Open Access
Subscription Access
Design and Implementation of Modified Low Energy Adaptive Clustering Hierarchy to Prevent Flooding Attacks in Cloud Environment
Flooding attacks play a vital role in network. Most of the people are working on the cloud computing environment either as a provider or as a consumer. The flooding attack is a challenge to the resources of network and bandwidth of the host for web page. Nowadays, web based applications are developed in the cloud computing environment. The FAPA (Flooding Attack Prevention Architecture) is used to prevent flooding attacks in cloud based computing environment. The LEACH protocol helps to improve the system lifetime by reducing the energy used to transmit the data to the base station. The aim of this work is to prevent the flooding attacks in cloud and transfer the data in a fast and secured manner using MLEACH (Modified Low Energy Adaptive Clustering Hierarchy).
Keywords
Cloud Security, DDoS, MLEACH.
User
Font Size
Information
- Lim Y, Kang S. Intelligent approach for data collection in wireless sensor networks. The International Arab Journal of Information Technology. 2013 Jan; 10(1).
- Zunnurhain K, Susan. FAPA: A model to prevent flooding attacks in clouds. Proceedings of the 50th Annual Southeast Regional Conference; 2012. p. 1–8.
- Katkamwar NS, Puranik AG, Deshpande P. Securing Cloud Servers against Flooding Based DDoS Attacks. International Journal of Application or Innovation in Engineering and Management. 2012 Nov; 1(3):1–6.
- Lin C-H, Lee C-Y, Lai S-P, Lai W-S. A semantic rule-based detection scheme against flooding attacks on cloud environment. International Journal of Security and its Applications. 2012 Apr; 6(2):1–3.
- Shah JJ. Impact of DDOS attacks on cloud environment. International Journal of Research in Computer and Communication Technology. 2013 Jul; 2(7):1–4.
- Lee C-Y, Chen C-R, Lin H, Liu J-C. A detection scheme for flooding attack on application layer based on semantic concept. IEEE Trans on Software Eng. 2011 May; 24(5):376–90.
- Lacono LL, Gruschka N. SOAP message security validation revisited. IEEE Trans on Cloud Computing. 2012 Nov; 26:276–90.
- Bakshi A, Yogesh B. Securing cloud from DDOS attacks using intrusion detection system in virtual machine. 2nd International Conference on, Communication Software and Networks ICCSN ‘10; 2010 Feb 26-28. p. 260–4.
- Santhi K. A defense mechanism to protect cloud comuputing against distributed denial of service attacks. International Journal of Advanced Research in Computer Science and Software Engineering. 2013 May; 3(5):2–5.
- Katkamwar NS, Puranik AG, Deshpande P. Securing cloud servers against flooding based DDoS Attacks. IJAIEM. 2012 Nov; 1(3):1–4.
- Shang F, Abolhasan M, Wysocki T. An energy-efficient adaptive clustering algorithm for wireless sensor networks. International Journal of Information Acquisition. 2009; 6(2):117–26.
- Heinzelman W, Chandrakasan A, Balakrishnan H, Energy efficient communication protocol for wireless sensor networks. Proceeding of the Hawaii International Conference System Sciences; Hawaii. 2000 Jan. p1–6.
- Bakaraniya P, Mehta S. K-LEACH: An improved LEACH protocol for lifetime improvement in WSN. IJETT. 2013 May; 4(5).
- Sharma K, Ghose MK. Wireless sensor networks: An overview on its security threats. IJCA Special Issue on MANETs. 2010; 1.
- Kumar SV, Pal A. Assisted-Leach (A-Leach) energy efficient routing protocol for wireless sensor networks. International Journal of Computer and Communication Engineering. 2013 Jul; 2(4).
- Liao Q, Zhu H. An energy balanced clustering algorithm based on LEACH protocol. Proceedings of the 2nd International Conference on System Engineering and Modeling (ICSEM-13); 2013.
Abstract Views: 539
PDF Views: 401