Data security approach in cloud computing by using DOS Attack

Prachi Garg, Sandeep Goel



This paper analyzed the security measures in the collaborative environment, identified widespread DDoS attack implements and surveyed the current trace back tools to suggestion the actual attacker. Nearly, the most popular fears in cooperative environment are entrance controller attacks, SQL injection attacks and implementation of malevolent software, object reusability, camouflaged attacks, inhaling, nosey, and denial-of-service attacks (DoS). The elementary obligation of network based resource allocation includes providing dependable and reliable access of local as well as remote resources in collaborative application. But DDoS attacks are coming in the way of success of such resource centers. DDoS attack architecture can be classified as agent handler model and internet relay chat (IRC) model.

Full Text:



  • There are currently no refbacks.

Copyright (c) 2018 International Journal of Information Dissemination and Technology

Creative Commons License
This work is licensed under a Creative Commons Attribution 4.0 International License.