Securing Cloud Framework from Application DDoS Attacks
-
Published:2019-12-14
Issue:1S
Volume:9
Page:5-8
-
ISSN:2278-3075
-
Container-title:International Journal of Innovative Technology and Exploring Engineering
-
language:en
-
Short-container-title:IJITEE
Abstract
With the extensive growth of in the size of data transmitted and received in the cloud, there arises the risk of sensitive data prone to different kinds of attacks. The attacks may be in the form of intrusions trying to hack the data or in the form of some fatal attacks. To focus more, after the extensive use of applications and social media apps, there is a rise in Application DDoS (Distributed Denial-of-Service) attacks. These attacks are called as L7 (Layer 7) of the OSI Reference model, as they target the topmost layer – the Application Layer. Various simulations in the Cloud have concluded that the cumulative energy consumption and huge amount of migrations on the VMs are severely affected by the Application DDoS attacks or the EDoS (Economic Denial of Sustainability) attacks. This paper discusses the various forms of Application DDoS attacks, the mitigation mechanisms for the Application DDoS attacks and compares the results in the simulated cloud environment.
Publisher
Blue Eyes Intelligence Engineering and Sciences Engineering and Sciences Publication - BEIESP
Subject
Electrical and Electronic Engineering,Mechanics of Materials,Civil and Structural Engineering,General Computer Science
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Detecting of Flow Timing Known Attacks and Protection in VoIP Networks;REST Journal on Data Analytics and Artificial Intelligence;2024-08-13