Open Access Open Access  Restricted Access Subscription or Fee Access

An Analytical Approach to Mitigate DDoS Attacks and Improve Network Performance under Collaborative Software as a Service (SaaS) Cloud Computing Environment

Palvinder Singh Mann, Dinesh Kumar

Abstract


Cloud Computing is a latest buzzword now a day’s , emerges as a key service of the Utility computing which builds on decade of research in the field of networking, web and software services. It offers a service oriented architecture, reduced information technology overhead for the end-user, great flexibility and reduced total cost of ownership but recent attacks on the clouds specially DDoS poses as a potential threat to this key technology of the future. In this paper we are going to present an Analytical approach to mitigate the DDoS attack which further improve network performance in terms of computation time under Software as a Service (SaaS) Cloud Computing environment

Keywords


Cloud Computing, DDoS, SaaS, Utility Computing.

Full Text:

PDF

References


Rajkumar Buyya, Chee Shin Yeoa, Srikumar Venugopal, James Broberg and IvonaBrandic “Cloud computing and emerging IT platforms : Vision, hype and reality for delivering computing as the 5thutility” Future Generation Computer Systems Elsevier (2009) 599-616, Available online 11 December 2008.

Meiko Jensen, Jorg Schwenk, Nils Gruschka and Luigi Lo Iacono, Ruhr University Bochum, Germany, NEC Laboratories Europe “On Technical Security Issues in Cloud Computing” IEEE International Conference on Cloud Computing , 2009. DOI 10.1109/Cloud 2009.60.

Balachandra Reddy Kandukuri, Ramakrishna Paturi Vand Dr. Atanu Rakshit “Cloud Security Issues” IEEE International Conference on Services Computing, 2009, DOI 10.1109/SCC.2009.84.

Marios D. Dikaiakos, George Pallis, Dimitrios Katsaros, Pankaj Mehra and AthenaVakali“CloudComputing-Distributed Internet Computing for IT and Scientific Research” IEEE Internet Computing, 2009.

Rajkumar Buyya, Rajiv Ranjan and Rodrigo N. Calheiros “Modeling and Simulation of Scalable Cloud Computing Environments and the CloudSim Toolkit: Challenges and Opportunities” IEEE 2009 Conference on Automation and Logistics Shenyang, China August 2009.

Mladen A. Vouk “Cloud Computing – Issues, Research and Implementations” Proceedings of the ITI 2008 30th Int. Conf. on Information Technology Interfaces, June 23-26, 2008, Cavtat, Croatia.

Arun Raj Kumar and P. and S. Selvakumar “Distributed Denial-of-Service (DDoS) Threat in Collaborative Environment - A Survey on DDoS Attack Tools and Traceback Mechanisms” IEEE International Advance Computing Conference (IACC 2009) Patiala, India, 6-7 March 2009.

Qingtao Wu, Ruijuan Zheng , Jiexin Pu and Shibao Sun “An Adaptive Control Mechanism for Mitigating DDoS Attacks” Proceedings of the IEEE International Conference on Automation and Logistics Shenyang, China August 2009.

Monika Sachdeva, Krishan Kumar, Gurvinder Singh and Kuldip Singh “Performance Analysis of Web Service under DDoS Attacks” IEEE International Advance Computing Conference (IACC 2009) Patiala, India, 6-7 March 2009

Gabriel Maciá-Fernández, Jesús E. Díaz-Verdejo and Pedro García-Teodoro “Mathematical Model for Low-Rate DoS Attacks Against Application Servers” IEEE Transactions On Information Forensics and Security Published by the IEEE Computer Society 2009.Vol. 4, No. 3, September 2009.

Li Xinlei, Zheng Kangfeng and Yang Yixian “A DDoS attack defending scheme based on network processor” 2009 WASE International Conference on Information Engineering.

Yi Xie and Shun-Zheng Yu “Monitoring the Application-Layer DDoS Attacks for Popular Websites” IEEE/ACM Transactions on Networking, Vol. 17, NO. 1, Feb. 2009.

Simon Liu, US National Library of Medicine “Surviving Distributed Denial-of-Service Attacks” Computer.org/ ITPro,Published by the IEEE Computer Society 2009

Jayaraj Poroor and Bharat Jayaraman “ DoS Attacks on Real-Time Media through Indirect Contention-in-Hosts” IEEE Internet Computing Published by the IEEE Computer Society 2009.

Gregory,Conti and Mustaque Ahamad “A Framework for Countering Denial-of-Information Attacks” IEEE Security & Privacy , Published by the IEEE Computer Society 2009.

Supranamaya Ranjan, Ram Swaminathan, Mustafa Uysal and Antonio Nucci “DDoS-Shield: DDoS-Resilient Scheduling to Counter Application Layer Attacks” IEEE/ACM Transactions on Networking Vol. 17, NO. 1, Feb. 2009.


Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.