Please use this identifier to cite or link to this item: https://dspace.iiti.ac.in/handle/123456789/4861
Full metadata record
DC FieldValueLanguage
dc.contributor.authorSaxena, Rajaten_US
dc.contributor.authorDey, Somnathen_US
dc.date.accessioned2022-03-17T01:00:00Z-
dc.date.accessioned2022-03-17T15:35:47Z-
dc.date.available2022-03-17T01:00:00Z-
dc.date.available2022-03-17T15:35:47Z-
dc.date.issued2020-
dc.identifier.citationSaxena, R., & Dey, S. (2020). DDoS attack prevention using collaborative approach for cloud computing. Cluster Computing, 23(2), 1329-1344. doi:10.1007/s10586-019-02994-2en_US
dc.identifier.issn1386-7857-
dc.identifier.otherEID(2-s2.0-85074470116)-
dc.identifier.urihttps://doi.org/10.1007/s10586-019-02994-2-
dc.identifier.urihttps://dspace.iiti.ac.in/handle/123456789/4861-
dc.description.abstractDistributed denial of service (DDoS) attack is one of the prominent risk factors for the development of cloud service. It is a very hard task for novice cloud users to identify the real source of DDoS attack because of the attacker spoofs the internet protocol (IP) and media access control (MAC) addresses. To address this problem, we propose a third party auditor (TPA) based packet traceback approach. The method uses Weibull distribution for analyzing the source of the DDoS attack. The approach provides an efficient and fruitful solution because of its strong identification factor. The identification factor depends upon the weaknesses left by the intruder. We analyze the traffic pattern to generate attack alert for different cloud users. The advantage of this approach is that it reduces the overhead on the cloud user. With the help of Weibull distribution, we can easily obtain the availability, reliability and median life of DDoS defense in the cloud environment. To demonstrate our approach, we implement an application based on Hadoop and MapReduce framework. We tested this application based on various parameters. Our method has shown the tremendous improvement over the other state of the art methods. The experimental results are included to show the effectiveness of the proposed method for DDoS attack prevention and mitigation. © 2019, Springer Science+Business Media, LLC, part of Springer Nature.en_US
dc.language.isoenen_US
dc.publisherSpringeren_US
dc.sourceCluster Computingen_US
dc.subjectCloud computingen_US
dc.subjectInternet protocolsen_US
dc.subjectMedium access controlen_US
dc.subjectNetwork securityen_US
dc.subjectWeibull distributionen_US
dc.subjectCloud environmentsen_US
dc.subjectCollaborative approachen_US
dc.subjectDistributed denial of service attacken_US
dc.subjectMapreduce frameworksen_US
dc.subjectMedia access controlen_US
dc.subjectPacket tracesen_US
dc.subjectState-of-the-art methodsen_US
dc.subjectThird partiesen_US
dc.subjectDenial-of-service attacken_US
dc.titleDDoS attack prevention using collaborative approach for cloud computingen_US
dc.typeJournal Articleen_US
Appears in Collections:Department of Computer Science and Engineering

Files in This Item:
There are no files associated with this item.


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.

Altmetric Badge: