Filters








288 Hits in 3.7 sec

Survey on DDoS Attacks and Defense Mechanisms in Cloud and Fog Computing

Deepali Chaudhary, Kriti Bhushan, B.B. Gupta
2018 International Journal of E-Services and Mobile Applications  
Governments, as well as organizations, have migrated their entire or most of the IT infrastructure to the cloud.  ...  With the emergence of IoT devices and big data, the amount of data forwardedtothecloudhasincreasedtoahugeextent.Therefore,theparadigmofcloudcomputing isnolongersufficient.Furthermore,withthegrowthofdemandforIoTsolutionsinorganizations  ...  document, which may be purchased using the "Add to Cart" button on the product's webpage: www.igi-global.com/article/survey-on-ddos-attacks-and- defense-mechanisms-in-cloud-and-fog- computing/206227  ... 
doi:10.4018/ijesma.2018070104 fatcat:tzuf577km5h7nmtjnkkkyecpf4

DI-ADS: A Deep Intelligent Distributed Denial of Service Attack Detection Scheme for Fog-Based IoT Applications

Surya Pavan Kumar Gudla, Sourav Kumar Bhoi, Soumya Ranjan Nayak, Amit Verma, Rajesh Kaluri
2022 Mathematical Problems in Engineering  
The framework mainly uses a deep learning model (DLM) to detect DDoS attacks in the network. The DLM is installed on the computation module of the fog node that predicts the end IoT device behavior.  ...  But, due to IoT device's constrained nature in computation and storage facilities, DL cannot be administered on those.  ...  Priyadarshini and Barik [15] proposed a novel source based DDoS defense mechanism to mitigate DDoS attacks using DLMs by blocking infected packets disseminated to cloud on CTU-13 Botnet and ISCX 2012  ... 
doi:10.1155/2022/3747302 fatcat:dzv2eopiuzh3xju3zy2vaee7m4

A Taxonomy of DDoS Attack Mitigation Approaches Featured by SDN Technologies in IoT Scenarios

Felipe S. Dantas Silva, Esau Silva, Emidio P. Neto, Marcilio Lemos, Augusto J. Venancio Neto, Flavio Esposito
2020 Sensors  
of emerging technologies based on Cloud and Edge (or Fog) Computing.  ...  Distributed Denial of Service (DDoS) attacks are among the most severe virtual threats at present and occur prominently in this scenario, which can be mainly owed to their ease of execution.  ...  -Hybrid SDN-Fog-Cloud: establishes a multi-layer architecture that encompasses cloud-computing and fog-computing layers.  ... 
doi:10.3390/s20113078 pmid:32485943 pmcid:PMC7309081 fatcat:v4dd357ednbkdewpvmue6xwdsa

A Survey of Security Architectures for Edge Computing-Based IoT

Elahe Fazeldehkordi, Tor-Morten Grønli
2022 IoT  
Furthermore, an application scenario of edge computing in IoT is introduced, and the advantages/disadvantages of the scenario based on edge computing and cloud computing are discussed.  ...  Then, we extensively discuss the major security and privacy attacks and threats in the context of EC-based IoT and provide possible countermeasures and solutions.  ...  The authors in [31] presented a comprehensive survey on fog computing and related computing models and their differences and similarities.  ... 
doi:10.3390/iot3030019 fatcat:vxwo2kklxrcb7a4vqzncpx5qwy

An Overview of Fog Computing and Edge Computing Security and Privacy Issues

Ahmed M. Alwakeel
2021 Sensors  
In this paper, we survey some of the main security and privacy challenges that faces fog and edge computing illustrating how these security issues could affect the work and implementation of edge and fog  ...  Two different new cloud technologies that inherit some of the traditional cloud computing paradigm are fog computing and edge computing that is aims to simplify some of the complexity of cloud computing  ...  etc. along with the defense mechanisms that can be applied in edge computing network.  ... 
doi:10.3390/s21248226 pmid:34960320 pmcid:PMC8708798 fatcat:zskb6nbmrva7zei7l24kl5bbr4

Distributed Denial of Service (DDoS) Mitigation Using Blockchain—A Comprehensive Insight

Sharyar Wani, Mohammed Imthiyas, Hamad Almohamedh, Khalid M Alhamed, Sultan Almotairi, Yonis Gulzar
2021 Symmetry  
Although the first DDoS attack was reported in 1996, the complexity and sophistication of these attacks has been ever increasing.  ...  This survey discusses different approaches for DDoS mitigation using blockchain in varied domains to date.  ...  We would also like to thank International Islamic University Malaysia and the Deanship of Scientific Research at Majmaah University for their support towards the completion of this work.  ... 
doi:10.3390/sym13020227 fatcat:tftfhqczzrasjnxoxpputrh4ey

Machine Learning Approaches for Combating Distributed Denial of Service Attacks in Modern Networking Environments

Ahamed Aljuhani
2021 IEEE Access  
Additionally, the paper discusses different DDoS defense systems based on ML techniques that make use of a virtualized environment, including cloud computing, software-defined network, and network functions  ...  Indeed, many defense systems have been transformed into smart and intelligent systems through the use of ML techniques, which allow them to defeat DDoS attacks.  ...  [111] reviewed DDoS defense systems in the context of cloud and fog computing.  ... 
doi:10.1109/access.2021.3062909 fatcat:xtj576lfsffrbpiqyk2kv5wuam

CLOUD COMPUTING SECURITY ISSUES AND RESEARCH CHALLENGES FROM DDOS ATTACKS USING INTRUSION DETECTION SYSTEM

K. Harish Kumar
2017 Zenodo  
Research on recent DDoS attacks and a comparison of the major cloud-based DDoS defence systems are presented in this article.  ...  To protect the legitimate users of cloud apps from DDoS attacks a significant improvement is made in their service availability and quality.  ...  Scope of the Study Focusing on intrusion detection and prevention systems, this survey gives a survey on fog and cloud computing, and proposes how businesses might apply these technologies in their own  ... 
doi:10.5281/zenodo.6685637 fatcat:eg2jfl2rtfa7lozgoxpvshkdqi

Key Enabling Technologies for Secure and Scalable Future Fog-IoT Architecture: A Survey [article]

Jianli Pan, Yuanni Liu, Jianyu Wang, Austin Hester
2018 arXiv   pre-print
In this article, we will survey these key enabling technologies with specific focuses on security and scalability, which are two very important and much-needed characteristics for future large-scale deployment  ...  Fog or Edge computing has recently attracted broad attention from both industry and academia.  ...  However, the battle between the attackers and defenders is not easy to be ended, and we expect more advanced deception based cyber defense mechanisms to become available for the Fog-IoT environment in  ... 
arXiv:1806.06188v1 fatcat:6oh6ygyqcngffaxkro5pv2dh4e

Survey on Edge Computing Security

Baydaa Hassan Husain, Shavan Askar
2021 Zenodo  
Hopping this paper sheds light on Edge Computing security and paves the way for more future research.  ...  Through reviewing a number of previous researches, security challenges have been identified in four main sectors, including data privacy and security, access control, attack mitigation, and detection for  ...  Attack Mitigation Contrasted with servers in the cloud, data centers on the edge are more sensitive to DDoS attempts.  ... 
doi:10.5281/zenodo.4496938 fatcat:xdgxmjv4r5csxmy2twuuvoerim

Authentication, Access Control, Privacy, Threats and Trust Management Towards Securing Fog Computing Environments: A Review [article]

Abdullah Al-Noman Patwary, Anmin Fu, Ranesh Kumar Naha, Sudheer Kumar Battula, Saurabh Garg, Md Anwarul Kaium Patwary, Erfan Aghasian
2020 arXiv   pre-print
To provide the required trust and privacy, we need to also focus on authentication, threats and access control mechanisms as well as techniques in Fog computing.  ...  In this paper, we perform a survey and propose a taxonomy, which presents an overview of existing security concerns in the context of the Fog computing paradigm.  ...  As compared to traditional DDoS attacks, in Fog computing, various Fog devices apply DDoS attacks which will become much more severe.  ... 
arXiv:2003.00395v1 fatcat:32jta5ijkzb2nfi2hzatz5pbvi

Towards Secure Fog Computing: A Survey on Trust Management, Privacy, Authentication, Threats and Access Control

Abdullah Al-Noman Patwary, Ranesh Kumar Naha, Saurabh Garg, Sudheer Kumar Battula, Md Anwarul Kaium Patwary, Erfan Aghasian, Muhammad Bilal Amin, Aniket Mahanti, Mingwei Gong
2021 Electronics  
To provide the appropriate level of trust and privacy, there is a need to focus on authentication, threats and access control mechanisms as well as privacy protection techniques in Fog computing.  ...  On the other hand, privacy preservation for user's data in Fog devices and application data processed in Fog devices is another concern.  ...  Fog nodes and cloud servers together can provide multi-level protection, i.e., "defense-in-depth".  ... 
doi:10.3390/electronics10101171 fatcat:h2q4vbw4dja4ho5tbdj4ijbnje

Blockchain Based Solutions to Mitigate Distributed Denial of Service (DDoS) Attacks in the Internet of Things (IoT): A Survey

Zawar Shah, Imdad Ullah, Huiling Li, Andrew Levula, Khawar Khurshid
2022 Sensors  
All the solutions are critically evaluated in terms of their working principles, the DDoS defense mechanism (i.e., prevention, detection, reaction), strengths and weaknesses.  ...  In this survey, a detailed survey of various Blockchain-based solutions to mitigate DDoS attacks in IoT is carried out.  ...  Furthermore, a central cloud server is introduced that manages the attack model from a set of fog nodes.  ... 
doi:10.3390/s22031094 pmid:35161838 pmcid:PMC8840306 fatcat:qqhqoltk35ertd3zv3boezjms4

Comprehensive Review of Artificial Intelligence and Statistical Approaches in Distributed Denial of Service Attack and Defense Methods

Bashar Ahmed Khalaf, Salama A. Mostafa, Aida Mustapha, Mazin Abed Mohammed, Wafaa Mustafa Abduallah
2019 IEEE Access  
Subsequently, extensive research on applying artificial intelligence and statistical techniques in the defense methods has been conducted in order to identify, mitigate, and prevent these attacks.  ...  Some of these methods have signature-based defense mechanisms that fail to identify new attacks and others have anomaly-based defense mechanisms that are limited to specific types of DDoS attacks and yet  ...  [17] emphasizes various DDoS defense methods in cloud computing. Recently, the review of Rao et al.  ... 
doi:10.1109/access.2019.2908998 fatcat:wasnqcj4bnc23pk4wzsl7n7rze

Software Defined Network Enabled Fog-to-Things Hybrid Deep Learning Driven Cyber Threat Detection System

Ihtisham Ullah, Basit Raza, Sikandar Ali, Irshad Ahmed Abbasi, Samad Baseer, Azeem Irshad, Muhammad Arif
2021 Security and Communication Networks  
The evolving cyber-attacks are still an arresting challenge in the fog-to-IoT environment such as Denial of Service (DoS), Distributed Denial of Service (DDoS), Infiltration, malware, and botnets attacks  ...  However, most of the fog-to-IoT devices are resource-constrained and devices are widespread that can be potentially targeted with cyber-attacks.  ...  Acknowledgments e authors acknowledge the role of HOSCSCHULE COBURG group in data collection.  ... 
doi:10.1155/2021/6136670 fatcat:rftmiifz7reg5e7xovvfdcw4h4
« Previous Showing results 1 — 15 out of 288 results