CBF: A Packet Filtering Method for DDoS Attack Defense in Cloud Environment

Author(s):  
Qi Chen ◽  
Wenmin Lin ◽  
Wanchun Dou ◽  
Shui Yu
2018 ◽  
Vol 10 (3) ◽  
pp. 61-83 ◽  
Author(s):  
Deepali Chaudhary ◽  
Kriti Bhushan ◽  
B.B. Gupta

This article describes how cloud computing has emerged as a strong competitor against traditional IT platforms by offering low-cost and “pay-as-you-go” computing potential and on-demand provisioning of services. Governments, as well as organizations, have migrated their entire or most of the IT infrastructure to the cloud. With the emergence of IoT devices and big data, the amount of data forwarded to the cloud has increased to a huge extent. Therefore, the paradigm of cloud computing is no longer sufficient. Furthermore, with the growth of demand for IoT solutions in organizations, it has become essential to process data quickly, substantially and on-site. Hence, Fog computing is introduced to overcome these drawbacks of cloud computing by bringing intelligence to the edge of the network using smart devices. One major security issue related to the cloud is the DDoS attack. This article discusses in detail about the DDoS attack, cloud computing, fog computing, how DDoS affect cloud environment and how fog computing can be used in a cloud environment to solve a variety of problems.


2014 ◽  
Vol 651-653 ◽  
pp. 1761-1766
Author(s):  
Lei Zheng

In this paper detection method for the illegal access to the cloud infrastructure is proposed. Detection process is based on the collaborative filtering algorithm constructed on the cloud model. Here, first of all, the normal behavior of the user is formed in the shape of a cloud model, then these models are compared with each other by using the cosine similarity method and by applying the collaborative filtering method the deviations from the normal behavior are evaluated. If the deviation value is above than the threshold, the user who gained access to the system is evaluated as illegal, otherwise he is evaluated as a real user.


Author(s):  
Amarjeet Kaur ◽  
Gagandeep Kaur ◽  
Gagandeep Kaur

In this sense, DoS, particularly DDoS, undermines the Internet, as well as debilitates the common security, because of its predominant utilization in digital wrongdoings. Accordingly to see well the attributes of DDoS issues and examine comparing protection instruments have noteworthy commitments for the scholarly world and industry, as well as for the government disability and crisis administration organizations, since they can utilize such learning to upgrade their capacities of hazard appraisals and help the partners to settle on suitable choices when confronting DDoS dangers. In the current research work the diverse sorts of issues, such viewpoint as far as distinguishing DoS assaults is to see the issue as that of a grouping issue on arrange state (and not on singular bundles or different units) by demonstrating ordinary and assault activity and characterizing the momentum condition of the system as great or terrible, in this way identifying assaults when they happen. Another is the Transmission disappointments or due date misses may bring about unsettling influences to the procedure, debasement of the general control execution. In future All these are settled with the assistance of a DDoS assault location and DSR Algorithm with Cryptography on Wireless Sensor organize and the WSN with BS, CH


2020 ◽  
Author(s):  
Ashish Mishra ◽  
Saurabh Sharma ◽  
Archana Pandey

2019 ◽  
pp. 1927-1951
Author(s):  
Deepali Chaudhary ◽  
Kriti Bhushan ◽  
B.B. Gupta

This article describes how cloud computing has emerged as a strong competitor against traditional IT platforms by offering low-cost and “pay-as-you-go” computing potential and on-demand provisioning of services. Governments, as well as organizations, have migrated their entire or most of the IT infrastructure to the cloud. With the emergence of IoT devices and big data, the amount of data forwarded to the cloud has increased to a huge extent. Therefore, the paradigm of cloud computing is no longer sufficient. Furthermore, with the growth of demand for IoT solutions in organizations, it has become essential to process data quickly, substantially and on-site. Hence, Fog computing is introduced to overcome these drawbacks of cloud computing by bringing intelligence to the edge of the network using smart devices. One major security issue related to the cloud is the DDoS attack. This article discusses in detail about the DDoS attack, cloud computing, fog computing, how DDoS affect cloud environment and how fog computing can be used in a cloud environment to solve a variety of problems.


Sign in / Sign up

Export Citation Format

Share Document