Analyzing well-known countermeasures against distributed denial of service attacks

H Beitollahi, G Deconinck - Computer Communications, 2012 - Elsevier
This paper reviews and analyzes well-known countermeasures against distributed denial of
service (DDoS) attacks. This paper provides an in-depth analysis of each countermeasure …

Future cloud systems design: challenges and research directions

A Taherkordi, F Zahid, Y Verginadis, G Horn - IEEE Access, 2018 - ieeexplore.ieee.org
Cloud computing has been recognized as the de facto utility computing standard for hosting
and delivering services over the Internet. Cloud platforms are being rapidly adopted by …

Providing user security guarantees in public infrastructure clouds

N Paladi, C Gehrmann… - IEEE Transactions on …, 2016 - ieeexplore.ieee.org
The infrastructure cloud (IaaS) service model offers improved resource flexibility and
availability, where tenants-insulated from the minutiae of hardware maintenance-rent …

Paasword: A holistic data privacy and security by design framework for cloud services

Y Verginadis, A Michalas, P Gouvas, G Schiefer… - Journal of Grid …, 2017 - Springer
Enterprises increasingly recognize the compelling economic and operational benefits from
virtualizing and pooling IT resources in the cloud. Nevertheless, the significant and valuable …

A Novel Protective Framework for Defeating HTTP‐Based Denial of Service and Distributed Denial of Service Attacks

MA Saleh, A Abdul Manaf - The Scientific World Journal, 2015 - Wiley Online Library
The growth of web technology has brought convenience to our life, since it has become the
most important communication channel. However, now this merit is threatened by …

ConnectionScore: a statistical technique to resist application-layer DDoS attacks

H Beitollahi, G Deconinck - Journal of Ambient Intelligence and …, 2014 - Springer
In an application-layer distributed denial of service (DDoS) attack, zombie machines send a
large number of legitimate requests to the victim server. Since these requests have …

Towards secure cloud orchestration for multi-cloud deployments

N Paladi, A Michalas, HV Dang - Proceedings of the 5th Workshop on …, 2018 - dl.acm.org
Cloud orchestration frameworks are commonly used to deploy and operate cloud
infrastructure. Their role spans both vertically (deployment on infrastructure, platform …

A method to secure iot devices against botnet attacks

T Shah, S Venkatesan - Internet of Things–ICIOT 2019: 4th International …, 2019 - Springer
An unsecured or weak authentication system between an IoT device and a user provides
opportunities to attackers to manipulate and use the IoT device as botnet. The proliferation of …

Towards trusted ehealth services in the cloud

A Michalas, R Dowsley - … on Utility and Cloud Computing (UCC …, 2015 - ieeexplore.ieee.org
As adoption of eHealth solutions advances, new computing paradigms-such as cloud
computing-bring the potential to improve efficiency in managing medical health records and …

Time-variant attribute-based multitype encryption algorithm for improved cloud data security using user profile

S Kumaresan, V Shanmugam - The Journal of Supercomputing, 2020 - Springer
Cloud computing becomes more sophisticated to provide different services at different levels
of user access. Even though various services are accessed at a different level, the security of …