18 research outputs found

    An Enhanced Entropy Approach to Detect and Prevent DDoS in Cloud Environment

    Get PDF
    Distributed Denial of Service (DDoS) attack launched in Cloud computing environment resulted in loss of sensitive information, Data corruption and even rarely lead to service shutdown. Entropy based DDoS mitigation approach analyzes the heuristic data and acts dynamically according to the traffic behavior to effectively segregate the characteristics of incoming traffic. Heuristic data helps in detecting the traffic condition to mitigate the flooding attack. Then, the traffic data is analyzed to distinguish legitimate and attack characteristics. An additional Trust mechanism has been deployed to differentiate legitimate and aggressive legitimate users. Hence, Goodput of Datacenter has been improved by detecting and mitigating the incoming traffic threats at each stage. Simulation results proved that the Enhanced Entropy approach behaves better at DDoS attack prone zones. Profit analysis also proved that the proposed mechanism is deployable at Datacenter for attack mitigation and resource protection which eventually results in beneficial service at slenderized revenu

    Professional Group of

    No full text
    Abstract: INDIA- Integrated National Dwellers Identity and Authentication (INDIA) card is designed with utmost care to protect the nation from intruders and also to protect the nation’s economy. This card involves the details of the citizen with Date of birth as the Public key and the digital key extracted from the palm vein- a biometric trait along with two other biometric trait, palm print and hand geometry. The encrypted data is to be watermarked in the face image and finally stored in the smart card. This card also facilitated the Global positioning system to trace the people’s location. This card is to be used in the citizen’s transaction right from the lower level i.e from grocery purchase, Electricity bill, Ration purchase etc. to high end purchases like land, building, and business investment. The returns / profits earned are also accounted since the bank accounts are tracked over through the card. This card implementation would provide better security to nation’s people and economy

    New Authentication Scheme to Secure against the Phishing Attack in the Mobile Cloud Computing

    No full text
    A phishing attack is one of the severe threats to the smartphone users. As per the recent lookout report, mobile phishing attack is increasing 85% year to year and going to become a significant threat to the smartphone users. This social engineering attack attempts to get the user’s password by disguising as trusted service provider. Most of the smartphone users are using the Internet services outside of the traditional firewall. Cloud-based documents are one of the primary targets of this phishing attack in mobile cloud computing. Also, most smartphone users are using the cloud storage in their device. To secure against this password attack in a mobile cloud environment, we propose a new authentication scheme to provide novel security to the mobile cloud services. This scheme will verify the user and service provider without transmitting the password using the Zero-knowledge proof based authentication protocol. Moreover, the proposed scheme will provide mutual authentication between the communication entities. The effectiveness of proposed scheme would be verified using protocol verification tool called Scyther
    corecore