REPOSITORY Doc's

Securing cloud computing.

Show simple item record

dc.contributor.author Haddadi, Mohamed
dc.contributor.author Beghdad, Rachid ; promoteur
dc.date.accessioned 2018-04-05T07:41:13Z
dc.date.available 2018-04-05T07:41:13Z
dc.date.issued 2016-01-14
dc.identifier.uri http://univ-bejaia.dz/dspace/123456789/9561
dc.description Option: Cloud Computing en_US
dc.description.abstract Cloud Computing is one of today’s most exciting technologies ,because it can reduce the cost and complexity of applications. On the other hand, such complex and distributed architectures become an attractive target for attacks .Flooding attacks based DoS represent a serious danger which can deny the legitimate users access to the service delivered by cloud. In this paper, we propose an algorithm, inspired by the Hop Count Filtering(HCF) technique that changes the alert state of HCF to include all the possible available Hop Count values ,and statistical analysis such as threshold for classifying every IP packet in the black list when its number is greater than the threshold during a slot-time, but we must removing an IP from the blacklist if it has not sent a spoofed packet in X amount of time. Compared to the original HCF method and its variants, our proposed method performs better than HCF algorithm and its variants, which achieves high detection accuracy (92%) with fewer false alarms en_US
dc.language.iso en en_US
dc.publisher Université Abderrahmane Mira-Bejaia en_US
dc.subject Cloud computing : Cloud security : VMware architecture : Flooding attacks : HCFm : HCF en_US
dc.title Securing cloud computing. en_US
dc.type Thesis en_US


Files in this item

This item appears in the following Collection(s)

Show simple item record

Search DSpace


Advanced Search

Browse

My Account