Defense mechanisms against DDoS attacks in a cloud computing environment: State-of-the-art and research challenges

N Agrawal, S Tapaswi - IEEE Communications Surveys & …, 2019 - ieeexplore.ieee.org
The salient features of cloud computing (such as on-demand self-service, resource pooling,
broad network access, rapid elasticity, and measured service) are being exploited by …

Comprehensive review of artificial intelligence and statistical approaches in distributed denial of service attack and defense methods

BA Khalaf, SA Mostafa, A Mustapha… - IEEE …, 2019 - ieeexplore.ieee.org
Until now, an effective defense method against Distributed Denial of Service (DDoS) attacks
is yet to be offered by security systems. Incidents of serious damage due to DDoS attacks …

A flexible SDN-based architecture for identifying and mitigating low-rate DDoS attacks using machine learning

JA Perez-Diaz, IA Valdovinos, KKR Choo, D Zhu - IEEE Access, 2020 - ieeexplore.ieee.org
While there have been extensive studies of denial of service (DoS) attacks and DDoS attack
mitigation, such attacks remain challenging to mitigate. For example, Low-Rate DDoS (LR …

Transport and application layer DDoS attacks detection to IoT devices by using machine learning and deep learning models

JG Almaraz-Rivera, JA Perez-Diaz… - Sensors, 2022 - mdpi.com
From smart homes to industrial environments, the IoT is an ally to easing daily activities,
where some of them are critical. More and more devices are connected to and through the …

Flow-based intrusion detection: Techniques and challenges

MF Umer, M Sher, Y Bi - Computers & Security, 2017 - Elsevier
Flow-based intrusion detection is an innovative way of detecting intrusions in high-speed
networks. Flow-based intrusion detection only inspects the packet header and does not …

Detection of reduction-of-quality DDoS attacks using Fuzzy Logic and machine learning algorithms

V de Miranda Rios, PRM Inácio, D Magoni… - Computer Networks, 2021 - Elsevier
Abstract Distributed Denial of Service (DDoS) attacks are still among the most dangerous
attacks on the Internet. With the advance of methods for detecting and mitigating these …

Security data collection and data analytics in the internet: A survey

X **g, Z Yan, W Pedrycz - IEEE Communications Surveys & …, 2018 - ieeexplore.ieee.org
Attacks over the Internet are becoming more and more complex and sophisticated. How to
detect security threats and measure the security of the Internet arises a significant research …

Detecting distributed denial of service attacks: methods, tools and future directions

MH Bhuyan, HJ Kashyap… - The Computer …, 2014 - ieeexplore.ieee.org
Distributed denial of service (DDoS) attack is a coordinated attack, generally performed on a
massive scale on the availability of services of a target system or network resources. Owing …

Efficient DDoS flood attack detection using dynamic thresholding on flow-based network traffic

J David, C Thomas - Computers & Security, 2019 - Elsevier
Internet applications are used in various sectors as it contributes in enhancing the system
usage in many respects. However, the interconnected computer systems and networks are …

RSU-based online intrusion detection and mitigation for VANET

A Haydari, Y Yilmaz - Sensors, 2022 - mdpi.com
Secure vehicular communication is a critical factor for secure traffic management. Effective
security in intelligent transportation systems (ITS) requires effective and timely intrusion …