{"title":"一种基于云计算的分布式拒绝服务攻击控制模型","authors":"E. Ahmed, Huma Ali Ahmed","doi":"10.1109/ICEEST48626.2019.8981709","DOIUrl":null,"url":null,"abstract":"Cloud computing is another innovation among many other latest technologies that enables the customers to get access to the services as per their demand. Cloud computing is getting success due to its self service nature and on demand services. It provides great flexibility to its customers as they have to pay only for those services which they are in need to use without getting worried to pay the cost of hardware and software maintenance. This characteristic of cloud computing makes it affordable for those organizations that are not ready to spend heavy amounts to get the licensed software and also on the deployment of hardware in their premises. Instead of many advantages of using cloud computing, security is still a major concern which creates an obstruction in the rapid development of cloud computing. Most of the users share their data by using cloud services so the major concern in cloud computing is the availability of data but it is observed that due to certain attacks data is not readily available when it is needed by the users. We are basically focusing on denial of service (DOS) in this research paper which is one of the popular attacks. It is a major reason of the inaccessibility of services and resources to the users by flooding the network and generating a lot of requests with invalid return addresses. We are going to propose a model to control DOS attack so the users will get an environment where their data is available over the cloud.","PeriodicalId":201513,"journal":{"name":"2019 4th International Conference on Emerging Trends in Engineering, Sciences and Technology (ICEEST)","volume":"37 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"A Proposed Model for Controlling Distributed Denial of Service Attack on Cloud Computing\",\"authors\":\"E. Ahmed, Huma Ali Ahmed\",\"doi\":\"10.1109/ICEEST48626.2019.8981709\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Cloud computing is another innovation among many other latest technologies that enables the customers to get access to the services as per their demand. Cloud computing is getting success due to its self service nature and on demand services. It provides great flexibility to its customers as they have to pay only for those services which they are in need to use without getting worried to pay the cost of hardware and software maintenance. This characteristic of cloud computing makes it affordable for those organizations that are not ready to spend heavy amounts to get the licensed software and also on the deployment of hardware in their premises. Instead of many advantages of using cloud computing, security is still a major concern which creates an obstruction in the rapid development of cloud computing. Most of the users share their data by using cloud services so the major concern in cloud computing is the availability of data but it is observed that due to certain attacks data is not readily available when it is needed by the users. We are basically focusing on denial of service (DOS) in this research paper which is one of the popular attacks. It is a major reason of the inaccessibility of services and resources to the users by flooding the network and generating a lot of requests with invalid return addresses. We are going to propose a model to control DOS attack so the users will get an environment where their data is available over the cloud.\",\"PeriodicalId\":201513,\"journal\":{\"name\":\"2019 4th International Conference on Emerging Trends in Engineering, Sciences and Technology (ICEEST)\",\"volume\":\"37 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2019-12-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2019 4th International Conference on Emerging Trends in Engineering, Sciences and Technology (ICEEST)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICEEST48626.2019.8981709\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2019 4th International Conference on Emerging Trends in Engineering, Sciences and Technology (ICEEST)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICEEST48626.2019.8981709","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
A Proposed Model for Controlling Distributed Denial of Service Attack on Cloud Computing
Cloud computing is another innovation among many other latest technologies that enables the customers to get access to the services as per their demand. Cloud computing is getting success due to its self service nature and on demand services. It provides great flexibility to its customers as they have to pay only for those services which they are in need to use without getting worried to pay the cost of hardware and software maintenance. This characteristic of cloud computing makes it affordable for those organizations that are not ready to spend heavy amounts to get the licensed software and also on the deployment of hardware in their premises. Instead of many advantages of using cloud computing, security is still a major concern which creates an obstruction in the rapid development of cloud computing. Most of the users share their data by using cloud services so the major concern in cloud computing is the availability of data but it is observed that due to certain attacks data is not readily available when it is needed by the users. We are basically focusing on denial of service (DOS) in this research paper which is one of the popular attacks. It is a major reason of the inaccessibility of services and resources to the users by flooding the network and generating a lot of requests with invalid return addresses. We are going to propose a model to control DOS attack so the users will get an environment where their data is available over the cloud.