2 research outputs found

    A new framework to alleviate DDoS vulnerabilities in cloud computing

    Get PDF
    In the communication age, the Internet has growing very fast and most industries rely on it. An essential part of Internet, Web applications like online booking, e-banking, online shopping, and e-learning plays a vital role in everyday life. Enhancements have been made in this domain, in which the web servers depend on cloud location for resources. Many organizations around the world change their operations and data storage from local to cloud platforms for many reasons especially the availability factor. Even though cloud computing is considered a renowned technology, it has many challenges, the most important one is security. One of the major issue in the cloud security is Distributed Denial of Service attack (DDoS), which results in serious loss if the attack is successful and left unnoticed. This paper focuses on preventing and detecting DDoS attacks in distributed and cloud environment. A new framework has been suggested to alleviate the DDoS attack and to provide availability of cloud resources to its users. The framework introduces three screening tests VISUALCOM, IMGCOM, and AD-IMGCOM to prevent the attack and two queues with certain constraints to detect the attack. The result of our framework shows an improvement and better outcomes and provides a recovered from attack detection with high availability rate. Also, the performance of the queuing model has been analysed

    Performance Evaluation of UHCF Using TTL Probing for Packet Spoofing Detection in MANET

    Get PDF
    ABSTRACT: Now days various types of network came into existence which supports medium based communication such as wired and wireless. Among them the network which works for temporary basis and gets disconnected after the time limit or connection expires. Ad hoc network supports short durational connection between movable nodes and gets terminated after the communication is over. Mobile ad-hoc network is one of the ad-hoc network having movable nodes communicating with the help of mobility aware routing protocols without any infrastructural elements such as router or switches. Here the mobile nodes itself serves the functionality of router. These network support dynamic environment and sudden changes which causes various unauthenticated devices and services starts operating in normal environment. It causes degradation in normal performance of the network and their behaviour changes as planned by these attacks. IP Spoofing is known as one of these attack in which the normal packets is gets changed or affected by some attacker's packet in network. Quantity of this spoofed packet somewhere had been lost in normal traffic and the detection methodologies needs to make a clear separation between normal and spoofed traffic. The above functionality is achieved by some traditional methods works on the concept of Hop Count Filter (HCF) mechanism. But the traditional HCF method only measures the TTL maximum up to 30 hops limit and the packet coming from larger hops will be taken to be spoofed but it was not the case all the time. Sometimes actual packet might come from more hops. Its solution is been drafted as UHCF (Updated Hop Count Filtering) mechanism suggested i
    corecore