The PDF file you selected should load here if your Web browser has a PDF reader plug-in installed (for example, a recent version of Adobe Acrobat Reader).

If you would like more information about how to print, save, and work with PDFs, Highwire Press provides a helpful Frequently Asked Questions about PDFs.

Alternatively, you can download the PDF file directly to your computer, from where it can be opened using a PDF reader. To download the PDF, click the Download link above.

Fullscreen Fullscreen Off


Flooding attacks play a vital role in network. Most of the people are working on the cloud computing environment either as a provider or as a consumer. The flooding attack is a challenge to the resources of network and bandwidth of the host for web page. Nowadays, web based applications are developed in the cloud computing environment. The FAPA (Flooding Attack Prevention Architecture) is used to prevent flooding attacks in cloud based computing environment. The LEACH protocol helps to improve the system lifetime by reducing the energy used to transmit the data to the base station. The aim of this work is to prevent the flooding attacks in cloud and transfer the data in a fast and secured manner using MLEACH (Modified Low Energy Adaptive Clustering Hierarchy).

Keywords

Cloud Security, DDoS, MLEACH.
User
Notifications
Font Size