Please use this identifier to cite or link to this item:
https://dspace.iiti.ac.in/handle/123456789/15451
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Saxena, Rajat | en_US |
dc.contributor.author | Dey, Somnath | en_US |
dc.date.accessioned | 2025-01-15T07:10:38Z | - |
dc.date.available | 2025-01-15T07:10:38Z | - |
dc.date.issued | 2019 | - |
dc.identifier.citation | Saxena, R., & Dey, S. (2019). DDoS prevention using third party auditor in cloud computing. Iran Journal of Computer Science, 2(4), 231–244. https://doi.org/10.1007/s42044-019-00039-w | en_US |
dc.identifier.issn | 2520-8438 | - |
dc.identifier.other | EID(2-s2.0-85123990285) | - |
dc.identifier.uri | https://doi.org/10.1007/s42044-019-00039-w | - |
dc.identifier.uri | https://dspace.iiti.ac.in/handle/123456789/15451 | - |
dc.description.abstract | Distributed denial of service (DDoS) attack is one of the prominent risk factors for the development of cloud service. It is a very hard task for novice cloud users to identify the real source of DDoS attack because the attacker spoofs the Internet Protocol and Media Access Control addresses. To address this problem, we propose a third party auditor-based packet traceback approach. The method uses Weibull distribution for analyzing the source of the DDoS attack. The approach provides an efficient and fruitful solution because of its strong identification factor. The identification factor depends on the weaknesses left by the intruder. We analyze the traffic pattern to generate attack alert for different cloud users. The advantage of this approach is that it reduces the overhead on the cloud user. With the help of Weibull distribution, we can easily obtain the availability, reliability and median life of DDoS defense in the cloud environment. To demonstrate our approach, we implement an application based on Hadoop and MapReduce framework. We tested this application based on various parameters. Our method has shown the tremendous improvement over the other state of the art methods. The experimental results are included to show the effectiveness of the proposed method for DDoS attack prevention and mitigation. © Springer Nature Switzerland AG 2019. | en_US |
dc.language.iso | en | en_US |
dc.publisher | Springer International Publishing | en_US |
dc.source | Iran Journal of Computer Science | en_US |
dc.subject | Cloud computing | en_US |
dc.subject | Distributed denial of service (DDoS) Attack | en_US |
dc.subject | Packet traceback | en_US |
dc.subject | Third party auditor (TPA) | en_US |
dc.subject | Weibull distribution | en_US |
dc.title | DDoS prevention using third party auditor in cloud computing | en_US |
dc.type | Journal Article | en_US |
Appears in Collections: | Department of Computer Science and Engineering |
Files in This Item:
There are no files associated with this item.
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.
Altmetric Badge: