Archives

Optimal Virtual Machine (VM) Load Distribution and DDOS Attacks Detection in Cloud Computing Environment


A. Peter Soosai Anandaraj and G. Indumathi
Abstract

Cloud computing emerges as a useful technological data for longer term and increasing on one of the utility standards computing is most likely claimed to symbolize a wholly new paradigm for viewing and getting access to computational assets. So, quickly increased data storage amount. As a result of protection problem many purchasers hesitate in relocating their touchy data on the clouds, regardless of gigantic curiosity in cloud-based computing. Security is a tremendous hassle, considering the fact that so much of firms present an attractive goal for intruders and the particular considerations will pursue to lower the advancement of distributed computing if not located. Distributed Denial of Service (DDoS) is attacks in networks that cause major performance disturbance. Intrusion Detection System (IDS) are tools for deployment and the correct placement of IDS systems on networks is of great importance for optimal monitoring and achieving maximum effect in protecting a system. In cloud computing, major difficulty is distribution of load. Across multiple nodes, dynamic workload is distributed by this for avoiding overloading of nodes. Resource utilized in an optimum way by this and system performance is enhanced by this. For predicting network anomalies and optimal utilization of resources, this survey intends to provide details about various methods techniques to detect DDoS attack and balancing of load algorithms in cloud computing environment with their challenges.

Volume 12 | 03-Special Issue

Pages: 855-863

DOI: 10.5373/JARDCS/V12SP3/20201327