2014
DOI: 10.14445/22312803/ijctt-v9p142
|View full text |Cite
|
Sign up to set email alerts
|

An Approach for Load Balancing Among Multi-Agents to Protect Cloud Against DDos Attack

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2015
2015
2020
2020

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(2 citation statements)
references
References 3 publications
0
2
0
Order By: Relevance
“…Another approach would be to identify the attacks based on the targeting of the network layer, primarily the Network/Transport layers as well as the application layers. The classification of the attacks can be based on the attack's resource target, primarily Bandwidth Usage and Use of Server Resources [11]. One means of categorizing DOS attacks is through the mode of attack either reflector/amplification attack or direct attack [12].…”
Section: Introductionmentioning
confidence: 99%
“…Another approach would be to identify the attacks based on the targeting of the network layer, primarily the Network/Transport layers as well as the application layers. The classification of the attacks can be based on the attack's resource target, primarily Bandwidth Usage and Use of Server Resources [11]. One means of categorizing DOS attacks is through the mode of attack either reflector/amplification attack or direct attack [12].…”
Section: Introductionmentioning
confidence: 99%
“…Other related works were done by researcher, including built of intelligent health and decision support agent (iHANDs) with various artificial intelligence mechanisms [5], hinterland waterway barge transport planning using agent-based information integrated platform [6], intelligent agent based model results in excellent throughput, good response time and increases the QoS requirements [7], intelligent agent based defense architecture for DDoS attacks [8], multi-agents model to help drivers in finding a parking space at anytime and anywhere [9], analyzing consumer-to-Cloud and Cloud-to-Cloud interactions [10], implementation of controllers for stand-alone microgrids [11], load distribution among the agents in cloud computing [12], use agents for negotiation of host to host meeting scheduling [13].…”
Section: Introductionmentioning
confidence: 99%