Securing Cloud Framework from Application DDoS Attacks

N/ACitations
Citations of this article
2Readers
Mendeley users who have this article in their library.
Get full text

Abstract

With the extensive growth of in the size of data transmitted and received in the cloud, there arises the risk of sensitive data prone to different kinds of attacks. The attacks may be in the form of intrusions trying to hack the data or in the form of some fatal attacks. To focus more, after the extensive use of applications and social media apps, there is a rise in Application DDoS (Distributed Denial-of-Service) attacks. These attacks are called as L7 (Layer 7) of the OSI Reference model, as they target the topmost layer – the Application Layer. Various simulations in the Cloud have concluded that the cumulative energy consumption and huge amount of migrations on the VMs are severely affected by the Application DDoS attacks or the EDoS (Economic Denial of Sustainability) attacks. This paper discusses the various forms of Application DDoS attacks, the mitigation mechanisms for the Application DDoS attacks and compares the results in the simulated cloud environment.

Cite

CITATION STYLE

APA

Securing Cloud Framework from Application DDoS Attacks. (2019). International Journal of Innovative Technology and Exploring Engineering, 9(1S), 5–8. https://doi.org/10.35940/ijitee.a1002.1191s19

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free