Indian Journal of Science and Technology
Year: 2016, Volume: 9, Issue: 38, Pages: 1-7
Nitesh Bharot1*, Veenadhari Suraparaju , Sanjeev Gupta and Priyanka Verma2
1 Department of Computer Science and Engineering, Aisect University, Bhopal - 464993, Madhya Pradesh, India; [email protected]
2 Department of Information Technology, ABV-IIITM, Gwalior - 474015, Madhya Pradesh, India; [email protected]
3 Department of Electronics and Communication, Aisect University, Bhopal - 464993, Madhya Pradesh, India; [email protected]
*Author for correspondence
Department of Computer Science and Engineering
Objectives: Cloud is becoming a very assertive computing platform now a days due to the availability of resources in a customized manner. But DDoS attack is a very dangerous as it directly affects the availability of resources. So the objective of the paper is to mitigate DDoS attack in cloud network using threshold based technique. Methods/Statistical Analysis: In the proposed solution a list of faulty IP addresses has been prepared based on their performance during the Turing test and named as black list. If the request is from black list than it is directly rejected else forwarded to next step. At the second stage check whether the number of resources available are greater than the request made and also the request for resources is less than the threshold value of resource m, than the resource are allocated to that request else request is rejected. Findings: Cloud resources can be defended from the DDoS attack by any of the three defense mechanisms, i.e. DDoS attack prevention, DDoS attack detection and DDoS attack mitigation and recovery. But it is found that Attack mitigation is the easiest way to defend against the DDos attack because of easily available resources. The paper presented a technique that will easily detect and mitigate the DDos attack and it is very easy to implement with minimum cost and overhead. Application/Improvements: The proposed work can be implemented in any cloud network to save it from wasting the resources for malicious requests. For further improvement client based protection can also be implemented such that the attacker will not be able to form its army for the purpose of DDoS attack.
Keywords: Attack Mitigation, Attack Detection, Cloud Computing, DDoS Attack
Subscribe now for latest articles and news.