Toward proactive, adaptive defense: A survey on moving target defense
Reactive defense mechanisms, such as intrusion detection systems, have made significant
efforts to secure a system or network for the last several decades. However, the nature of …
efforts to secure a system or network for the last several decades. However, the nature of …
DDoS attacks in cloud computing: Issues, taxonomy, and future directions
Security issues related to the cloud computing are relevant to various stakeholders for an
informed cloud adoption decision. Apart from data breaches, the cyber security research …
informed cloud adoption decision. Apart from data breaches, the cyber security research …
A survey of distributed denial-of-service attack, prevention, and mitigation techniques
Distributed denial-of-service is one kind of the most highlighted and most important attacks
of today's cyberworld. With simple but extremely powerful attack mechanisms, it introduces …
of today's cyberworld. With simple but extremely powerful attack mechanisms, it introduces …
Defense mechanisms against DDoS attacks in a cloud computing environment: State-of-the-art and research challenges
N Agrawal, S Tapaswi - IEEE Communications Surveys & …, 2019 - ieeexplore.ieee.org
The salient features of cloud computing (such as on-demand self-service, resource pooling,
broad network access, rapid elasticity, and measured service) are being exploited by …
broad network access, rapid elasticity, and measured service) are being exploited by …
FUPE: A security driven task scheduling approach for SDN-based IoT–Fog networks
Fog computing is a paradigm to overcome the cloud computing limitations which provides
low latency to the users' applications for the Internet of Things (IoT). Software-defined …
low latency to the users' applications for the Internet of Things (IoT). Software-defined …
Moving target defense techniques: A survey
C Lei, HQ Zhang, JL Tan, YC Zhang… - Security and …, 2018 - Wiley Online Library
As an active defense technique to change asymmetry in cyberattack‐defense confrontation,
moving target defense research has become one of the hot spots. In order to gain better …
moving target defense research has become one of the hot spots. In order to gain better …
An efficient IDS framework for DDoS attacks in SDN environment
JE Varghese, B Muniyal - IEEE Access, 2021 - ieeexplore.ieee.org
The rapid usage of the Internet for the last few decades has lead to the deployment of high-
speed networks in commercial and educational institutions. As network traffic is increasing …
speed networks in commercial and educational institutions. As network traffic is increasing …
SkyShield: A sketch-based defense system against application layer DDoS attacks
Application layer distributed denial of service (DDoS) attacks have become a severe threat
to the security of web servers. These attacks evade most intrusion prevention systems by …
to the security of web servers. These attacks evade most intrusion prevention systems by …
D-FACE: An anomaly based distributed approach for early detection of DDoS attacks and flash events
In the present computer era, though the Internet-based applications are the driving force of
social evolution, yet its architectural vulnerabilities proffer plethoric leisure to the attackers …
social evolution, yet its architectural vulnerabilities proffer plethoric leisure to the attackers …
OverWatch: a cross‐plane DDoS attack defense framework with collaborative intelligence in SDN
B Han, X Yang, Z Sun, J Huang… - Security and …, 2018 - Wiley Online Library
Distributed Denial of Service (DDoS) attacks are one of the biggest concerns for security
professionals. Traditional middle‐box based DDoS attack defense is lack of network‐wide …
professionals. Traditional middle‐box based DDoS attack defense is lack of network‐wide …