Handling DDOS attacks in Cloud Computing based on SDM System

Authors(2) :-S. Akhilesh Kumar, A. Sundersingh

Distributed Denial of service attacks in cloud computing environments are growing due to the essential characteristics of cloud computing. With recent advances in software defined networking, new chances to defeat DDoS attacks in cloud computing environments. In this paper new paper and characteristics of DDoS attacks in cloud computing and provide a comprehensive survey of defence mechanisms against DDoS attacks using SDN..This work can help to understand how to make full use of SDN advantages to defeat DDoS attack in cloud computing environment to prevent Software Defined Networking itself from becoming a victim of DDoS attacks, which are important for the smooth evolution of Software Defined Networking based cloud without the distraction of DDoS

Authors and Affiliations

S. Akhilesh Kumar
Department of M.Sc(Software Engineering), PSN College of Engineering & Technology, Tirunelveli, Tamilnadu, India
A. Sundersingh
Department of M.Sc(Software Engineering), PSN College of Engineering & Technology, Tirunelveli, Tamilnadu, India

Application Programming Interface, VLAN, IETF, Saas, Paas, Iaas, QoS

  1. G. Pallis, “Cloud computing: The new frontier of Internet computing,” IEEE
  2. T. Taleb, “Toward carrier cloud: Potential, challenges, and solutions,” IEEE Wireless Commun., vol. 21, no. 3, pp. 80–91, Jun. 2014.
  3. F. R. Yu and V. C. M. Leung, Advances in Mobile Cloud Computing Systems. New York, NY, USA: CRC Press, 2015.
  4. Y.-D. Lin, D. Pitt, D. Hausheer, E. Johnson, and Y.-B. Lin, “Software defined networking: Standardization for cloud computing’s second wave,” Computer, vol. 47, no. 11, pp. 19–21, Nov. 2014.
  5. Z. Yin, F. R. Yu, S. Bu, and Z. Han, “Joint cloud and wireless networks operations in mobile cloud computing environments with telecom operator cloud,” IEEE Trans. Wireless Commun., vol. 14, no. 7, pp. 4020–4033, Jul. 2015.
  6. Y. Cai, F. R. Yu, and S. Bu, “Dynamic operations of cloud radio access networks (C-RAN) for mobile cloud computing systems,” IEEE Trans. Veh. Tech., accepted for publication, DOI: 10.1109/TVT.2015.2411739.
  7. Y. Cai, F. R. Yu, C. Liang, B. Sun, and Q. Yan, “Software defined device-to-device (D2D) communications in virtual wireless networks with imperfect network
  8. Ku, Y. Lu, and M. Gerla, “Software-defined mobile cloud: Architecture, services and use cases,” in Proc. IEEE IWCMC, Aug. 2014, pp. 1–6.
  9. P. Klemperer, Y. Liang, M. Mazurek, M. Sleeper, B. Ur, L. Bauer,
  10. L. F. Cranor, N. Gupta, and M. Reiter, “Tag, you can see it!: Using tags for access control in photo sharing,” in Proc. ACM Annu. Conf. Human Factors Comput. Syst., 2012, pp. 377–386
  11. Multi-authority attribute-based encryption,” in Proc. 16th ACM Conf. Comput. Commun. Security, 2011, pp. 121-130

Publication Details

Published in : Volume 2 | Issue 2 | March-April 2017
Date of Publication : 2017-04-30
License:  This work is licensed under a Creative Commons Attribution 4.0 International License.
Page(s) : 62-68
Manuscript Number : CSEIT17222
Publisher : Technoscience Academy

ISSN : 2456-3307

Cite This Article :

S. Akhilesh Kumar, A. Sundersingh, "Handling DDOS attacks in Cloud Computing based on SDM System", International Journal of Scientific Research in Computer Science, Engineering and Information Technology (IJSRCSEIT), ISSN : 2456-3307, Volume 2, Issue 2, pp.62-68, March-April.2017
URL : http://ijsrcseit.com/CSEIT17222

Follow Us

Contact Us