DDoS attacks in cloud computing: Collateral damage to non-targets

G Somani, MS Gaur, D Sanghi, M Conti - Computer Networks, 2016 - Elsevier
The effects of distributed denial-of-service (DDoS) attacks on cloud computing are not very
similar to those in traditional “fixed” on-premise infrastructure. In the context of DDoS attacks …

Machine learning-based EDoS attack detection technique using execution trace analysis

H Abbasi, N Ezzati-Jivan, M Bellaiche, C Talhi… - Journal of Hardware and …, 2019 - Springer
One of the most important benefits of using cloud computing is the benefit of on-demand
services. Accordingly, the method of payment in the cloud environment is pay per use. This …

[PDF][PDF] A comparative analysis of security methods for DDoS attacks in the cloud computing environment

BSK Devi, T Subbulakshmi - Indian Journal of Science and …, 2016 - researchgate.net
Cloud security is of the major concern in the deployment and protection of cloud deployment
models. In this paper, detailed investigations on the recent DDoS attacks and comparative …

Performance modeling and analysis of the EDoS-shield mitigation

F Al-Haidari, K Salah, M Sqalli, SM Buhari - Arabian Journal for Science …, 2017 - Springer
Cloud adoption by industry and governments has been on the rise for the past few years due
to the obvious cloud technology advantages that include scalability, reliability, availability …

[HTML][HTML] Towards Yo-Yo attack mitigation in cloud auto-scaling mechanism

X Xu, J Li, H Yu, L Luo, X Wei, G Sun - Digital communications and …, 2020 - Elsevier
Cloud platforms could automatically scale underlying network resources up and down in
response to changes in the traffic load. Such an auto-scaling mechanism can largely …

Experimental analysis of DDoS attack and it's detection in Eucalyptus private cloud platform

AH Dar, B Habib, F Khurshid… - … on Advances in …, 2016 - ieeexplore.ieee.org
Cloud refers to Internet and cloud computing is the new trend of delivering computing
resources via Internet. The Cloud is inflicted by many security concerns among which …

FLNL: Fuzzy entropy and lion neural learner for EDoS attack mitigation in cloud computing

S Bhingarkar, D Shah - International Journal of Modeling …, 2018 - World Scientific
Cloud computing is a technology that allows the end-users to access the network through a
shared area of resources. As the demand for the cloud computing increases, vulnerabilities …

An experimental evaluation of the EDoS-shield mitigation technique for securing the cloud

S Alsowail, MH Sqalli, M Abu-Amara, Z Baig… - Arabian Journal for …, 2016 - Springer
Security of cloud services is of utmost importance for contemporary cloud providers. In
addition to the traditional malicious attacks that have targeted cloud datacenters in the past …

AVDR: a framework for migration policy to handle DDoS attacked VM in cloud

P Verma, S Tapaswi, WW Godfrey - Wireless Personal Communications, 2020 - Springer
The recent trends of Distributed Denial of Service (DDoS) attacks in cloud computing have
revealed a new menace of DDoS attacks called collateral damages on non-target …

[PDF][PDF] Economic denial of sustainability attacks mitigation in the cloud

W Alosaimi, M Zak, K Al-Begain… - International …, 2017 - pure-test.southwales.ac.uk
Cyber security is one of the most attention seeking issues with the increasing advancement
of technology specifically when the network availability is threaten by attacks such as Denial …