![]() ![]() ![]() We analyze the traffic pattern to generate attack alert for different cloud users. The identification factor depends upon the weaknesses left by the intruder. ![]() The approach provides an efficient and fruitful solution because of its strong identification factor. The method uses Weibull distribution for analyzing the source of the DDoS attack. To address this problem, we propose a third party auditor (TPA) based packet traceback approach. It is a very hard task for novice cloud users to identify the real source of DDoS attack because of the attacker spoofs the internet protocol (IP) and media access control (MAC) addresses. Distributed denial of service (DDoS) attack is one of the prominent risk factors for the development of cloud service. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |