[HTML][HTML] Advancements in detecting, preventing, and mitigating DDoS attacks in cloud environments: A comprehensive systematic review of state-of-the-art …
This comprehensive study examines cutting-edge strategies for combating Distributed
Denial of Service (DDoS) attacks in cloud environments, addressing a critical gap in recent …
Denial of Service (DDoS) attacks in cloud environments, addressing a critical gap in recent …
SDN-Defend: a lightweight online attack detection and mitigation system for DDoS attacks in SDN
J Wang, L Wang - Sensors, 2022 - mdpi.com
With the development of Software Defined Networking (SDN), its security is becoming
increasingly important. Since SDN has the characteristics of centralized management and …
increasingly important. Since SDN has the characteristics of centralized management and …
Uncovering collateral damages and advanced defense strategies in cloud environments against DDoS attacks: A comprehensive review
Cloud computing (CC) offers on‐demand computing and resources to users, and
organizations, and is also used in many human‐centric intelligent systems. Attacks in cloud …
organizations, and is also used in many human‐centric intelligent systems. Attacks in cloud …
A lightweight mitigation approach against a new inundation attack in RPL-based IoT networks
Internet of Things (IoT) networks are being widely deployed for a broad range of critical
applications. Without effective security support, such a trend would open the doors to …
applications. Without effective security support, such a trend would open the doors to …
[HTML][HTML] Modeling time-varying wide-scale distributed denial of service attacks on electric vehicle charging Stations
With the continuous development of transportation electrification, Electric Vehicle Charging
Stations (EVCS) have become pivotal components, necessitating robust cybersecurity …
Stations (EVCS) have become pivotal components, necessitating robust cybersecurity …
Quantum walks-based classification model with resistance for cloud computing attacks
X Wu, Z **, J Zhou, C Duan - Expert Systems with Applications, 2023 - Elsevier
Cloud computing is considerably investigable and adoptable in both industry and academia,
and Software Defined Networking (SDN) has been applied in cloud computing. Although …
and Software Defined Networking (SDN) has been applied in cloud computing. Although …
An information security engineering framework for modeling packet filtering firewall using neutrosophic petri nets
Due to the Internet's explosive growth, network security is now a major concern; as a result,
tracking network traffic is essential for a variety of uses, including improving system …
tracking network traffic is essential for a variety of uses, including improving system …
I-MPaFS: enhancing EDoS attack detection in cloud computing through a data-driven approach
Cloud computing offers cost-effective IT solutions but is susceptible to security threats,
particularly the Economic Denial of Sustainability (EDoS) attack. EDoS exploits cloud …
particularly the Economic Denial of Sustainability (EDoS) attack. EDoS exploits cloud …
[BOOK][B] Multi-fractal traffic and anomaly detection in computer communications
M Li - 2022 - taylorfrancis.com
This book provides a comprehensive theory of mono-and multi-fractal traffic, including the
basics of long-range dependent time series and 1/f noise, ergodicity and predictability of …
basics of long-range dependent time series and 1/f noise, ergodicity and predictability of …
[PDF][PDF] Securing Cloud Computing from Flash Crowd Attack Using Ensemble Intrusion Detection System.
Flash Crowd attacks are a form of Distributed Denial of Service (DDoS) attack that is
becoming increasingly difficult to detect due to its ability to imitate normal user behavior in …
becoming increasingly difficult to detect due to its ability to imitate normal user behavior in …