A Detection and Prevention of Ddos Attacks

Authors

  • Gupta A Dept. of Computer Science, Shri Ram Institute of Technology, Rajiv Gandhi Proudyogiki Vishwavidyalaya, Jabalpur, India
  • Patel B Dept. of Computer Science, Shri Ram Institute of Technology, Rajiv Gandhi Proudyogiki Vishwavidyalaya, Jabalpur, India

Keywords:

Component, Formatting, Style, Styling, Insert (key words)

Abstract

Nowadays, cloud computing is very important because of its benefits. But it is also prone to attacks due to vulnerabilities of the websites. DDoS is distributed denial of service where Trojan infected computers are used to target a system to cause traffic jams and genuine users can not able get the service of websites. DDOS affects internet services like e- commerce, e-banking, education, medicine, reservations, agriculture etc. In this way both the end systems are controlled by hackers. There are three categories – volume-based attacks, protocol attacks and application attacks. The companies they are implementing no. of solutions to defend the attacks and continuously updating their techniques but attackers also updating their techniques and methods of attacks. So, in this paper the system is made to collect data online and with the help of association rule mining ddos attack are detected and prevented. Here techniques are used to properly detect attackers and genuine users so that cloud services can be given the users.

References

[1] Mohd. Azahari Mohd Yusof, Fakariah Hani ali, and Mohd. Yusof Darus. Detection and Defense Algorithms of Different types of DDoS Attack. International Journal of Engineering and Technology, October 2017.

[2] Sunny Behal. Characterization and comparison of DDoS attack tools and traffic generators. International Journal of network security, April 2017.

[3] Zhu Limiao, Haung Hua and Zheng Hao. Research on Intrusion Detection System Model based on data mining. Fourth International Conference on Multimedia Information Networking and security, 2012.

[4]Desheng Fu, Shu Zhou, Phing Guo. The design and implementation of a distributed network intrusion detection system based on data mining. World Congress on software engineering.

[5] Surbhi K. Solanki, Jalpa T. Patel. A survey on association rule mining. Fifth International Conference on Advanced computing & communication technologies.

[6]Nivedha and M. Naveen Nanda, Two layer cloud security set architecture on hypervisor. Second International Conference on Advances in Electronics, Computer and Cmmunications , 2018.

[7]Kemal Hajdarevic, Survey on machine learning algorithms as cloud services for CIDPS, 25th telecommunications forum TELFOR, Serbia, 2017.

[8]V. Priyadharshini and Dr. K.Kuppusamy, Prevention of DDOS attacks using New Cracking Algorithm, International Journal of Enginnering Research and Application, may-june 2012.

[9]Jigang ZHENG and Jingmei ZHANG, Association rule mining in DoS attack detection and defense in the application of network, 5th International Conference on Education, Management, Information and Medicine, 2015.

[10] Yaping Chi, Tingting Jiang, Xiao Li and Cong Gao, Design and implementation of cloud platform intrusion prevention system based on SDN, Department of communication engineering Beijing electronic science and technology institute, 2017.

[11] Dina Moloja and Noluntu Mpekoa, Securing M-voting using cloud Intrusion Detection and Prevention system: A New Dawn, IST, International Information Management Corporation Africa, 2017.

Downloads

Published

2025-11-25

How to Cite

[1]
A. Gupta and B. Patel, “A Detection and Prevention of Ddos Attacks”, Int. J. Comp. Sci. Eng., vol. 7, no. 10, pp. 131–134, Nov. 2025.