Papers by Nagaraju Kilari
2016 3rd International Conference on Computing for Sustainable Global Development (INDIACom), 2016
Amongst different threats relating to cloud environment, the Distributed Denial of Service (DDoS)... more Amongst different threats relating to cloud environment, the Distributed Denial of Service (DDoS) attacks play a significant role as the attack may affect many distributed systems. In order to mitigate with these types of attacks, the authors have already proposed a novel N-S architecture and its associated algorithms in the form of a suite. This paper deals with the performance analysis of the said suite under different categories such as during non-attacks, attacks and also post-attack periods. The performance has also been compared with a conventional single-server model and results indicate good improvements in terms of response time.
Virtualization, which is reflected as the backbone of cloud computing, provides cost-effective re... more Virtualization, which is reflected as the backbone of cloud computing, provides cost-effective resource sharing. Owed to the existence of multiple virtual machines, it passages several challenges. Among the numerous virtualization attacks, the Distributed Denial of Service, widely known as the DDoS attack, is considered to be the momentous. These spells consumes large amount of server resources here after denies access to genuine users. DDoS attacks impact is more in cloud computing as sharing of resources is the innate character of a cloud. At hand are a few kinds of literature dealing with the mitigation of DDoS attacks using single server tactic nonetheless they suffer from poor response time. The proposed model in this paper uses multiple servers to deal with the alleviation of DDoS. An initial test result on the proposed model has provided us with better scalability and protection against further attacks.
Journal of Medicinal Chemistry, 1982
A group of nitro and amino derivatives of lucanthone was prepared and tested for antitumor activi... more A group of nitro and amino derivatives of lucanthone was prepared and tested for antitumor activity. Reaction of 1-chloro-4-methyl-7-nitrothioxanthenone and N,N-diethylethylenediamine gave the 7-amino analogue (11) directly, accompanied by 7-amino-1-chloro-4-methylthioxanthenone. The antitumor activity of 11 was inferior to that of lucanthone and 7-hydroxylucanthone. The most active compound in the series was the nitro compound 1. In the P-388 lymphocytic leukemia screen it showed a T/C = 178 at 200 mg/kg.
Cloud computing is one of the emerging technologies in which a huge amount of storage, data and s... more Cloud computing is one of the emerging technologies in which a huge amount of storage, data and services are available over the internet. The main advantage of cloud computing environment is the users have to pay only for what they use. Cloud services are distributed in nature so they can be sharable by millions of users. Because of this, the cloud environment has numerous security challenges. Distributed Denial of Service (DDoS) is most prominent security attack in cloud computing. DDOS is the largest threat which can impact on the availability of cloud services since it has multi-tenant architecture. This paper highlights various DDoS attacks and its countermeasures.
International Journal of Engineering and Computer Science, 2017
Aeris is a global technology partner with a proven history of helping companies unlock the value ... more Aeris is a global technology partner with a proven history of helping companies unlock the value of IoT. For more than a decade, we’ve powered critical projects for some of the most demanding customers of IoT services. Aeris strives to fundamentally improve businesses by dramatically reducing costs, accelerating time-to-market, and enabling new revenue streams. Built from the ground up for IoT and road tested at scale, Aeris IoT Services are based on the broadest technology stack in the industry, spanning connectivity up to vertical solutions. As veterans of the industry, we know that implementing an IoT solution can be complex, and we pride ourselves on making it simpler. ABOUT THE AUTHOR Syed Zaeem Hosain | Chief Technical Officer
Cloud Computing provides an efficient and flexible way for services to meet escalating business n... more Cloud Computing provides an efficient and flexible way for services to meet escalating business needs. Cloud-shared infrastructure and associated services make it cost effective alternative to traditional approaches. However, they may also introduce security breaches and privacy issues. As more cloud based applications keep evolving, the associated security threats are also growing. Many research works on cloud security exist in partial forms of either specifically on cloud issues or virtualization-related security issues. In this paper, an attempt has been made to consolidate the various security threats in a classified manner and to illustrate how cloud and virtualization vulnerabilities affect the different cloud service models.
Uploads
Papers by Nagaraju Kilari