DocumentCode :
260837
Title :
Analysis of simulation of DDOS attack in cloud
Author :
Karthik, S. ; Shah, J.J.
Author_Institution :
Dept. of Comput. Sci. & Eng., GHRCE, Nagpur, India
fYear :
2014
fDate :
27-28 Feb. 2014
Firstpage :
1
Lastpage :
5
Abstract :
Cloud computing is one of the leading development technology of current era. It has got so much of importance because of the high optimization of IT resources as a service to the consumers on demand with high availability, flexibility, reliability and scalability. Cloud computing basically converts the desktop computing into service level computing using remote servers or huge datacenter. The cloud computing has lended many user friendly features in terms of various services available through internet but the harsh reality about cloud computing is that they are prone to security threat attacks. One of the major concerning security threats is called Distributed Denial of service attack (DDOS). DDOS attack destroys the ability of the system to provide service by overwhelming the bandwidth of network device and saturating the computation resources of service provider. This paper describes experimental analysis of impact of flooding DDOS attack in cloud environment through simulation in cloudsim. In this experiment we will be defining Infrastructure as service (IaaS) in cloudsim and this IaaS will be deployed in Eucalyptus cloud suite. Simulation of attacks will be carried out on the few VM instances defined in cloudsim and computational parameters of VM are observed for VM with normal operation and VM under attack.
Keywords :
cloud computing; computer centres; computer network security; resource allocation; virtual machines; DDOS attack simulation analysis; Eucalyptus cloud suite; IT resources optimization; VM instances; cloud computing; cloud environment; cloudsim; datacenter; desktop computing; distributed denial of service attack; infrastructure as a service; network device bandwidth; remote servers; security threat attacks; service level computing; user friendly features; Cloud computing; Computational modeling; Computer crime; Educational institutions; Floods; Industries; Virtual machining; Cloudcomputing; Cloudsim; DDOS; Eucalyptus; IaaS;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Information Communication and Embedded Systems (ICICES), 2014 International Conference on
Conference_Location :
Chennai
Print_ISBN :
978-1-4799-3835-3
Type :
conf
DOI :
10.1109/ICICES.2014.7033841
Filename :
7033841
Link To Document :
بازگشت