On Technical Security Issues in Cloud Computing
CLOUD '09 Proceedings of the 2009 IEEE International Conference on Cloud Computing
Securing Cloud from DDOS Attacks Using Intrusion Detection System in Virtual Machine
ICCSN '10 Proceedings of the 2010 Second International Conference on Communication Software and Networks
Attack Surfaces: A Taxonomy for Attacks on Cloud Services
CLOUD '10 Proceedings of the 2010 IEEE 3rd International Conference on Cloud Computing
A Cooperative Intrusion Detection System Framework for Cloud Computing Networks
ICPPW '10 Proceedings of the 2010 39th International Conference on Parallel Processing Workshops
ICDCSW '10 Proceedings of the 2010 IEEE 30th International Conference on Distributed Computing Systems Workshops
Security and Privacy in Cloud Computing: A Survey
SKG '10 Proceedings of the 2010 Sixth International Conference on Semantics, Knowledge and Grids
Cloud security defence to protect cloud computing against HTTP-DoS and XML-DoS attacks
Journal of Network and Computer Applications
Secure virtualization for cloud computing
Journal of Network and Computer Applications
Cloud Evaluation Method of Network Attack Resistance Ability
NCIS '11 Proceedings of the 2011 International Conference on Network Computing and Information Security - Volume 02
Hi-index | 0.00 |
Cloud computing is a booming field which will be predominating the IT industries soon. Cloud computing is a virtual dynamic version of the present day internet resource access which is static. Cloud computing provides high availability of various large-scale geographically distributed resources for users ranging from small to large-scale on demand. The two key advantages of this model are ease of use and cost effectiveness, i.e., cost as per the usage and maximum resource utilisation. The main issue identified in cloud computing is security. In the specific case of cloud computing systems, the impact of a flooding attack is expected to be amplified drastically as and when the cloud computing operating system notices the high workload on the flooded service, it will start to provide more computational power to cope with the additional workload. The attacker can flood a single, cloud-based address in order to perform a full loss of availability on the intended service. In this paper, the proposed spoofing detection algorithm to detect DDos attacks launched against a server inside a cloud.