Filters








609 Hits in 5.3 sec

A statistical and distributed packet filter against DDoS attacks in Cloud environment

VIKASH C PANDEY, SATEESH K PEDDOJU, PRACHI S DESHPANDE
<span title="">2018</span> <i title="Springer Nature"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/cuymmrn4wzf6xkpjp5avqt7ol4" style="color: black;">Sadhana (Bangalore)</a> </i> &nbsp;
Simulation study indicates the effectiveness of this scheme in detecting DDoS attacks in Cloud.  ...  Due to multi-tenancy and self-provisioning properties of Cloud, traditional DDoS detection techniques cannot be directly applied. Hence, there is a need for Cloud-specific DDoS detection framework.  ...  Conclusion This paper proposed a statistical and distributed packet filtering algorithm and framework for detection of DDoS attacks in Cloud.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/s12046-018-0800-7">doi:10.1007/s12046-018-0800-7</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/y2lh57lgpnbrzae7sqrkzvkkam">fatcat:y2lh57lgpnbrzae7sqrkzvkkam</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20200508034357/https://www.ias.ac.in/article/fulltext/sadh/043/03/0032" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/f1/4f/f14f95f285a70e0ed0418b6def3f805b6d975416.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/s12046-018-0800-7"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> springer.com </button> </a>

Combating DDoS Attacks in the Cloud: Requirements, Trends, and Future Directions

Gaurav Somani, Manoj Singh Gaur, Dheeraj Sanghi, Mauro Conti, Muttukrishnan Rajarajan, Rajkumar Buyya
<span title="">2017</span> <i title="Institute of Electrical and Electronics Engineers (IEEE)"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/u45ystxq2zf7ngyetgwrqlxnba" style="color: black;">IEEE Cloud Computing</a> </i> &nbsp;
from the community. cloud computing, DDoS attacks, security and protection (e.g., firewalls) DISTRIBUTED DENIAL OF SERVICE (DDoS) ATTACKS HAVE BEEN A NIGHTMARE FOR ENTERPRISE OPERATIONS, AVAILABILITY,  ...  Over 33% of total reported DDoS attacks in 2015 targeted cloud services, which make the cloud one of the major attack targets.  ...  Now, we can provide an extreme example of DDoS attack for which detection is impossible by the methods available today, i.e., a detection near impossible (DeNy) DDoS attack.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/mcc.2017.14">doi:10.1109/mcc.2017.14</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/psbnygrqsbexjjf5q653w4axdu">fatcat:psbnygrqsbexjjf5q653w4axdu</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20180719084312/http://openaccess.city.ac.uk/17318/1/ecdcg-04-01-03.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/44/ad/44ad83f10ccc5104e981d8e445c3d6d8cdfe19ff.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/mcc.2017.14"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> ieee.com </button> </a>

An Effective Layered Load Balance Defensive Mechanism against DDoS Attacks in Cloud Computing Environment

N. Ch. S. N. Iyengar, Gopinath Ganapathy
<span title="2015-07-31">2015</span> <i title="Science and Engineering Research Support Society"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/4h7flaxsjnh6he3qbiwvxbekxe" style="color: black;">International Journal of Security and Its Applications</a> </i> &nbsp;
In this paper we proposed an effective layered load balancing mechanism which scrutinizes the incoming requestors' traffic at various layers and each layer outwits some kind of attack traffic.  ...  Distributed Denial of Service (DDoS) is a kind of overload threat aims to subvert DC and their resources which leads to resource unavailable to legitimate requestors.  ...  Distributed Denial of Service (DDoS) is a kind of resource-availability related attack for subverting the Data Center (DC) for resource unavailability to the legitimate clients.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.14257/ijsia.2015.9.7.02">doi:10.14257/ijsia.2015.9.7.02</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/ryw5ecwrlnf5jjermr7i3ap3qq">fatcat:ryw5ecwrlnf5jjermr7i3ap3qq</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20180603175019/http://www.sersc.org/journals/IJSIA/vol9_no7_2015/2.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/e7/6d/e76dd94d567af196bad96ee380f7a67a39441145.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.14257/ijsia.2015.9.7.02"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> Publisher / doi.org </button> </a>

Escape-on-Sight: An Efficient and Scalable Mechanism for Escaping DDoS Attacks in Cloud Computing Environment

N. Jeyanthi, N. Ch. S. N. Iyengar
<span title="2013-03-01">2013</span> <i title="Walter de Gruyter GmbH"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/yqncwzlovvhvhktpm65k4wwuoe" style="color: black;">Cybernetics and Information Technologies</a> </i> &nbsp;
, etc., there is a need to develop a detection mechanism that must satisfy the characteristics and an optimal profit for the Cloud Service Provider (CSP).  ...  The profit analysis shows that the proposed approach has a reasonable chance of deploying EoS mechanism at DCs that are prone to DDoS attacks.  ...  Migration based response [3] is a method based on distributed auctioneers and bidders for defending the DoS attacks.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.2478/cait-2013-0005">doi:10.2478/cait-2013-0005</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/ijlp2f3k4neynbge7nrnncsgpy">fatcat:ijlp2f3k4neynbge7nrnncsgpy</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20180722195607/https://content.sciendo.com/downloadpdf/journals/cait/13/1/article-p46.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/27/b0/27b0fcc92630e6f689512f4ef876a8d3a707d88d.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.2478/cait-2013-0005"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="unlock alternate icon" style="background-color: #fb971f;"></i> Publisher / doi.org </button> </a>

A Review on Distributed Denial of Service (DDoS) Mitigation Techniques in Cloud Computing Environment

Junath Naseer Ahamed, N. Ch. S. N. Iyengar
<span title="2016-08-31">2016</span> <i title="Science and Engineering Research Support Society"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/4h7flaxsjnh6he3qbiwvxbekxe" style="color: black;">International Journal of Security and Its Applications</a> </i> &nbsp;
Distributed Denial of Service (DDoS) attack becomes a serious hazard for cloud computing environments as they target the victim and completely suppress the Datacenter to serve for its legitimate clients.This  ...  Copyright ⓒ 2016 SERSC 279 Types of DDoS Attack: DDoS attack types are generally divided into three general categories: They are Volume based attack, Protocol based attack, Application layer based attack  ...  Unveiling the Presentation of DDoS: A DDoS (Distributed Denial of Service) is a kind of attack launched by the globally distributed attackersto deplete the available resources which results in server unresponsiveness  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.14257/ijsia.2016.10.8.24">doi:10.14257/ijsia.2016.10.8.24</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/iyxpwp7phra2nhb2unevnf2xye">fatcat:iyxpwp7phra2nhb2unevnf2xye</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20180602202432/http://www.sersc.org/journals/IJSIA/vol10_no8_2016/24.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/08/e8/08e86235f5469866972561cc4c2ae0e53ad52948.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.14257/ijsia.2016.10.8.24"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> Publisher / doi.org </button> </a>

Kubernetes Autoscaling: YoYo Attack Vulnerability and Mitigation [article]

Ronen Ben David, Anat Bremler Barr
<span title="2021-05-02">2021</span> <i > arXiv </i> &nbsp; <span class="release-stage" >pre-print</span>
Recent work presents a new kind of Burst attack, the YoYo attack (Bremler-Barr et al., 2017) that operates against the auto-scaling mechanism of VMs in the cloud.  ...  As containerized cloud applications using Kubernetes gain popularity and replace VM-based architecture in recent years.  ...  Acknowledgments This research was supported by Google Cloud Research. We would like to thank also Daniel Bachar and Assaf Sinvani for helpful discussions and thier help with the experiments setup.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener" href="https://arxiv.org/abs/2105.00542v1">arXiv:2105.00542v1</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/tmn4bezdqnbbjn7hwxt3xia6na">fatcat:tmn4bezdqnbbjn7hwxt3xia6na</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20210728104019/https://arxiv.org/pdf/2105.00542v1.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/5c/90/5c904e62e43daab404c9a4784f085a579158b010.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener" href="https://arxiv.org/abs/2105.00542v1" title="arxiv.org access"> <button class="ui compact blue labeled icon button serp-button"> <i class="file alternate outline icon"></i> arxiv.org </button> </a>

Optimized load balance scheduling algorithm

Rawaa Mohammed Abdul-Hussein, Ahmed Hashim Mohammed
<span title="2022-02-01">2022</span> <i title="Universitas Ahmad Dahlan"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/avuzjspx3nh5lboz3nsmpd3ba4" style="color: black;">TELKOMNIKA (Telecommunication Computing Electronics and Control)</a> </i> &nbsp;
Additonaly, the proposed algorithm could be used to mitigate distributed denial of service (DDoS) attack that aims to cause endless load on the servers and stop the service.  ...  Experimental results for five virtual machine (VM), ten VM, with the varying number of tasks showed that the proposed algorithm has better resource utilization and less makespan time in almost all the  ...  ACKNOWLEDGEMENTS The authors are wishing to acknowledge Al-Mustansiriyah University (http://www.uomustansiriyah.edu.iq) Baghdad, Iraq.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.12928/telkomnika.v20i1.22464">doi:10.12928/telkomnika.v20i1.22464</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/ppdg6bowvfbtjhlfx26u2a65xa">fatcat:ppdg6bowvfbtjhlfx26u2a65xa</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20220520180552/http://telkomnika.uad.ac.id/index.php/TELKOMNIKA/article/download/22464/11358" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/7e/19/7e19db8d8e7d8a53bd8719eb4455b9de95f0f793.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.12928/telkomnika.v20i1.22464"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="unlock alternate icon" style="background-color: #fb971f;"></i> Publisher / doi.org </button> </a>

A Novel Security Analysis for Virtualized Infrastructure using Fuzzy Classification Approach in Cloud Computing

Siddthan R., Dr.Nagarajan A.
<span title="2018-08-31">2018</span> <i title="ENGG Journals Publications"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/rm2oud7tpnfwtpubgeudnvvonm" style="color: black;">International Journal of Engineering and Technology</a> </i> &nbsp;
the guest VMs and performing attacks to Distributed Denial of Service (DDoS).  ...  Hence a novel security analysis of big data using classification approach is proposed in this work for detecting and classifying the advanced attacks in virtualized infrastructures.  ...  Generally the real source IP based DDoS attacks uses the negotiated nodes called as bots or zombies for the purpose of launching an attack.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.21817/ijet/2018/v10i4/181004043">doi:10.21817/ijet/2018/v10i4/181004043</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/gy2uljdnofct5fbkmewxknu7b4">fatcat:gy2uljdnofct5fbkmewxknu7b4</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20190427120719/http://www.enggjournals.com/ijet/docs/IJET18-10-04-043.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/04/7b/047b98f939f64033885bb2e984d4f6b336008172.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.21817/ijet/2018/v10i4/181004043"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> Publisher / doi.org </button> </a>

A Mitigation Technique for DoS Attack in Wireless Network Based Gradient Matrix and Firefly

Jeewanjot Kaur, Taranjit Singh Aulakh
<span title="2018-01-30">2018</span> <i title="Advance Academic Publisher"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/morgzaixj5hsjghb6it2id5lgy" style="color: black;">International Journal of Advanced Research in Computer Science and Software Engineering</a> </i> &nbsp;
In a distributed denial-of-service attack (DDoS attack), the incoming traffic flooding the victim originates from many different sources.  ...  In this research a generalized model for detection has been created by studying the existing models and algorithms on DoS attacks.  ...  DDOS ATTACK Distributed denial of service attack aims at hindering the availability of resources in the network.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.23956/ijarcsse.v8i1.546">doi:10.23956/ijarcsse.v8i1.546</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/gsiqxtqj4fhy7hacop7uyzfd7m">fatcat:gsiqxtqj4fhy7hacop7uyzfd7m</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20190429072211/http://ijarcsse.com/index.php/ijarcsse/article/download/546/290" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/7b/a0/7ba01500eb276a2c0b74140d75a19656dcdda5d0.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.23956/ijarcsse.v8i1.546"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="unlock alternate icon" style="background-color: #fb971f;"></i> Publisher / doi.org </button> </a>

Exploring New Opportunities to Defeat Low-rate DDoS Attack in Container-based Cloud Environment

Zhi Li, Hai Jin, Deqing Zou, Bin Yuan
<span title="">2019</span> <i title="Institute of Electrical and Electronics Engineers (IEEE)"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/ll6bfs5o6bahfinh3u5z2cnyoy" style="color: black;">IEEE Transactions on Parallel and Distributed Systems</a> </i> &nbsp;
DDoS attack effectively in the container-based cloud environment.  ...  In this paper, we establish a mathematical model based on queueing theory to analyze the strengths and weaknesses of the container-based cloud environment in defeating low-rate DDoS attack.  ...  [34] used deep learning to extract features of DDoS attacks in container-based cloud system and detect DDoS attacks based on it.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/tpds.2019.2942591">doi:10.1109/tpds.2019.2942591</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/f22afdgrazhqdi34zcyjaph37q">fatcat:f22afdgrazhqdi34zcyjaph37q</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20201108171611/https://ieeexplore.ieee.org/ielx7/71/8959349/08845616.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/5d/fc/5dfc4a6e19a6c6385c3006933fa51557c6c268f4.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/tpds.2019.2942591"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> ieee.com </button> </a>

Agent Based Detection Mechanism to Outwit Distributed Denial of Service Attacks in Cloud Computing Environment

Junath Naseer, N. Ch. S. N. Iyengar, Mogan Kumar P.C
<span title="2016-10-31">2016</span> <i title="Science and Engineering Research Support Society"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/kx4szfp7xvfn7laozkx3mc4iqe" style="color: black;">International Journal of Software Engineering and Its Applications</a> </i> &nbsp;
Distributed Denial of Service (DDoS) poses the highest rate of vulnerability to cloud computing in terms of availability with ability to destruct the Data-Center (DC) resources.  ...  The agents deployed in the network observe and detects the abrupt changes in the spatiotemporal distribution of traffic volumes.  ...  MOGAN KUMAR PC for helping in experimental setup during the summer and also in giving me his valuable inputs, otherwise it would not have been possible for me to complete this work.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.14257/ijseia.2016.10.10.15">doi:10.14257/ijseia.2016.10.10.15</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/cj22xmu7ubagvfv7emw3en7htm">fatcat:cj22xmu7ubagvfv7emw3en7htm</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20180603061615/http://www.sersc.org/journals/IJSEIA/vol10_no10_2016/15.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/b9/a4/b9a4856cd2b3238be9e76a2f646f8a6d755fa196.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.14257/ijseia.2016.10.10.15"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> Publisher / doi.org </button> </a>

DDoS attacks in cloud computing: Issues, taxonomy, and future directions

Gaurav Somani, Manoj Singh Gaur, Dheeraj Sanghi, Mauro Conti, Rajkumar Buyya
<span title="">2017</span> <i title="Elsevier BV"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/mnyvgmlsc5a5xi7554ow77exfu" style="color: black;">Computer Communications</a> </i> &nbsp;
Distributed Denial of Service (DDoS) attack is one such serious attack in the cloud space. In this paper, we present developments related to DDoS attack mitigation solutions in the cloud.  ...  In particular, we present a comprehensive survey with a detailed insight into the characterization, prevention, detection, and mitigation mechanisms of these attacks.  ...  This work is also supported by SAFAL (Security Analysis Framework for Android Platform) project funded by Department of Electronics and Infor-  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1016/j.comcom.2017.03.010">doi:10.1016/j.comcom.2017.03.010</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/au2n7pomrjf37pa25lrwttwepa">fatcat:au2n7pomrjf37pa25lrwttwepa</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20170608104407/http://buyya.com/papers/DDoSCloudCC2017.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/0e/2b/0e2b1c29ee8e580c5e8c12b0a6800d3c5dbb0703.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1016/j.comcom.2017.03.010"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> elsevier.com </button> </a>

A Survey of Denial-of-Service and Distributed Denial of Service Attacks and Defenses in Cloud Computing

Adrien Bonguet, Martine Bellaiche
<span title="2017-08-05">2017</span> <i title="MDPI AG"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/hijy7jexkvcipg3tulqv73bck4" style="color: black;">Future Internet</a> </i> &nbsp;
In this paper, new types of DoS and DDoS attacks in Cloud Computing are explored, especially the XML-DoS and HTTP-DoS attacks, and some possible detection and mitigation techniques are examined.  ...  Denial-of-Service (DoS) and Distributed Denial-of-Service (DDoS) attacks are serious threats to the Cloud services' availability due to numerous new vulnerabilities introduced by the nature of the Cloud  ...  Consequently, the VM becomes unavailable, causing a Denial of Service (DoS) or Distributed Denial of Service (DDoS).  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.3390/fi9030043">doi:10.3390/fi9030043</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/zhhl36zts5g7rkstbitjj2kde4">fatcat:zhhl36zts5g7rkstbitjj2kde4</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20180725045622/https://res.mdpi.com/def50200bd1265ea30916a835199d131c9b1f57cf3cac0d9b6a24009e5081eb10825ec73f2c013d2b6472340b0051cc463cfa5ba5b9463e9fd07e8ab63e5746b94af8f675138e8c4d52f710844fd6f38d5812b34c088b084af4598e0d10f33429531b003c5753e91a699bd058fee1565596c6cec0ce6d0f5bf10f1d8e956fd1122e81651afa2fb17a2a1fd4aac78bb44bb8fb82f56c32a19ce46361c4ff104d377cbe4923d?filename=&amp;attachment=1" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/8c/39/8c39a91a9fb915dd6b71fa51e8e89c6f913af681.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.3390/fi9030043"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="unlock alternate icon" style="background-color: #fb971f;"></i> mdpi.com </button> </a>

A Survey of Cloud Computing Detection Techniques against DDoS Attacks

Sabah Alzahrani, Liang Hong
<span title="">2018</span> <i title="Scientific Research Publishing, Inc,"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/fwygz7e3z5d5rdz63lntpjwy6y" style="color: black;">Journal of Information Security</a> </i> &nbsp;
An approach for detecting HTTP based DDoS attacks is proposed by [10] . It entails a five step filter tree approach of cloud defense.  ...  This paper presents a survey of the various mechanisms, both traditional and modern, that are applied in detecting cloud-based DDoS attacks. ris, the SYN flood attack, the UDP flood attack, malformed packet  ...  Analyzing Specific DDoS Detection Techniques Different scholars have presented specific techniques for detecting distributed denial of service attacks in the cloud.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.4236/jis.2018.91005">doi:10.4236/jis.2018.91005</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/r4pc35spsfccjd6baoyhsecn7q">fatcat:r4pc35spsfccjd6baoyhsecn7q</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20180723091511/http://file.scirp.org/pdf/JIS_2017122014131242.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/79/80/7980ac4b63628ac5da232b16c4c91c4fdefe0700.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.4236/jis.2018.91005"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="unlock alternate icon" style="background-color: #fb971f;"></i> Publisher / doi.org </button> </a>

DNS attack mitigation Using OpenStack Isolation [article]

Hassnain ul hassan, Rizal Mohd Nor, Md Amiruzzaman, Sharyar Wani, Md. Rajibul Islam
<span title="2021-08-29">2021</span> <i > arXiv </i> &nbsp; <span class="release-stage" >pre-print</span>
By hosting DNS in private cloud infrastructure, the DNS servers will be out of reach by attackers which will prevent DNS attacks.  ...  This research aims to propose a model for the development of a private cloud infrastructure to host DNS.  ...  In our "Testbed for DDoS attack within cloud" various functions are delegated to VMs.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener" href="https://arxiv.org/abs/2106.04575v3">arXiv:2106.04575v3</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/b4rmtqrgdfghje5ozbz7776psa">fatcat:b4rmtqrgdfghje5ozbz7776psa</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20210901091651/https://arxiv.org/pdf/2106.04575v3.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/da/71/da71bb49f88c72f27e7e7f7226804ad2daa7ce7e.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener" href="https://arxiv.org/abs/2106.04575v3" title="arxiv.org access"> <button class="ui compact blue labeled icon button serp-button"> <i class="file alternate outline icon"></i> arxiv.org </button> </a>
&laquo; Previous Showing results 1 &mdash; 15 out of 609 results