Handling DDOS attacks in Cloud Computing based on SDM System

Authors

  • S. Akhilesh Kumar  Department of M.Sc(Software Engineering), PSN College of Engineering & Technology, Tirunelveli, Tamilnadu, India
  • A. Sundersingh  Department of M.Sc(Software Engineering), PSN College of Engineering & Technology, Tirunelveli, Tamilnadu, India

Keywords:

Application Programming Interface, VLAN, IETF, Saas, Paas, Iaas, QoS

Abstract

Distributed Denial of service attacks in cloud computing environments are growing due to the essential characteristics of cloud computing. With recent advances in software defined networking, new chances to defeat DDoS attacks in cloud computing environments. In this paper new paper and characteristics of DDoS attacks in cloud computing and provide a comprehensive survey of defence mechanisms against DDoS attacks using SDN..This work can help to understand how to make full use of SDN advantages to defeat DDoS attack in cloud computing environment to prevent Software Defined Networking itself from becoming a victim of DDoS attacks, which are important for the smooth evolution of Software Defined Networking based cloud without the distraction of DDoS

References

  1. G. Pallis, “Cloud computing: The new frontier of Internet computing,” IEEE
  2. T. Taleb, “Toward carrier cloud: Potential, challenges, and solutions,” IEEE Wireless Commun., vol. 21, no. 3, pp. 80–91, Jun. 2014.
  3. F. R. Yu and V. C. M. Leung, Advances in Mobile Cloud Computing Systems. New York, NY, USA: CRC Press, 2015.
  4. Y.-D. Lin, D. Pitt, D. Hausheer, E. Johnson, and Y.-B. Lin, “Software defined networking: Standardization for cloud computing’s second wave,” Computer, vol. 47, no. 11, pp. 19–21, Nov. 2014.
  5. Z. Yin, F. R. Yu, S. Bu, and Z. Han, “Joint cloud and wireless networks operations in mobile cloud computing environments with telecom operator cloud,” IEEE Trans. Wireless Commun., vol. 14, no. 7, pp. 4020–4033, Jul. 2015.
  6. Y. Cai, F. R. Yu, and S. Bu, “Dynamic operations of cloud radio access networks (C-RAN) for mobile cloud computing systems,” IEEE Trans. Veh. Tech., accepted for publication, DOI: 10.1109/TVT.2015.2411739.
  7. Y. Cai, F. R. Yu, C. Liang, B. Sun, and Q. Yan, “Software defined device-to-device (D2D) communications in virtual wireless networks with imperfect network
  8. Ku, Y. Lu, and M. Gerla, “Software-defined mobile cloud: Architecture, services and use cases,” in Proc. IEEE IWCMC, Aug. 2014, pp. 1–6.
  9. P. Klemperer, Y. Liang, M. Mazurek, M. Sleeper, B. Ur, L. Bauer,
  10. L. F. Cranor, N. Gupta, and M. Reiter, “Tag, you can see it!: Using tags for access control in photo sharing,” in Proc. ACM Annu. Conf. Human Factors Comput. Syst., 2012, pp. 377–386
  11. Multi-authority attribute-based encryption,” in Proc. 16th ACM Conf. Comput. Commun. Security, 2011, pp. 121-130

Downloads

Published

2017-04-30

Issue

Section

Research Articles

How to Cite

[1]
S. Akhilesh Kumar, A. Sundersingh, " Handling DDOS attacks in Cloud Computing based on SDM System, IInternational Journal of Scientific Research in Computer Science, Engineering and Information Technology(IJSRCSEIT), ISSN : 2456-3307, Volume 2, Issue 2, pp.62-68, March-April-2017.