Comprehensive study of various techniques for detecting DDoS attacks in cloud environment

5Citations
Citations of this article
10Readers
Mendeley users who have this article in their library.

Abstract

Cloud computing is the most dynamic field of IT industry. It is becoming very famous due to its less resource consuming and higher output. Though Cloud computing is very vast and useful technology but it is not remained untouched from attackers or hackers. The most common attack notified on the cloud environment is DDoS attack. DDoS attacks i.e. Distributed Denial of service attacks happens on a cloud environment in such a way that, two or more than two attackers sends the multiple SOAP requests at the same cloud server and consume all the legitimate resources. From the study it has been concluded that, none a system is developed so far to prevent the DDoS attacks completely because even the detection of DDoS attacks is a major issue and prevention is a very big thing to achieve after detection and mitigation. This paper is focused on underlying the introduction about DDoS attacks and the next part of the paper is followed by the comparative analysis of the different techniques and algorithms used in detecting the DDoS attacks in cloud environment.

Cite

CITATION STYLE

APA

Singh, N., Hans, A., Kumar, K., & Singh Birdi, M. P. (2015). Comprehensive study of various techniques for detecting DDoS attacks in cloud environment. International Journal of Grid and Distributed Computing, 8(3), 119–126. https://doi.org/10.14257/ijgdc.2015.8.3.12

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free