Open Access Open Access  Restricted Access Subscription or Fee Access

Secure Methods for Preventing DDoS Attacks In Cloud Environment: A Study

S.J. Neethu, J. Dheeba


Today cloud security is a major problem in the case of computer security and information security. Secure data transferring collapse due to the unauthorized acting of attackers in cloud. Attackers can exploit vulnerabilities and utilize cloud system resources to deploy attacks. So use vulnerable software on their VMs to avoid attackers attack from the cloud. Vulnerable software`s are used to avoid loopholes in cloud security. But there have some challenges is to establish an effective vulnerability or attack detection and response system for accurately identifying attacks and minimizing the impact of security provide to cloud users. Then introduce a model called defense-in-depth intrusion detection framework was proposed. The main objective of this model is to detect attackers and hackers and prevent DDOS attacks in cloud environment

Full Text:



  • There are currently no refbacks.

Disclaimer/Regarding indexing issue:

We have provided the online access of all issues and papers to the indexing agencies (as given on journal web site). It’s depend on indexing agencies when, how and what manner they can index or not. Hence, we like to inform that on the basis of earlier indexing, we can’t predict the today or future indexing policy of third party (i.e. indexing agencies) as they have right to discontinue any journal at any time without prior information to the journal. So, please neither sends any question nor expects any answer from us on the behalf of third party i.e. indexing agencies.Hence, we will not issue any certificate or letter for indexing issue. Our role is just to provide the online access to them. So we do properly this and one can visit indexing agencies website to get the authentic information.