DDoS Attacks Simulation in Cloud Computing Environment
Shakti Arora1, Surjeet Dalal2

1Shakti Arora*, Research Scholar, SRM University, Sonepat, (Haryana) India.
2Dr. Surjeet Dalal, Professor, Teerthanker Mahaveer University, Moradabad (U.P), India.

Manuscript received on October 12, 2019. | Revised Manuscript received on 22 October, 2019. | Manuscript published on November 10, 2019. | PP: 414-417 | Volume-9 Issue-1, November 2019. | Retrieval Number: A3912119119/2019©BEIESP | DOI: 10.35940/ijitee.A3912.119119
Open Access | Ethics and Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: Cloud Computing Is Increasing Its Reach To The Edge Of The Computing Devices. Day By Day Dependency Of The Users Is Increasing On Cloud. Infrastructure As A Service Model Is The Widely Adopted And Used Model Of Cloud Computing Where Storage Is The Primary Concern To Be Shared And Used. Security Of The Shared Storage Is The Major Challenge, A Number Of Techniques And Security Algorithms Are Designed To Provide The Security And Accuracy Of The Data. We Designed A One Strong Integrity Security Algorithm That Provides The Integrity Verification Of The Stored Data Without The Intervening The Role Of Tpa. The Data Stored On The Server Can Be Compromised With Number Of Security Attacks; We Studied The Major Security Attacks That Are Affecting The Data. In This Paper We Will Demonstrate The Attack Simulation Of Ddos Attack And Calculated The Effects Of Attacks On Running System And Performance Of The System Under Critical Timings Of Attack. The Result Of The Attack Simulation Shows That The Designed System Is Stable And Working Efficiently After The Attack. The Trust Level Achieved Is Approximately Similar To The Original Trust Achieved Without Injecting The Attack.
Keywords: Attack, Virtualization, Poly1305, Integrity, hybrid
Scope of the Article: Cloud Computing