{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,8]],"date-time":"2025-11-08T22:48:57Z","timestamp":1762642137300},"reference-count":31,"publisher":"IGI Global","issue":"4","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,10,1]]},"abstract":"<p>The major challenge of Internet of Things (IoT) generated data is its hypervisor level vulnerabilities. Malicious VM deployment and termination are so simple due to its multitenant shared nature and distributed elastic cloud features. These features enable the attackers to launch Distributed Denial of Service attacks to degrade cloud server performance. Attack detection techniques are applied to the VMs that are used by malicious tenants to hold the cloud resources by launching DDoS attacks at data center subnets. Traditional dataflow-based attack detection methods rely on the similarities of incoming requests which consist of IP and TCP header information flows. The proposed approach classifies the status patterns of malicious VMs and ideal VMs to identify the attackers. In this article, information theory is used to calculate the entropy value of the malicious virtual machines for detecting attack behaviors. Experimental results prove that the proposed system works well against DDoS attacks in IoT applications.<\/p>","DOI":"10.4018\/ijhcr.2017100104","type":"journal-article","created":{"date-parts":[[2018,9,11]],"date-time":"2018-09-11T15:40:51Z","timestamp":1536680451000},"page":"40-51","source":"Crossref","is-referenced-by-count":2,"title":["Defensive Mechanism Against DDoS Attack to Preserve Resource Availability for IoT Applications"],"prefix":"10.4018","volume":"8","author":[{"given":"Manimaran","family":"Aridoss","sequence":"first","affiliation":[{"name":"Madanapalle Institute of Technology and Science, Angallu, India"}]}],"member":"2432","reference":[{"key":"IJHCR.2017100104-0","unstructured":"Addley, E., & Halliday, J. (2010). Operation Payback cripples MasterCard site in revenge for WikiLeaks ban. The Guardian. Retrieved from http:\/\/www.guardian.co.uk\/media\/2010\/dec\/08\/operation\u2013payback\u2013mastercard\u2013website\u2013wikileaks"},{"issue":"5","key":"IJHCR.2017100104-1","first-page":"341","article-title":"Network denial of service threat security on cloud computing a survey. International Journal of Scientific Research in Science","volume":"1","author":"E. S. A.Ahmed","year":"2015","journal-title":"Engineering and Technology"},{"issue":"17","key":"IJHCR.2017100104-2","article-title":"Magnified cipher block chaining mode using DES to ensure data security in cloud computing.","volume":"9","author":"M.Chandrika","year":"2016","journal-title":"Indian Journal of Science and Technology"},{"key":"IJHCR.2017100104-3","unstructured":"Cloudflare. (n.d.). Under DDoS attack? We can protect you in an emergency. Retrieved from https:\/\/www.cloudflare.com\/under-attack"},{"key":"IJHCR.2017100104-4","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2015.04.007"},{"key":"IJHCR.2017100104-5","doi-asserted-by":"publisher","DOI":"10.17485\/ijst\/2015\/v8i8\/69307"},{"key":"IJHCR.2017100104-6","doi-asserted-by":"publisher","DOI":"10.1109\/ITNG.2015.40"},{"key":"IJHCR.2017100104-7","doi-asserted-by":"publisher","DOI":"10.1145\/1496091.1496103"},{"key":"IJHCR.2017100104-8","unstructured":"Greenspun. (2002, October 23). Powerful Attack Cripples Internet [Scary] [Forum post]."},{"key":"IJHCR.2017100104-9","doi-asserted-by":"publisher","DOI":"10.14257\/ijsia.2015.9.7.02"},{"issue":"16","key":"IJHCR.2017100104-10","doi-asserted-by":"crossref","DOI":"10.17485\/ijst\/2016\/v9i16\/86536","article-title":"Neural based security approach for cloud databases using counter propagation.","volume":"9","author":"S.Jegadeeswari","year":"2016","journal-title":"Indian Journal of Science and Technology"},{"issue":"2","key":"IJHCR.2017100104-11","article-title":"An enhanced entropy approach to detect and prevent DDoS in cloud environment.","volume":"5","author":"N.Jeyanthi","year":"2013","journal-title":"International Journal of Communication Networks and Information Security"},{"key":"IJHCR.2017100104-12","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2013.05.003"},{"issue":"8","key":"IJHCR.2017100104-13","doi-asserted-by":"crossref","first-page":"2481","DOI":"10.1007\/s11276-014-0761-7","article-title":"Security of the Internet of Things: Perspectives and challenges.","volume":"20","author":"Q.Jing","year":"2014","journal-title":"Wireless Networks"},{"key":"IJHCR.2017100104-14","unstructured":"Kessler, G.C. (2000). Defenses against distributed denial of service attacks. Retrieved from http:\/\/www.garykessler.net\/library\/ddos.html"},{"key":"IJHCR.2017100104-15","unstructured":"Kitten, T. (2013, January 14). DDoS: Lessons from Phase 2 Attacks. BankInfo Security. Retrieved from http:\/\/www.bankinfosecurity.com\/ddos-attacks-lessons-from-phase-2-a-54 20\/op-1"},{"key":"IJHCR.2017100104-16","doi-asserted-by":"publisher","DOI":"10.15837\/ijccc.2012.3.1391"},{"issue":"30","key":"IJHCR.2017100104-17","doi-asserted-by":"crossref","DOI":"10.17485\/ijst\/2015\/v8i30\/85923","article-title":"Multi-Criteria Strategy for Job Scheduling and Resource Load Balancing in Cloud Computing Environment.","volume":"8","author":"A. A.Mahmoud","year":"2015","journal-title":"Indian Journal of Science and Technology"},{"key":"IJHCR.2017100104-18","doi-asserted-by":"publisher","DOI":"10.1007\/978-81-322-2656-7_47"},{"key":"IJHCR.2017100104-19","doi-asserted-by":"publisher","DOI":"10.1109\/ISCIT.2009.5341118"},{"key":"IJHCR.2017100104-20","doi-asserted-by":"publisher","DOI":"10.1145\/1452520.1452539"},{"key":"IJHCR.2017100104-21","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2014.10.013"},{"issue":"2","key":"IJHCR.2017100104-22","doi-asserted-by":"crossref","first-page":"208","DOI":"10.1093\/comjnl\/bxv106","article-title":"Virtual machine customization and task mapping architecture for efficient allocation of cloud data center resources.","volume":"59","author":"S. F.Piraghaj","year":"2016","journal-title":"The Computer Journal"},{"key":"IJHCR.2017100104-23","doi-asserted-by":"publisher","DOI":"10.1109\/IAS.2009.298"},{"issue":"18","key":"IJHCR.2017100104-24","article-title":"Performance analysis of Load Balancing Algorithms in cloud computing environment.","volume":"9","author":"V. K.Reddy","year":"2016","journal-title":"Indian Journal of Science and Technology"},{"key":"IJHCR.2017100104-25","article-title":"A traffic cluster entropy based approach to distinguish DDoS Attacks from flash event using DETER testbed.","author":"M.Sachdeva","year":"2014","journal-title":"ISRN Communications and Networking"},{"key":"IJHCR.2017100104-26","doi-asserted-by":"crossref","unstructured":"Samaila, M. G., Neto, M., Fernandes, D. A. B., Freire, M. M. (2017). Security Challenges of the Internet of Things Beyond the Internet of Things.","DOI":"10.1007\/978-3-319-50758-3_3"},{"key":"IJHCR.2017100104-27","unstructured":"Sudworth, J. (2009, July 9). New \u201ccyber attacks\u201d hit S Korea. BBCNews."},{"key":"IJHCR.2017100104-28","doi-asserted-by":"publisher","DOI":"10.1109\/ISCIT.2010.5665097"},{"issue":"6","key":"IJHCR.2017100104-29","first-page":"14","article-title":"MyDoom lesson, take proactive steps to prevent DDoS attacks.","volume":"38","author":"J.Vijayan","year":"2004","journal-title":"Computerworld"},{"key":"IJHCR.2017100104-30","year":"2000)."}],"container-title":["International Journal of Handheld Computing Research"],"original-title":[],"language":"ng","link":[{"URL":"https:\/\/www.igi-global.com\/viewtitle.aspx?TitleId=214022","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,7]],"date-time":"2022-05-07T01:55:36Z","timestamp":1651888536000},"score":1,"resource":{"primary":{"URL":"https:\/\/services.igi-global.com\/resolvedoi\/resolve.aspx?doi=10.4018\/IJHCR.2017100104"}},"subtitle":[""],"short-title":[],"issued":{"date-parts":[[2017,10,1]]},"references-count":31,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2017,10]]}},"URL":"https:\/\/doi.org\/10.4018\/ijhcr.2017100104","relation":{},"ISSN":["1947-9158","1947-9166"],"issn-type":[{"value":"1947-9158","type":"print"},{"value":"1947-9166","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017,10,1]]}}}