27,587 Hits in 4.0 sec

Moving Target Defense Strategy for Mitigating Denial of Service Attack in the Public Cloud Environment

2019 International Journal of Engineering and Advanced Technology  
Experimental simulations prove the effectiveness of MTD in the public cloud environment.  ...  In spite of the huge number of recovery measures available in cloud, DoS becoming harder every day in terms of attack volume and severity.  ...  More solutions exist in the literature for the process of detection and prevention of DoS attacks in the cloud environment and we have anti-DoS solution too offered by the Cloud Service Provider (CSP).  ... 
doi:10.35940/ijeat.f8077.088619 fatcat:e5l3lzfxfresfafrci2wwhtm5u

A Novel Active Data Filtration for the Cloud based Architecture against Packet Flooding Attacks

Shikha Vashisht, Mandeep kaur
2015 International Journal of Modern Education and Computer Science  
Today cloud computing is facing numerous challenges and one of those is Attack on the cloud environment.  ...  The simulation is done by cloud sim as well as Net-Beans and the performance is analyzed over time and data. Using filter the packet loss and time delay occurs in EDoS attack is much reduced.  ...  In [2] paper focuses on detecting and analyses of the Distributed Denial of Service (DDoS) attacks in cloud computing environments.  ... 
doi:10.5815/ijmecs.2015.12.04 fatcat:mztol4vrsfbi5f5spcyzy72a34

DoLen: User-Side Multi-cloud Application Monitoring

Do Le Quoc, Lenar Yazdanov, Christof Fetzer
2014 2014 International Conference on Future Internet of Things and Cloud  
We conducted various experiments using a cluster to simulate three clouds, showing the framework's ability to analyze resource consumption of Hadoop applications deployed in clouds in near real-time.  ...  Monitoring the performance and behavior of multi-cloud applications in a scenario where applications are deployed on multiple cloud providers is a challenge for cloud computing research community.  ...  In this work, we focus on DoS attack detection because DoS attacks are one of the most serious issues in cloud computing environments [14] .  ... 
doi:10.1109/ficloud.2014.22 dblp:conf/ficloud/QuocYF14 fatcat:bpukonfdfra6xddgdvjeeafg7u

Research on the Security based on Utility Theory in Cloud Computing Environment

Jie Hui Ju, ZhongYou Wang, WenJuan Li, WeiZheng Bao, Ya Wang
2014 International Journal of Security and Its Applications  
models which are on the basis of ensured data security to enhance the users' utility, model analysis and optimization, and ultimately get the best optimized configuration of security policy in the cloud  ...  computing environment to guide the formulation and dynamic adjustment of access control policy in cloud computing environment, and to meet the users' requirements, such as response time, resources availability  ...  theory of security policy optimal model in cloud computing environment, solved some scientific problems of cloud computing safety, such as modeling analysis of user access policy security and utility property  ... 
doi:10.14257/ijsia.2014.8.4.29 fatcat:awz76qtoafcldc6shcjr662psm

Energy Aware Supervised Pattern Attack Recognition Technique for Mitigation of EDoS Attacks in Cloud Platform

Preeti Daffu, Amanpreet Kaur
2018 International Journal of Wireless and Microwave Technologies  
EDoS (Economic Denial of Sustainability) attack is a form of DDoS attacks; carried out for a long span of time and intended to put a financial burden and cause economical loss to the users of cloud.  ...  Cloud computing is a rapidly growing technology in this new era. Cloud is a platform where users get charged on the basis of the services and resources they have used.  ...  Cloud is prone to a variety of attacks such as malware injection attack, Spoofing attack, flooding attack, wrapping attack, DoS, DDoS and EDoS attack.  ... 
doi:10.5815/ijwmt.2018.01.05 fatcat:lpmfjg4jxbh4phkeexleeaos6e

Deep Learning Based Intrusion Detection in Cloud Services for Resilience Management

S. Sreenivasa Chakravarthi, R. Jagadeesh Kannan, V. Anantha Natarajan, Xiao-Zhi Gao
2022 Computers Materials & Continua  
Due to various security vulnerabilities in the cloud architecture; as a result the cloud environment has become non-resilient.  ...  In the recent era of information technology the number of business and individual users of cloud services have been increased and larger volumes of data is being processed and stored in it.  ...  The following attacks were introduced in the simulated cloud network; Net Scan (NS), and DoS.  ... 
doi:10.32604/cmc.2022.022351 fatcat:7mcqneanq5hf5c4hbqjg5uwm3a

A Performance Perspective Analysis: A Detailed Vision on Denial of Service and Distributed Denial of Service on Cloud Computing

2019 International journal of recent technology and engineering  
In recent days cloud computing and cloud-based service, provisions play a vital and significant role in Internet-based information computing.  ...  The primary objective of the cloud computing is sharing the resources within increased efficiency regarding time and cost for all kind of customers who needs a cloud service badly and immediately.  ...  A SURVEY OF DOS ATTACKS Darwish et al. (2017) V. A SURVEY OF DDOS ATTACKS in the cloud computing environment and the prevent based supervised learning system analyzed.  ... 
doi:10.35940/ijrte.c5002.098319 fatcat:4fyxd6fzrjg3ljcldck7w6omb4

Launching Stealth Attacks using Cloud [article]

Moitrayee Chatterjee and Prerit Datta and Faranak Abri and Akbar Siami Namin and Keith S. Jones
2020 arXiv   pre-print
The paper first reviews types of attacks launched through cloud environment. It then reports case studies through which the processes of launching cyber attacks using clouds are demonstrated.  ...  This paper reports our study to show that cyber attackers heavily abuse the public cloud platforms to setup their attack environments and launch stealth attacks.  ...  We then saved the output in a CSV (Comma Separated Value) file and used for further analysis. 3) Suspicious Activity Scenario #3 (Denial of Service): Denial of Service (DoS) attack can be simulated at  ... 
arXiv:2006.07908v1 fatcat:ta72pmnybrd3te2lt7zln2vfse

Cloud-based testbed for simulation of cyber attacks

Daniel Kouril, Tomas Rebok, Tomas Jirsik, Jakub Cegan, Martin Drasar, Martin Vizvary, Jan Vykopal
2014 2014 IEEE Network Operations and Management Symposium (NOMS)  
Studying attacks in a real environment however, is not viable and therefore it is necessary to find other methods how to examine the nature of attacks.  ...  Utilizing the sandbox environment, it is possible to simulate various security attacks and evaluate their impacts on real infrastructures. The design of the framework benefits from IaaS clouds.  ...  Acknowledgements This work has been supported by the project "Cybernetic Proving Ground" (VG20132015103) funded by the Ministry of the Interior of the Czech Republic.  ... 
doi:10.1109/noms.2014.6838298 dblp:conf/noms/KourilRJCDVV14 fatcat:xfe5m4mjizaffg3pm4nh2bkkja

Securing Cloud Framework from Application DDoS Attacks

This paper discusses the various forms of Application DDoS attacks, the mitigation mechanisms for the Application DDoS attacks and compares the results in the simulated cloud environment.  ...  With the extensive growth of in the size of data transmitted and received in the cloud, there arises the risk of sensitive data prone to different kinds of attacks.  ...  The analysis further illustrates that flooding attacks in a secured cloud environment shows that attacker might be a true user meaning both the attacker and affected VM are present in the same subnetwork  ... 
doi:10.35940/ijitee.a1002.1191s19 fatcat:cjlykwbfozfozhapt6pvy47tje

Anomaly Detection in Wireless Sensor Networks: A Proposed Framework

Dina M. Ibrahim, Nada M. Alruhaily
2020 International Journal of Interactive Mobile Technologies  
With the rise of IOT devices and the systems connected to the internet, there was, accordingly, an ever-increasing number of network attacks (e.g. in DOS, DDOS attacks).  ...  A very significant research problem related to identifying Wireless Sensor Networks (WSN) attacks and the analysis of the sensor data is the detection of the relevant anomalies.  ...  It contains various simulated network attacks, including DoSNuke attack packets, which has been used in this paper for testing the proposed model [15] ; DoSNuke attack is a Denial of Service (DoS) attack  ... 
doi:10.3991/ijim.v14i10.14261 fatcat:r45obptffvbfjpecrugj25bqwq

DDoS Attack Classification on Cloud Environment Using Machine Learning Techniques with Different Feature Selection Methods

2020 International Journal of Advanced Trends in Computer Science and Engineering  
Due to networked nature of the cloud, resources, data and applications are vulnerable to the attack in cloud environment.  ...  Intrusion Detection Systems (IDS) are employed in the cloud to detect malicious behavior in the network and in the host.  ...  Data for this study is obtained by simulating the cloud environment and DoS attack, using Wireshark with Tshark option is extracted with necessary features.  ... 
doi:10.30534/ijatcse/2020/60952020 fatcat:rwgx6a6pivbjdohrqueagm23be

A Case Study of the Impact of Denial of Service Attacks in Cloud Applications

Hosam F. El-Sofany, King Khalid University, Abha, Kingdom of Saudi Arabia, Samir A. El-Seoud, Islam A. T. F. Taj-Eddin
2019 Journal of Communications  
the impact of DoS attacks in cloud applications.  ...  Among the numerous cloud attacks that can target the cloud computing systems, Denial of Service (DoS) and Distributed Denial of Service (DDoS) attacks can cause a major problem in cloud security.  ...  He is interested also in the subject of quality assurance in research and education. Currently he is a Lecturer at the IT dept., FCI, Assiut Univ. E-mail:;  ... 
doi:10.12720/jcm.14.2.153-158 fatcat:rnk2hl6td5gdrhqejytzbnqsue

An Improved CPK Identity Authentication Scheme Based on Cloud Environment

Yanyan Song, Jun Qin
2017 DEStech Transactions on Engineering and Technology Research  
In this paper, a bidirectional identity authentication scheme based on CPK technology is proposed, to resist forgery attacks in cloud computing environment.  ...  Simulation experiments are conducted on the cloud computing simulation platform via the improved CPK identity authentication based on cloud environment.  ...  Experimental Results and Analysis In the experiment, the CCPK identity authentication scheme is simulated, and user A and user B are used to simulate the authentication between cloud computing users.  ... 
doi:10.12783/dtetr/apetc2017/11255 fatcat:f53qmobgnrgsxmv3dadmna5ioy

Moving Target Defense-Based Denial-of-Service Mitigation in Cloud Environments: A Survey

Minh Nguyen, Saptarshi Debroy, AnMin Fu
2022 Security and Communication Networks  
In this survey, we particularly provide an in-depth analysis on how MTD can help recover critical cloud assets in the face of DoS attacks and how emerging programmable technologies such as software-defined  ...  With the increased frequency and intensity of denial-of-service (DoS) attacks on critical cloud-hosted services, resource adaptation schemes adopted by the cloud service providers (CSPs) need to be intelligent  ...  Traditional DoS Defense in Cloud Environments.  ... 
doi:10.1155/2022/2223050 fatcat:3figtl7ju5ezjbn3gwvzhjxj4e
« Previous Showing results 1 — 15 out of 27,587 results