2012
DOI: 10.5815/ijcnis.2012.07.02
|View full text |Cite
|
Sign up to set email alerts
|

Protection Against DDoS and Data Modification Attack in Computational Grid Cluster Environment

Abstract: -In the past decades, focus of computation has shifted to high performance computing like Grid Computing and Cloud Computing. In Grid computing, grid server is responsible for managing the all resources like processor, memory and CPU cycles. Grids are basically networks that pool resources, CPU cycles, storage or data from many different nodes used to solve the complex or scientific problem. However in this case, security is a major concern. Even most grid security researches focus on user authentication, auth… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
8
0

Year Published

2014
2014
2022
2022

Publication Types

Select...
5

Relationship

0
5

Authors

Journals

citations
Cited by 7 publications
(8 citation statements)
references
References 7 publications
(7 reference statements)
0
8
0
Order By: Relevance
“…However the results show that extracting useful data from packet payload results in reasonable performance. Prevention of DDoS attack and Data modification attack is presented in [8]. This paper presents DDoS and Data Modification attack scenario and also provides the solution to prevent it.…”
Section: Related Workmentioning
confidence: 99%
“…However the results show that extracting useful data from packet payload results in reasonable performance. Prevention of DDoS attack and Data modification attack is presented in [8]. This paper presents DDoS and Data Modification attack scenario and also provides the solution to prevent it.…”
Section: Related Workmentioning
confidence: 99%
“…These vulnerabilities are not the only approach. There are other types of vulnerability such as malwares, zombie bots and rootkits which can cause denial of service (DDoS) attack [11] or etc.…”
Section: Definition Of Problem (Data Modification Attack)mentioning
confidence: 99%
“…A startup company can utilize the infrastructure provided by a public cloud, such as a Visual Studio framework, to develop a website consisting of multiple types of databases in the environment of the cloud provider. Utilization of a cloud for a range of services has been shown to be very cost-effective [29], [71]. However, there is a risk for not doing an assessment on security when utilizing a cloud.…”
Section: Figure 1: Principle Layers Of a Cloudmentioning
confidence: 99%
“…To protect from DDoS in grid and cluster environments, similar to SBF [70], a mechanism was proposed by Prasad and Kodada et al [71]. In the modification of their mechanism, rather than maintaining an IP address table, both the IP address and Mac address were stored at the beginning of cluster node booting.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation