Beruflich Dokumente
Kultur Dokumente
Assoc.Prof in CSE,KMIT,Narayanguda,Hyderabad
ABSTRACT
Cloud Computing is the emerging technology where our present and future are dependent on this technology. At present most
of businesses have shifted their computing paradigm to cloud computing. With Cloud Computing advantages are enormous
but at the same time it is vulnerable to different kinds of attacks ( insiders and as well as out siders). This papers summarize
various techniques to defend DDOS attacks in cloud computing.
Page 111
Page 112
The event generators collect data from the networks and generate suspicious intrusion events. They submit the
suspicious intrusion events to the feature and statistical detection agents. According to the network protocol, these
suspicious intrusion events are divided into TCP events, UDP events and ICMP events.
5 CONCLUSION
Cloud computing is the State-of art-of technology but at the same time it is prone to vulnerabilities. Many of the
authors have identified and tried to implement in practical and this is in process which has to fully implemented and
deployed with low cost. Some of the methods which have been implemented are discussed in this paper.
References
[1] Farzad Sabahi, Cloud Computing Security Threats and Responses 978-1-61284-486-2/111$26.00 2011 IEEE
[2] SANS Institute InfoSec Reading Room .
[3] Sanchika Gupta et al A Profile based Network Intrusion Detection and Prevention system for securing Cloud
Environment Copyright 2013 This is an open access article distributed under the Creative Commons
Attribution License.
[4] Chirag N. Modi Integrating Signature based Apriori based Network Intrusion in Cloud Computing 2nd
International Conference on Communication, Computing & Security (ICCCS-2012) Procedia Technology 6 ( 2012
) 905 912.
[5] Mr R.Kumar Securing Cloud Network Environment against Intrusion using Sequential algorithm International
journal of Engineering and General Science Volume 3, Issue 1, January-February,2015.
[6] RJeena et.al. Attack Graph model : A New approach for DDOS attack detection in Cloud International Journal
of Innovative Research in Computer and Communication Engineering Vol.3,Issue 2, February 2015.
[7] Shaohua Teng et.al A Cooperative Intrusion Detection Model for Cloud Computing Networks International
Journal of Security and its applications vol.8 N0.3 (2014) ,pp107-118 http://dx.doi.org/10.14257/ijsia.2014.8.3.12.
[8] www.hindawi.com/journals/ijdsn/2013/364575/tab1
AUTHORS
Ms B.KIRANMAI working as a Assoc.prof at KMIT ,Narayunguda. She completed M.Tech from
School of IT,JNTUH. Currently Pursuing her Ph.D. from JNTU Hyderabad. Her areas of interest are
Data Mining, Security.
Prof A.Damodaram took over as a Vice-Chancellor 31 october 2015. Dr Damodaram joined as
faculty of Computer Science &Engineering at JNTU,Hyderabad in the year 1989. In 2 decades of
dedicated service ,performed distinguished services for the university , as a Professor, Head of the
Department, Vice Principal, Director of UGC- Academic Staff College, Director of School of
Continuing & Distance Education , Director, University Academic Audit Cell, and Director of
Academic Planning. Dr Damodaram has successfully guided 23 Ph.D. and 2 cad
Scholars apart from a myriad of M.Tech projects. He is currently guiding 6 scholars for Ph.D.
Page 113