Securing Cloud Framework from Application DDoS Attacks
N. P. Ponnuviji1, M. Vigilson Prem2

1N. P. Ponnuviji, Department of CSE, RMD Engineering College, Kavaraipettai (Tamil Nadu), India.

2M. Vigilson Prem, Department of CSE, RMK College of Engineering and Technology, Puduvoyal (Tamil Nadu), India.

Manuscript received on 22 November 2019 | Revised Manuscript received on 03 December 2019 | Manuscript Published on 14 December 2019 | PP: 5-8 | Volume-9 Issue-1S November 2019 | Retrieval Number: A10021191S19/2019©BEIESP | DOI: 10.35940/ijitee.A1002.1191S19

Open Access | Editorial and Publishing Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open-access article under the CC-BY-NC-ND license (

Abstract: With the extensive growth of in the size of data transmitted and received in the cloud, there arises the risk of sensitive data prone to different kinds of attacks. The attacks may be in the form of intrusions trying to hack the data or in the form of some fatal attacks. To focus more, after the extensive use of applications and social media apps, there is a rise in Application DDoS (Distributed Denial-of-Service) attacks. These attacks are called as L7 (Layer 7) of the OSI Reference model, as they target the topmost layer – the Application Layer. Various simulations in the Cloud have concluded that the cumulative energy consumption and huge amount of migrations on the VMs are severely affected by the Application DDoS attacks or the EDoS (Economic Denial of Sustainability) attacks. This paper discusses the various forms of Application DDoS attacks, the mitigation mechanisms for the Application DDoS attacks and compares the results in the simulated cloud environment.

Keywords: Distributed Denial of Service (DDoS) attack, Economic Denial of Sustainability (EDoS) attack, Layer 7 (L7), Open Systems Interconnect (OSI).
Scope of the Article: Patterns and Frameworks