Reference Hub2
Algorithm for Secure Hybrid Cloud Design Against DDoS Attacks

Algorithm for Secure Hybrid Cloud Design Against DDoS Attacks

Akashdeep Bhardwaj, Sam Goundar
Copyright: © 2018 |Volume: 13 |Issue: 4 |Pages: 17
ISSN: 1554-1045|EISSN: 1554-1053|EISBN13: 9781522542971|DOI: 10.4018/IJITWE.2018100104
Cite Article Cite Article

MLA

Bhardwaj, Akashdeep, and Sam Goundar. "Algorithm for Secure Hybrid Cloud Design Against DDoS Attacks." IJITWE vol.13, no.4 2018: pp.61-77. http://doi.org/10.4018/IJITWE.2018100104

APA

Bhardwaj, A. & Goundar, S. (2018). Algorithm for Secure Hybrid Cloud Design Against DDoS Attacks. International Journal of Information Technology and Web Engineering (IJITWE), 13(4), 61-77. http://doi.org/10.4018/IJITWE.2018100104

Chicago

Bhardwaj, Akashdeep, and Sam Goundar. "Algorithm for Secure Hybrid Cloud Design Against DDoS Attacks," International Journal of Information Technology and Web Engineering (IJITWE) 13, no.4: 61-77. http://doi.org/10.4018/IJITWE.2018100104

Export Reference

Mendeley
Favorite Full-Issue Download

Abstract

This article describes how cloud computing has become a significant IT infrastructure in business, government, education, research, and service industry domains. Security of cloud-based applications, especially for those applications with constant inbound and outbound user traffic is important. It becomes of the utmost importance to secure the data flowing between the cloud application and user systems against cyber criminals who launch Denial of Service (DoS) attacks. Existing research related to cloud security focuses on securing the flow of information on servers or between networks but there is a lack of research to mitigate Distributed Denial of Service attacks on cloud environments as presented by Buyya et al. and Fachkha, et al. In this article, the authors propose an algorithm and a Hybrid Cloud-based Secure Architecture to mitigate DDoS attacks. By proposing a three-tier cloud infrastructure with a two-tier defense system for separate Network and Application layers, the authors show that DDoS attacks can be detected and blocked before reaching the infrastructure hosting the Cloud applications.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.