An Efficient Adaptive Load Balancing Scheme for Mitigating Reduction of Quality-Based DDOS Attack on Cloud File Storage Environment
V Loganathan1, S Godfrey Winster2
1V Loganathan, Research Scholar, Saveetha School of Engineering, SIMTS, Chennai, India.
2S Godfrey Winster, Professor, Saveetha Engineering College, Chennai, India.

Manuscript received on November 12, 2019. | Revised Manuscript received on November 23, 2019. | Manuscript published on 30 November, 2019. | PP: 8450-8456 | Volume-8 Issue-4, November 2019. | Retrieval Number: D9717118419/2019©BEIESP | DOI: 10.35940/ijrte.D9717.118419

Open Access | Ethics and Policies | Cite  | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: IAvailability of cloud resources to the cloud users is considered as the serious challenge that pose security essentialities during the process of on-demand service provision. Moreover, a specific type of attack named Reduction of Quality (RoQ)-based DDoS attack is determined to be vulnerable in the cloud computing since it exploits the benefits of the embedded adaptive load balancing and admission control methods of the environment. In this paper, an Efficient Adaptive Load Balancing Scheme-based on Wilcoxon–Mann–Whitney Hypothesis Test (EALBS-WMW-HT) is proposed for mitigating Reduction of Quality-based DDoS attack in order to minimize its influence for enhancing the degree of availability to the cloud users. This proposed EALBS-HT scheme uses the merits of statistical testing on the traffic flow and contributes to the detection of RoQ-based DDoS attack such that they does not disturb the inherent load balancing process of the cloud environment. The experiments of the proposed EALBS-HT scheme revealed an excellent detection accuracy, true positive rate and true negative rate with minimized false negative rate studied on par with the baseline approaches considered for analysis.
Keywords: Cloud, Security, Attack, Router, Traffic, Ddos, Svm, U Test, Roq.
Scope of the Article: Cloud Resources Utilization in IoT.