Defense mechanisms against DDoS attacks in a cloud computing environment: State-of-the-art and research challenges

N Agrawal, S Tapaswi - IEEE Communications Surveys & …, 2019 - ieeexplore.ieee.org
The salient features of cloud computing (such as on-demand self-service, resource pooling,
broad network access, rapid elasticity, and measured service) are being exploited by …

Detecting HTTP-based application layer DoS attacks on web servers in the presence of sampling

HH Jazi, H Gonzalez, N Stakhanova, AA Ghorbani - Computer Networks, 2017 - Elsevier
A recent escalation of application layer Denial of Service (DoS) attacks on the Internet has
quickly shifted the interest of the research community traditionally focused on network-based …

[HTML][HTML] HTTP flood attack detection in application layer using machine learning metrics and bio inspired bat algorithm

I Sreeram, VPK Vuppala - Applied computing and informatics, 2019 - Elsevier
The internet network is mostly victimized to the Distributed Denial of Service (DDOS) attack,
which is one that intentionally occupies the computing resources and bandwidth in order to …

Analysis and detection of DDoS attacks on cloud computing environment using machine learning techniques

AR Wani, QP Rana, U Saxena… - 2019 Amity International …, 2019 - ieeexplore.ieee.org
The primary benefit of the cloud is that it elastically scales to meet variable demand and it
provides the environment which scales up and scales down instantly according to the …

Detection and mitigation of low-rate denial-of-service attacks: A survey

VDM Rios, PRM Inácio, D Magoni, MM Freire - IEEE Access, 2022 - ieeexplore.ieee.org
The potential for being the target of Denial of Service (DoS) attacks is one of the most severe
security threats on the Internet. Attackers have been modifying their attack format over the …

TII-SSRC-23 dataset: typological exploration of diverse traffic patterns for intrusion detection

D Herzalla, WT Lunardi, M Andreoni - IEEE Access, 2023 - ieeexplore.ieee.org
The effectiveness of network intrusion detection systems, predominantly based on machine
learning, is highly influenced by the dataset they are trained on. Ensuring an accurate …

[HTML][HTML] Flow level detection and filtering of low-rate DDoS

C Zhang, Z Cai, W Chen, X Luo, J Yin - Computer Networks, 2012 - Elsevier
The recently proposed TCP-targeted Low-rate Distributed Denial-of-Service (LDDoS)
attacks send fewer packets to attack legitimate flows by exploiting the vulnerability in TCP's …

Slow DoS attacks: definition and categorisation

E Cambiaso, G Papaleo, G Chiola… - International Journal of …, 2013 - inderscienceonline.com
Denial of service (DoS) attacks evolved and consolidated as severe security threats to
network servers, not only for internet service providers but also for governments. Earlier DoS …

How secure are web servers? An empirical study of slow HTTP DoS attacks and detection

N Tripathi, N Hubballi, Y Singh - 2016 11th International …, 2016 - ieeexplore.ieee.org
Slow HTTP Denial of Service (DoS) is an application layer DoS attack in which large number
of incomplete HTTP requests are sent. If number of such open connections in the server …

Taxonomy of slow DoS attacks to web applications

E Cambiaso, G Papaleo, M Aiello - … 2012, Trivandrum, India, October 11-12 …, 2012 - Springer
In the last years, Denial of Service (DoS) attacks have been widely spreaded becoming a
more than ever relevant threat to network security. DoS attacks evolved from flood to low …