty for companies relying on cloud for their business. Thus, it becomes very important to reduce the impact of DDoS. This paper explains DDoS attack, & its effect in cloud computing and the important things which are to be needed while selecting defense mechanism for DDoS.


Keywords


Cloud Computing, Cloud Security, DDoS.