A Performance Perspective Analysis: A Detailed Vision on Denial of Service and Distributed Denial of Service on Cloud Computing
M. Mayuranathan1, M. Murugan2, V. Dhanakoti3
1M. Mayuranathan, Asst.Prof/CSE, SRM Valliammai Engineering College, Chennai, India.
2Dr. M. Murugan, Professor/ECE & Vice-Principal, SRM Valliammai Engineering College, Chennai, India.
3Dr.V.Dhanakoti, Assoc.Prof/CSE, SRM Valliammai Engineering College, Chennai, India.
Manuscript received on 7 August 2019. | Revised Manuscript received on 11 August 2019. | Manuscript published on 30 September 2019. | PP: 3132-3143 | Volume-8 Issue-3 September 2019 | Retrieval Number: C5002098319/2019©BEIESP | DOI: 10.35940/ijrte.C5002.098319
Open Access | Ethics and Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)
Abstract: In recent days cloud computing and cloud-based service, provisions play a vital and significant role in Internet-based information computing. It interrelates various applications like sales, purchase, banking, customer service, etc. and it behaves entirely as a service-oriented platform or environment. The primary objective of the cloud computing is sharing the resources within increased efficiency regarding time and cost for all kind of customers who needs a cloud service badly and immediately. Though the energy is high, it cannot assure that the cloud computing, service providing, and customer maintenance are highly secured. Service providers in the cloud are not strictly public; it may be private, community and hybrid. Malicious activities can be created or occurred in the middle of the communication and it is difficult to predict a particular person in the middle becomes a malicious user, from where and how. Secured data transmission and discussion in cloud computing considered as the main problem, and various earlier research works focused on tightening the security. The primary objective of this paper is to discuss different security mechanisms applied to multiple malicious threats in the cloud to understand the various issues and challenges faced in earlier research works. It provides a summary of the risks, appropriate method and the limitations and it helps to understand the primary and main problems related to security.
Keywords: Malicious Activities, DoS/DDoS Attacks, Detection, and Prevention Mechanisms, Cloud Computing, Cloud Security.
Scope of the Article: Predictive Analysis