Asian Science Citation Index is committed to provide an authoritative, trusted and significant information by the coverage of the most important and influential journals to meet the needs of the global scientific community.  
ASCI Database
308-Lasani Town,
Sargodha Road,
Faisalabad, Pakistan
Fax: +92-41-8815544
Contact Via Web
Suggest a Journal
 
Articles by S. Kasthuripriya
Total Records ( 1 ) for S. Kasthuripriya
  S. Kasthuripriya , B. Dhiyanesh and S. Sakthivel
  A DDos Attack is based on cloud security, where each cloud system transfers data to the neighbor cloud system. Access Point (AP) need not be in the reach of all the cloud system in the service area. Cloud system around the AP forward the packets from the distant cloud system to the next node. Cloud service area have the advantages, they can work in a suburbanized fashion, area unit low cost with minimum investment for initial infrastructure, more reliable, scalable and provide increased coverage. The Distributed Denial of Service attacks (DDoS) have become more and more frequent and caused some fatal issues within the recent time. Web user’s expertise Denial of Service (DoS) attacks every day. The completions of the planned method bring no modification on in progress steering software. The Local Flow Trust based Service Monitoring (LFTSM) in addition to trust model require keep post on the offered routing cloud system which is tremendously hard to reach on the service area. On the other hand, our planned method can labor separately as an additional unit on routers for monitor and recording flow in order and communicating with its upstream and downstream data transfer at what occasion the pushback practice is approved out. We are getting to gift Associate with an Analytical approach which can use reactive defense mechanism to mitigate the DDoS attack and any improve topographic point performance in terms of less computation time. Any the simulation result proves it to be a better result familiarized approach.
 
 
 
Copyright   |   Desclaimer   |    Privacy Policy   |   Browsers   |   Accessibility