Handling DDOS attacks in Cloud Computing based on SDM System
Keywords:
Application Programming Interface, VLAN, IETF, Saas, Paas, Iaas, QoSAbstract
Distributed Denial of service attacks in cloud computing environments are growing due to the essential characteristics of cloud computing. With recent advances in software defined networking, new chances to defeat DDoS attacks in cloud computing environments. In this paper new paper and characteristics of DDoS attacks in cloud computing and provide a comprehensive survey of defence mechanisms against DDoS attacks using SDN..This work can help to understand how to make full use of SDN advantages to defeat DDoS attack in cloud computing environment to prevent Software Defined Networking itself from becoming a victim of DDoS attacks, which are important for the smooth evolution of Software Defined Networking based cloud without the distraction of DDoS
References
- G. Pallis, “Cloud computing: The new frontier of Internet computing,” IEEE
- T. Taleb, “Toward carrier cloud: Potential, challenges, and solutions,” IEEE Wireless Commun., vol. 21, no. 3, pp. 80–91, Jun. 2014.
- F. R. Yu and V. C. M. Leung, Advances in Mobile Cloud Computing Systems. New York, NY, USA: CRC Press, 2015.
- Y.-D. Lin, D. Pitt, D. Hausheer, E. Johnson, and Y.-B. Lin, “Software defined networking: Standardization for cloud computing’s second wave,” Computer, vol. 47, no. 11, pp. 19–21, Nov. 2014.
- Z. Yin, F. R. Yu, S. Bu, and Z. Han, “Joint cloud and wireless networks operations in mobile cloud computing environments with telecom operator cloud,” IEEE Trans. Wireless Commun., vol. 14, no. 7, pp. 4020–4033, Jul. 2015.
- Y. Cai, F. R. Yu, and S. Bu, “Dynamic operations of cloud radio access networks (C-RAN) for mobile cloud computing systems,” IEEE Trans. Veh. Tech., accepted for publication, DOI: 10.1109/TVT.2015.2411739.
- Y. Cai, F. R. Yu, C. Liang, B. Sun, and Q. Yan, “Software defined device-to-device (D2D) communications in virtual wireless networks with imperfect network
- Ku, Y. Lu, and M. Gerla, “Software-defined mobile cloud: Architecture, services and use cases,” in Proc. IEEE IWCMC, Aug. 2014, pp. 1–6.
- P. Klemperer, Y. Liang, M. Mazurek, M. Sleeper, B. Ur, L. Bauer,
- L. F. Cranor, N. Gupta, and M. Reiter, “Tag, you can see it!: Using tags for access control in photo sharing,” in Proc. ACM Annu. Conf. Human Factors Comput. Syst., 2012, pp. 377–386
- Multi-authority attribute-based encryption,” in Proc. 16th ACM Conf. Comput. Commun. Security, 2011, pp. 121-130
Downloads
Published
Issue
Section
License
Copyright (c) IJSRCSEIT

This work is licensed under a Creative Commons Attribution 4.0 International License.