A Novel Cloud Computing Security Model to Detect and Prevent DoS and DDoS Attack
Journal Title: International Journal of Advanced Computer Science & Applications - Year 2014, Vol 5, Issue 6
Abstract
Cloud computing has been considered as one of the crucial and emerging networking technology, which has been changed the architecture of computing in last few years. Despite the security concerns of protecting data or providing continuous service over cloud, many organisations are considering different types cloud services as potential solution for their business. We are researching on cloud computing security issues and potential cost effective solution for cloud service providers. In our first paper we have revealed number of security risks for cloud computing environment, which has focused on lack of awareness of cloud service providers. In our second paper, we have investigated on technical security issues involved in cloud service environment, where it’s been revealed that DoS or DDoS is one of the common and significant dangers for cloud computing environment. In this paper, we have investigated on different techniques that can be used for DoS or DDoS attack, have recommended hardware based watermarking framework technology to protect the organisation from these threats.
Authors and Affiliations
Masudur Rahman, Wah Cheung
Observation of Scintillation Events from GPS and NavIC (IRNSS) Measurements at Bangalore Region
Ionosphere scintillation is a random phenomenon of the ionosphere, causing abrupt fluctuations in the amplitude and phase of the signals traversing the medium, significantly impacting the performance of navigation system...
An Optimized Salahaddin University New Campus IP-Network Design using OPNET
Salahaddin University is the oldest and the biggest university in Kurdistan region. It involves 14 colleges and 3 academic centers. The new university campus that will be established on an area of 10km2 provides a challe...
Multi-Depots Vehicle Routing Problem with Simultaneous Delivery and Pickup and Inventory Restrictions: Formulation and Resolution
Reverse logistics can be defined as a set of practices and processes for managing returns from the consumer to the manufacturer, simultaneously with direct flow management. In this context, we have chosen to study an imp...
An Authorization Mechanism for Access Control of Resources in the Web Services Paradigm
With the increase in web based enterprise services, there is an increasing trend among business enterprises to migrate to web services platform. Web services paradigm poses a number of new security challenges, which can...
Contribution to the Development of A Dynamic Circulation Map using the Multi-Agent Approach
Road traffic is considered one of the most difficult domains to manage and one of the fast- growing networks. This environment is geographically distributed and its actors are in continuous interaction in order to be abl...