Please use this identifier to cite or link to this item: http://hdl.handle.net/10603/287097
Title: Lightweight Mechanisms for Detecting The Ddos Attacks in The Cloud
Researcher: Sindia T V
Guide(s): Julia Punitha Malar Dhas
Keywords: Engineering and Technology,Computer Science,Computer Science Software Engineering
University: Noorul Islam Centre for Higher Education
Completed Date: 27/06/2019
Abstract: ABSTRACT newlineCloud computing is an advanced computing paradigm that unites the concepts of networking newlineand distributed computing. The main entities involved in cloud computing technology are newlineservice provider, service consumer and service. The service provider is the cloud platform newlinethat offers service to the cloud users for a nominal payment. The service consumers of newlinecloud utilize the cloud services by paying some fee to the cloud service provider. The newlinecloud service providers offer a range of services such as Platform-as-a-Service (PaaS), newlineInfrastructure-as-a-Service (IaaS) and Software-as-a-Service (SaaS). newlineThe cloud consumers enjoy these services without any hassles and complexities. newlineInspite of all these attention grabbing services, there are several security threats to the cloud newlinecomputing because of its open nature. One of the most serious threats to cloud computing newlineis the Distributed Denial of Service (DDoS) attacks. The aim of DDoS attacks is to stop newlinethe normal functioning ability of the cloud server. This attack is achieved by creating newlinevoluminous traffic, which the server cannot manage and respond. In such scenario, the newlineserver halts its service, and consequently even the legitimate consumers cannot access the newlineservice. newlineBesides this, executing DDoS attack is a quite simple task. The DDoS attack can be newlineexecuted automatically and it does not require manual intervention to carry out the attack newlinesuccessfully. On the other side, it is very difficult to recover the affected server to normal newlinestate. Hence, it is essential to observe the traffic in the server, such that the attacks can be newlineavoided. newlineUnderstanding the harshness of DDoS and importance of addressing the issue, this newlineresearch work presents three different solutions for detecting the DDoS attack. The proposed newlinesolutions differ by the operational ability, yet the research goal is the same. The initial newlineresearch solution is based on entropy value calculation. This work is based on knowledge newlinegaining and attack detection phase. The DDoS attack detection system gains knowled
Pagination: 135
URI: http://hdl.handle.net/10603/287097
Appears in Departments:Department of Computer Science and Engineering

Files in This Item:
File Description SizeFormat 
acknowledgement.pdfAttached File61.82 kBAdobe PDFView/Open
certificate.pdf74.04 kBAdobe PDFView/Open
chapter iii.pdf1.81 MBAdobe PDFView/Open
chapter ii.pdf2.79 MBAdobe PDFView/Open
chapter i.pdf2.02 MBAdobe PDFView/Open
chapter iv.pdf1.35 MBAdobe PDFView/Open
chapter vii.pdf176.46 kBAdobe PDFView/Open
chapter vi.pdf430.41 kBAdobe PDFView/Open
chapter v.pdf1.95 MBAdobe PDFView/Open
list of publications.docx19.06 kBMicrosoft Word XMLView/Open
references.pdf1.37 MBAdobe PDFView/Open
title page.pdf65.51 kBAdobe PDFView/Open
Show full item record


Items in Shodhganga are licensed under Creative Commons Licence Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0).

Altmetric Badge: