Main Reference PaperImplementation of DDoS Attack Preemption and Improved Data Integrity in Cloud, International Journal of Computer Applications, May 2016. [Java/Cloudsim].
  • DDoS attack detection is done by monitoring log entries corresponding to the request generated by the user. Based on the attack detection attackers are blocked. M-AES algorithm based data integrity is ensured.

+ Description
  • DDoS attack detection is done by monitoring log entries corresponding to the request generated by the user. Based on the attack detection attackers are blocked. M-AES algorithm based data integrity is ensured.

  • To investigate the attacker behavior and to eliminating attacker in cloud.

  • To ensure data integrity.

+ Aim & Objectives
  • To investigate the attacker behavior and to eliminating attacker in cloud.

  • To ensure data integrity.

  • A technique is contributed that prevents the attack in cloud.

+ Contribution
  • A technique is contributed that prevents the attack in cloud.

  • Java JDK 1.8, MySQL 5.5.40.

  • Netbeans 8.0.1, J2SE and Cloudsim 3.0.3.

+ Software Tools & Technologies
  • Java JDK 1.8, MySQL 5.5.40.

  • Netbeans 8.0.1, J2SE and Cloudsim 3.0.3.

  • B.E / B.Tech / M.E / M.Tech

+ Project Recommended For
  • B.E / B.Tech / M.E / M.Tech

Professional Ethics: We S-Logix would appreciate the students those who willingly contribute with atleast a line of thinking of their own while preparing the project with us. It is advised that the project given by us be considered only as a model project and be applied with confidence to contribute your own ideas through our expert guidance and enrich your knowledge.