Loading

A Reliable Friedman Hypothesis-Based Detection and Adaptive Load Balancing Scheme for Mitigating Reduction of Quality DDoS Attacks in Cloud Computing
V Loganathan1, S Godfrey Winster2

1V Loganathan, Research Scholar, Saveetha School of Engineering, SIMTS, Chennai, India.
2S Godfrey Winster, Professor, Saveetha Engineering College, Chennai, India. 

Manuscript received on October 15, 2019. | Revised Manuscript received on 22 October, 2019. | Manuscript published on November 10, 2019. | PP: 360-366 | Volume-9 Issue-1, November 2019. | Retrieval Number: A4127119119/2019©BEIESP | DOI: 10.35940/ijitee.A4127.119119
Open Access | Ethics and Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: The computing resource availability in a cloud computing environment is considered as the vital attribute among the security essentialities due to the consequence of on its on demand service. The class of adversaries related to the Distributed Denial of Service (DDoS) attack is prevalent in the cloud infrastructure for exploiting the vulnerabilities during the implementation of their attack that still make the process of providing security and availability at the same time as a challenging objective. In specific, The in cloud computing is the major threat during the process of balancing security and availability at the same time. In this paper, A Reliable Friedman Hypothesis-based Detection and Adaptive Load Balancing Scheme (RFALBS-RoQ-DDOS) is contributed for effective detection of RoQDDoS attacks through Friedman hypothesis testing. It also inherited an adaptive load balancing approach that prevents the degree of imbalance in the cloud environment. The simulation results of the proposed RFALBS-RoQ-DDoS technique confirmed a superior detection rate and a adaptive load balancing rate of nearly 23% and 28% predominant to the baseline DDoS mitigation schemes considered for investigation.
Keywords: Cloud, Security, Attack Router, Traffic. Kruskal-Wallis, Malicious.
Scope of the Article: Cloud Computing