An Approach for Load Balancing Among Multi-Agents to Protect Cloud Against DDos Attack
Journal Title: INTERNATIONAL JOURNAL OF COMPUTER TRENDS & TECHNOLOGY - Year 2014, Vol 9, Issue 5
Abstract
Cloud Computing is widely used technology in present era. Cloud Computing is mainly used for on demand services over the distributed servers. So it is necessary to manage the working load of participating servers for uninterrupted services. DDOS attack is one of the most important issue in cloud environment which basically focuses on prevention in service providence to the authorize users. A Multi agent based framework cam be used to protect the cloud environment from DDOS attack, but there is a major issue of load distribution among agents participating in Intrusion detection. Here in this paper, another agent is used for load distribution among the agents (Intrusion detection agents) in cloud computing. Using this approach our system may be much stronger and then agent may work in a communicating and co-coordinating manner. For this, we will use a load balancing algorithm and by using this algorithm, an efficient approach to manage load among IDAs in cloud computing can be done. In Order to accomplish it the author is using the approach of centralize load distribution.
Authors and Affiliations
Rohit Srivastava , Avinash Verma , Shadab Hussain
M-Privacy Preserving Synergetic for Data Publishing
In this paper, our focus is on the study of Data mining is the extraction of interesting patterns or knowledge from huge amount of data. In recent years, with the explosivedevelopment in Internet, data storage and data...
A Novel Approach to Detect Spam Worms Propagation with Monitoring the Footprinting
One of the key security threats on the Internet are the compromised machines that can be used to launch various security attacks such as spamming and spreading malware, accessing useful information and DDoS. Attackers fo...
Requirement and Result of Verifying the Program Code
The verification of Java/C++ codes is critical, especially for special projects where human life will be at stake. A system is required that uses integrated reasoning to split each verification condition into a conjuncti...
Integrating Security and Usability at Requirement Specification Process
To construct any software, Requirement process is the common knowledge in most development organization. For any development of process security requirement is rarely supported. Over the years, researcher and developers...
Robust Watermarking Framework with DCT Based Encryption
Since several years,, the protection of multimedia data is becoming extremely important. The protection of the multimedia data might be performed with encryption or data hiding algorithms. To address the transmission tim...