A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2020; you can also visit the original URL.
The file type is application/pdf
.
Filters
Moving Target Defense Strategy for Mitigating Denial of Service Attack in the Public Cloud Environment
2019
International Journal of Engineering and Advanced Technology
Experimental simulations prove the effectiveness of MTD in the public cloud environment. ...
In spite of the huge number of recovery measures available in cloud, DoS becoming harder every day in terms of attack volume and severity. ...
More solutions exist in the literature for the process of detection and prevention of DoS attacks in the cloud environment and we have anti-DoS solution too offered by the Cloud Service Provider (CSP). ...
doi:10.35940/ijeat.f8077.088619
fatcat:e5l3lzfxfresfafrci2wwhtm5u
A Novel Active Data Filtration for the Cloud based Architecture against Packet Flooding Attacks
2015
International Journal of Modern Education and Computer Science
Today cloud computing is facing numerous challenges and one of those is Attack on the cloud environment. ...
The simulation is done by cloud sim as well as Net-Beans and the performance is analyzed over time and data. Using filter the packet loss and time delay occurs in EDoS attack is much reduced. ...
In [2] paper focuses on detecting and analyses of the Distributed Denial of Service (DDoS) attacks in cloud computing environments. ...
doi:10.5815/ijmecs.2015.12.04
fatcat:mztol4vrsfbi5f5spcyzy72a34
DoLen: User-Side Multi-cloud Application Monitoring
2014
2014 International Conference on Future Internet of Things and Cloud
We conducted various experiments using a cluster to simulate three clouds, showing the framework's ability to analyze resource consumption of Hadoop applications deployed in clouds in near real-time. ...
Monitoring the performance and behavior of multi-cloud applications in a scenario where applications are deployed on multiple cloud providers is a challenge for cloud computing research community. ...
In this work, we focus on DoS attack detection because DoS attacks are one of the most serious issues in cloud computing environments [14] . ...
doi:10.1109/ficloud.2014.22
dblp:conf/ficloud/QuocYF14
fatcat:bpukonfdfra6xddgdvjeeafg7u
Research on the Security based on Utility Theory in Cloud Computing Environment
2014
International Journal of Security and Its Applications
models which are on the basis of ensured data security to enhance the users' utility, model analysis and optimization, and ultimately get the best optimized configuration of security policy in the cloud ...
computing environment to guide the formulation and dynamic adjustment of access control policy in cloud computing environment, and to meet the users' requirements, such as response time, resources availability ...
theory of security policy optimal model in cloud computing environment, solved some scientific problems of cloud computing safety, such as modeling analysis of user access policy security and utility property ...
doi:10.14257/ijsia.2014.8.4.29
fatcat:awz76qtoafcldc6shcjr662psm
Energy Aware Supervised Pattern Attack Recognition Technique for Mitigation of EDoS Attacks in Cloud Platform
2018
International Journal of Wireless and Microwave Technologies
EDoS (Economic Denial of Sustainability) attack is a form of DDoS attacks; carried out for a long span of time and intended to put a financial burden and cause economical loss to the users of cloud. ...
Cloud computing is a rapidly growing technology in this new era. Cloud is a platform where users get charged on the basis of the services and resources they have used. ...
Cloud is prone to a variety of attacks such as malware injection attack, Spoofing attack, flooding attack, wrapping attack, DoS, DDoS and EDoS attack. ...
doi:10.5815/ijwmt.2018.01.05
fatcat:lpmfjg4jxbh4phkeexleeaos6e
Deep Learning Based Intrusion Detection in Cloud Services for Resilience Management
2022
Computers Materials & Continua
Due to various security vulnerabilities in the cloud architecture; as a result the cloud environment has become non-resilient. ...
In the recent era of information technology the number of business and individual users of cloud services have been increased and larger volumes of data is being processed and stored in it. ...
The following attacks were introduced in the simulated cloud network; Net Scan (NS), and DoS. ...
doi:10.32604/cmc.2022.022351
fatcat:7mcqneanq5hf5c4hbqjg5uwm3a
A Performance Perspective Analysis: A Detailed Vision on Denial of Service and Distributed Denial of Service on Cloud Computing
2019
International journal of recent technology and engineering
In recent days cloud computing and cloud-based service, provisions play a vital and significant role in Internet-based information computing. ...
The primary objective of the cloud computing is sharing the resources within increased efficiency regarding time and cost for all kind of customers who needs a cloud service badly and immediately. ...
A SURVEY OF DOS ATTACKS
Darwish et al. (2017)
V. A SURVEY OF DDOS ATTACKS in the cloud computing environment and the prevent based supervised learning system analyzed. ...
doi:10.35940/ijrte.c5002.098319
fatcat:4fyxd6fzrjg3ljcldck7w6omb4
Launching Stealth Attacks using Cloud
[article]
2020
arXiv
pre-print
The paper first reviews types of attacks launched through cloud environment. It then reports case studies through which the processes of launching cyber attacks using clouds are demonstrated. ...
This paper reports our study to show that cyber attackers heavily abuse the public cloud platforms to setup their attack environments and launch stealth attacks. ...
We then saved the output in a CSV (Comma Separated Value) file and used for further analysis. 3) Suspicious Activity Scenario #3 (Denial of Service): Denial of Service (DoS) attack can be simulated at ...
arXiv:2006.07908v1
fatcat:ta72pmnybrd3te2lt7zln2vfse
Cloud-based testbed for simulation of cyber attacks
2014
2014 IEEE Network Operations and Management Symposium (NOMS)
Studying attacks in a real environment however, is not viable and therefore it is necessary to find other methods how to examine the nature of attacks. ...
Utilizing the sandbox environment, it is possible to simulate various security attacks and evaluate their impacts on real infrastructures. The design of the framework benefits from IaaS clouds. ...
Acknowledgements This work has been supported by the project "Cybernetic Proving Ground" (VG20132015103) funded by the Ministry of the Interior of the Czech Republic. ...
doi:10.1109/noms.2014.6838298
dblp:conf/noms/KourilRJCDVV14
fatcat:xfe5m4mjizaffg3pm4nh2bkkja
Securing Cloud Framework from Application DDoS Attacks
2019
VOLUME-8 ISSUE-10, AUGUST 2019, REGULAR ISSUE
This paper discusses the various forms of Application DDoS attacks, the mitigation mechanisms for the Application DDoS attacks and compares the results in the simulated cloud environment. ...
With the extensive growth of in the size of data transmitted and received in the cloud, there arises the risk of sensitive data prone to different kinds of attacks. ...
The analysis further illustrates that flooding attacks in a secured cloud environment shows that attacker might be a true user meaning both the attacker and affected VM are present in the same subnetwork ...
doi:10.35940/ijitee.a1002.1191s19
fatcat:cjlykwbfozfozhapt6pvy47tje
Anomaly Detection in Wireless Sensor Networks: A Proposed Framework
2020
International Journal of Interactive Mobile Technologies
With the rise of IOT devices and the systems connected to the internet, there was, accordingly, an ever-increasing number of network attacks (e.g. in DOS, DDOS attacks). ...
A very significant research problem related to identifying Wireless Sensor Networks (WSN) attacks and the analysis of the sensor data is the detection of the relevant anomalies. ...
It contains various simulated network attacks, including DoSNuke attack packets, which has been used in this paper for testing the proposed model [15] ; DoSNuke attack is a Denial of Service (DoS) attack ...
doi:10.3991/ijim.v14i10.14261
fatcat:r45obptffvbfjpecrugj25bqwq
DDoS Attack Classification on Cloud Environment Using Machine Learning Techniques with Different Feature Selection Methods
2020
International Journal of Advanced Trends in Computer Science and Engineering
Due to networked nature of the cloud, resources, data and applications are vulnerable to the attack in cloud environment. ...
Intrusion Detection Systems (IDS) are employed in the cloud to detect malicious behavior in the network and in the host. ...
Data for this study is obtained by simulating the cloud environment and DoS attack, using Wireshark with Tshark option is extracted with necessary features. ...
doi:10.30534/ijatcse/2020/60952020
fatcat:rwgx6a6pivbjdohrqueagm23be
A Case Study of the Impact of Denial of Service Attacks in Cloud Applications
2019
Journal of Communications
the impact of DoS attacks in cloud applications. ...
Among the numerous cloud attacks that can target the cloud computing systems, Denial of Service (DoS) and Distributed Denial of Service (DDoS) attacks can cause a major problem in cloud security. ...
He is interested also in the subject of quality assurance in research and education. Currently he is a Lecturer at the IT dept., FCI, Assiut Univ. E-mail: itajeddin@aun.edu.eg; islam_t@hotmail.com. ...
doi:10.12720/jcm.14.2.153-158
fatcat:rnk2hl6td5gdrhqejytzbnqsue
An Improved CPK Identity Authentication Scheme Based on Cloud Environment
2017
DEStech Transactions on Engineering and Technology Research
In this paper, a bidirectional identity authentication scheme based on CPK technology is proposed, to resist forgery attacks in cloud computing environment. ...
Simulation experiments are conducted on the cloud computing simulation platform via the improved CPK identity authentication based on cloud environment. ...
Experimental Results and Analysis In the experiment, the CCPK identity authentication scheme is simulated, and user A and user B are used to simulate the authentication between cloud computing users. ...
doi:10.12783/dtetr/apetc2017/11255
fatcat:f53qmobgnrgsxmv3dadmna5ioy
Moving Target Defense-Based Denial-of-Service Mitigation in Cloud Environments: A Survey
2022
Security and Communication Networks
In this survey, we particularly provide an in-depth analysis on how MTD can help recover critical cloud assets in the face of DoS attacks and how emerging programmable technologies such as software-defined ...
With the increased frequency and intensity of denial-of-service (DoS) attacks on critical cloud-hosted services, resource adaptation schemes adopted by the cloud service providers (CSPs) need to be intelligent ...
Traditional DoS Defense in Cloud Environments. ...
doi:10.1155/2022/2223050
fatcat:3figtl7ju5ezjbn3gwvzhjxj4e
« Previous
Showing results 1 — 15 out of 27,587 results