Please use this identifier to cite or link to this item: http://dspace.dtu.ac.in:8080/jspui/handle/repository/14507
Full metadata record
DC FieldValueLanguage
dc.contributor.authorDADORIYA, DEVENDRA-
dc.date.accessioned2016-03-11T08:09:34Z-
dc.date.available2016-03-11T08:09:34Z-
dc.date.issued2016-02-
dc.identifier.urihttp://dspace.dtu.ac.in:8080/jspui/handle/repository/14507-
dc.description.abstractCloud Computing is an emerging technology. Cloud computing provides services to users on-demand and online. Users use services and according to service pay for that service. Cloud has more number of security issues. Availability is the one of the important security issue. Availability security issue are affecting by the DOS and DDOS attack. DOS and DDOS are affecting victim. Victim does not provide services or deny the users for provide services. In the DOS and DDOS attack, attacker sends large number of packets to the victim and victim process useless packet. Attacker sends TCP SYN and TCP ACK packets. TCP SYN packet affects the memory exhaustion of the victim because attacker sends large number of the TCP SYN packet. TCP ACK packet affects the CPU exhaustion of the victim because victim does not response legitimate user and waste most of the time process useless packets. Count based filtering method solve the DOS and DDOS attack. Count based filtering method extract the fields of the TCP frame format and count the packet which are the same fields that are extract and maintain count. According to count in the single timestamp packets will be accepted or reject.en_US
dc.language.isoen_USen_US
dc.relation.ispartofseriesTD NO.1300;-
dc.subjectCLOUD COMPUTINGen_US
dc.subjectFILTERING METHODen_US
dc.subjectDDOSen_US
dc.subjectDOSen_US
dc.titlePREVENTION OF DOS & DDOS ATTACK IN CLOUD COMPUTING USING FILTERING METHODen_US
dc.typeThesisen_US
Appears in Collections:M.E./M.Tech. Computer Engineering

Files in This Item:
File Description SizeFormat 
Final_Dev.pdf1.33 MBAdobe PDFView/Open


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.