An Approach for Load Balancing Among Multi-Agents to Protect Cloud Against DDos Attack

International Journal of Computer Trends and Technology (IJCTT)          
© 2014 by IJCTT Journal
Volume-9 Number-5                          
Year of Publication : 2014
Authors : Rohit Srivastava , Avinash Verma , Shadab Hussain
DOI :  10.14445/22312803/IJCTT-V9P142


Rohit Srivastava , Avinash Verma , Shadab Hussain."An Approach for Load Balancing Among Multi-Agents to Protect Cloud Against DDos Attack". International Journal of Computer Trends and Technology (IJCTT) V9(5):217-220, March 2014. ISSN:2231-2803. Published by Seventh Sense Research Group.

Abstract -
Cloud Computing is widely used technology in present era. Cloud Computing is mainly used for on demand services over the distributed servers. So it is necessary to manage the working load of participating servers for uninterrupted services. DDOS attack is one of the most important issue in cloud environment which basically focuses on prevention in service providence to the authorize users. A Multi agent based framework cam be used to protect the cloud environment from DDOS attack, but there is a major issue of load distribution among agents participating in Intrusion detection. Here in this paper, another agent is used for load distribution among the agents (Intrusion detection agents) in cloud computing. Using this approach our system may be much stronger and then agent may work in a communicating and co-coordinating manner. For this, we will use a load balancing algorithm and by using this algorithm, an efficient approach to manage load among IDAs in cloud computing can be done. In Order to accomplish it the author is using the approach of centralize load distribution.

[1] Rohit Srivastava1, Rohit Sharma2, Avinash Verma3 “MAS BASED FRAMEWORK TO PROTECT CLOUD COMPUTING AGAINST DDOS ATTACK” IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 , Volume: 02 Issue: 12 | Dec-2013, Available @
[2] Doddini Probhuling L. “LOAD BALANCING ALGORITHMS IN CLOUD COMPUTING”, International Journal of Advanced Computer and Mathematical Sciences, ISSN 2230-9624. Vol4, Issue3, 2013, pp229-233.
[3] Amandeep Kaur Sidhu1, Supriya Kinger2 , “Analysis of Load Balancing Techniques in Cloud Computing” International Journal of Computers & Technology , Volume 4 No. 2, March-April, 2013, ISSN 2277-3061.
[4] Upma Goyal, Gayatri Bhatti and Sandeep Mehmi ,A Dual mechanism for defeating DDoS in cloud computing Model, International Journal of Application or Innovation in Engineering & Management (IJAIEM), ISSN 2319 – 4847, Volume 2, Issue 3, March 2013.
[5] A.M. Lonea, D.E. Popescu, H. Tianfield, Detecting DDoS Attacks in Cloud Computing Environment, INT J COMPUT COMMUN, ISSN 1841-9836, 8(1):70-78, February, 2013.
[6] Muhammad Zakarya, DDoS Verification and Attack Packet Dropping Algorithm in Cloud Computing, World Applied Sciences Journal 23 (11): 1418-1424, 2013,ISSN 1818-4952,© IDOSI Publications,2013,DOI:10.5829/idosi.wasj.2013.23.11.950.
[7] Vikas Chouhan & Sateesh Kumar Peddoju, Packet Monitoring Approach to Prevent DDoS Attack in Cloud Computing, International Journal of Computer Science and Electrical Engineering (IJCSEE) ISSN No. 2315-4209, Vol-1 Iss-1, 2012
[8] J.J.Shah Dr. L.G.Malik, Impact of DDOS Attacks on Cloud Environment, International Journal of Research in Computer and Communication Technology, Vol 2, Issue 7, July-2013,ISSN(Online) 2278-5841,ISSN (Print) 2320-5156.
[9] Priyanka Negi, Anupama Mishra and B. B. Gupta Enhanced CBF Packet Filtering Method to Detect DDoS Attack in Cloud Computing Environment.
[10] Nisha H. Bhandari, Survey on DDoS Attacks and its Detection & Defence Approaches, International Journal of Science and Modern Engineering (IJISME) ISSN: 2319-6386, Volume-1, Issue-3, February 2013.
[10] Amit Khajuria, Roshan Srivastava, Analysis of the DDoS Defence Stratigies in Cloud Computing, INTERNATIONAL JOURNAL OF ENHANCED RESEARCH IN MANAGEMENT & COMPUTER APPLICATIONS,VOL. 2, ISSUE 2, FEB.-2013 ISSN NO: 2319-7471.

Cloud Computing, Centralize Load Distribution, DDoS attack, IDA, Load Distribution Agent