DDoS attacks in cloud computing: Collateral damage to non-targets
The effects of distributed denial-of-service (DDoS) attacks on cloud computing are not very
similar to those in traditional “fixed” on-premise infrastructure. In the context of DDoS attacks …
similar to those in traditional “fixed” on-premise infrastructure. In the context of DDoS attacks …
Machine learning-based EDoS attack detection technique using execution trace analysis
One of the most important benefits of using cloud computing is the benefit of on-demand
services. Accordingly, the method of payment in the cloud environment is pay per use. This …
services. Accordingly, the method of payment in the cloud environment is pay per use. This …
[PDF][PDF] A comparative analysis of security methods for DDoS attacks in the cloud computing environment
BSK Devi, T Subbulakshmi - Indian Journal of Science and …, 2016 - researchgate.net
Cloud security is of the major concern in the deployment and protection of cloud deployment
models. In this paper, detailed investigations on the recent DDoS attacks and comparative …
models. In this paper, detailed investigations on the recent DDoS attacks and comparative …
Performance modeling and analysis of the EDoS-shield mitigation
Cloud adoption by industry and governments has been on the rise for the past few years due
to the obvious cloud technology advantages that include scalability, reliability, availability …
to the obvious cloud technology advantages that include scalability, reliability, availability …
[HTML][HTML] Towards Yo-Yo attack mitigation in cloud auto-scaling mechanism
Cloud platforms could automatically scale underlying network resources up and down in
response to changes in the traffic load. Such an auto-scaling mechanism can largely …
response to changes in the traffic load. Such an auto-scaling mechanism can largely …
Experimental analysis of DDoS attack and it's detection in Eucalyptus private cloud platform
AH Dar, B Habib, F Khurshid… - … on Advances in …, 2016 - ieeexplore.ieee.org
Cloud refers to Internet and cloud computing is the new trend of delivering computing
resources via Internet. The Cloud is inflicted by many security concerns among which …
resources via Internet. The Cloud is inflicted by many security concerns among which …
FLNL: Fuzzy entropy and lion neural learner for EDoS attack mitigation in cloud computing
S Bhingarkar, D Shah - International Journal of Modeling …, 2018 - World Scientific
Cloud computing is a technology that allows the end-users to access the network through a
shared area of resources. As the demand for the cloud computing increases, vulnerabilities …
shared area of resources. As the demand for the cloud computing increases, vulnerabilities …
An experimental evaluation of the EDoS-shield mitigation technique for securing the cloud
Security of cloud services is of utmost importance for contemporary cloud providers. In
addition to the traditional malicious attacks that have targeted cloud datacenters in the past …
addition to the traditional malicious attacks that have targeted cloud datacenters in the past …
AVDR: a framework for migration policy to handle DDoS attacked VM in cloud
P Verma, S Tapaswi, WW Godfrey - Wireless Personal Communications, 2020 - Springer
The recent trends of Distributed Denial of Service (DDoS) attacks in cloud computing have
revealed a new menace of DDoS attacks called collateral damages on non-target …
revealed a new menace of DDoS attacks called collateral damages on non-target …
[PDF][PDF] Economic denial of sustainability attacks mitigation in the cloud
W Alosaimi, M Zak, K Al-Begain… - International …, 2017 - pure-test.southwales.ac.uk
Cyber security is one of the most attention seeking issues with the increasing advancement
of technology specifically when the network availability is threaten by attacks such as Denial …
of technology specifically when the network availability is threaten by attacks such as Denial …