Title: An Effective DPM Method to Detect DDOS Attacks and to Prevent it in Cloud
Abstract: Cloud computing has become popular and a huge platform for computing where large number of data are available online. Nature of cloud computing is distributed; due to this kind of nature they have become easy target for attackers to exploits the security vulnerability. Availability of data is most important part of cloud computing and even for economic growth of the society. Cybercrime attacks can occur in various form. One major type of attack is a denial-of-service (DDoS) or distributed denial-of-service (DDoS). This attack attempts to make a machine or network resource unavailable to its intended users like bandwidth of network, data structures, operating system and computing power. Distributed Denial of Service (DDoS) attacks continue to plague the Internet. Distributed Denial-of-Service (DDoS) attacks are a significant problem because they are very hard to detect, there is no comprehensive solution and it can shut an organization off from the Internet. So objective of this review paper is identify DDOS Attack Types and Understand Their Effects, Recognize Attack Tools and Protecting Organization Against DDoS Attacks. In next paper we are targeting use of very few surveillance points, our proposed method would be able to monitor the effect of DDoS flooding attacks.
Publication Year: 2015
Publication Date: 2015-01-01
Language: en
Type: article
Access and Citation
AI Researcher Chatbot
Get quick answers to your questions about the article from our AI researcher chatbot