A Review of DOS Attacks in Cloud Computing
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2014, Vol 16, Issue 5
Abstract
Abstract: Cloud computing is an emerging trend in the field of IT providing scalable and flexible services to the end users on demand. Cloud offers services in three levels namely infrastructure, platform and software to meet the needs of different kinds of customers. The key cloud characteristics include multitenancy, location and device independence, elasticity, resource pooling and measured service. The IT companies especially the Small and Medium Scale Businesses are moving onto the cloud which enables them to perform high end computational tasks in a cost effective manner. As more and more IT capabilities can be provided as a service in cloud, security becomes a major concern. Among the numerous attacks that can target the cloud environment, DoS or DDoS attacks can cause a major breach in security. This paper discusses the various DDOS attacks and the defense mechanisms that can be employed to secure the cloud.
Authors and Affiliations
Vidhya. V
Comparison of RIP, EIGRP, OSPF, IGRP Routing Protocols in Wireless Local Area Network (WLAN) by using OPNETSimulator tool - A Practical Approach
Abstract: In Adhoc Network group communication is more important, in which routing protocols play a vital role for data transmission. With/Without using central server or access point, the Wireless network form a t...
Dimensionality Reduction Evolution and Validation
Abstract: In this paper, proposing visualized and quantitative evaluation methods for validation dimensionalityreduction techniques performance. Four well known techniques for dimensionality reduction evaluated, verifyth...
Interfacing and Analysis of GPS data using VB
Abstract: Global Positioning System (GPS) provides location and time information anywhere on the earth. We can utilize GPS data to create new applications that can be very useful nowadays. If we want to build a new appli...
Celllls breaks tthe Tor’’s Anonymiitty:: Oniion Routter
To hide the communication of users, the anonymity systems pack the application data into equal – sized cells. The size of IP packets in the Tor network can be very dynamic and the IP layer may be repack cells....
Improved Data Sharing Security with Dual-MAC Address Verification and SHCS
Abstract: For the easy and secure sharing of an unknown private data, an algorithm is developed. The proposed algorithm has improved the data sharing security with MAC address and SHCS verifications. This technique...