Distributed denial of service attacks against cloud computing environment: survey, issues, challenges and coherent taxonomy

ZR Alashhab, M Anbar, MM Singh, IH Hasbullah… - Applied Sciences, 2022 - mdpi.com
Cloud computing (CC) plays a significant role in revolutionizing the information and
communication technology (ICT) industry, allowing flexible delivery of new services and …

[PDF][PDF] Soft computing based autonomous low rate DDOS attack detection and security for cloud computing

SR Mugunthan - J. Soft Comput. Paradig.(JSCP), 2019 - scholar.archive.org
The fundamental advantage of the cloud environment is its instant scalability in rendering
the service according to the various demands. The recent technological growth in the cloud …

An OpenStack based cloud testbed framework for evaluating HTTP flooding attacks

A Dhanapal, P Nithyanandam - Wireless Networks, 2021 - Springer
The cloud computing has inherent challenges to detect the Hyper Text Transfer Protocol
(HTTP) flooding Distributed Denial of Service (DDoS) attack due to its natural characteristics …

[PDF][PDF] A survey on mitigation techniques against ddos attacks on cloud computing architecture

A Bakr, A El-Aziz, HA Hefny - International Journal of Advanced …, 2019 - researchgate.net
Abstract Service availability is one of the most important aspects of cloud environments. The
threat to availability of Distributed Denial of Service (DDoS) attacks plays an important role …

DDoS attack detection and mitigation techniques in cloud computing environment

BSK Devi, T Subbulakshmi - 2017 International Conference on …, 2017 - ieeexplore.ieee.org
Cloud computing is the emerging technology and most of the IT enabled services are
operating in this platform. In the recent era, the internet infrastructure relies on the cloud for …

A Survey of the Security and DDoS Attacks in the Software Defined Network

A Tahirou, K Konate - The Proceedings of the International Conference on …, 2022 - Springer
Abstract The Software Defined Network (SDN) is a new network paradigm aimed at making
it easier to manage and operate computer networks. SDN is becoming more and more …

Cloud-based DDoS attack detection and defence system using statistical approach

BSK Devi, T Subbulakshmi - International Journal of …, 2019 - inderscienceonline.com
In the recent era, business and IT domain rely on the cloud as it has evolved as the potential
service model and lots of people jumped on the bandwagon to seek profit out of the cloud …

Security of solar radiation management geoengineering

A Lockley - Frontiers of Engineering Management, 2019 - Springer
Abstract Solar Radiation Management (SRM) geoengineering is a proposed response to
anthropogenic global warming (AGW)(National Academy of Sciences, 2015). There may be …

BotNet-Inspired HTTP-Based DDoS Attack Prevention Using Supervised Machine Learning Algorithms in Internet of Things Devices

JET Akinsola, SA Ajagbe, AO Lawal… - 2024 IEEE …, 2024 - ieeexplore.ieee.org
DDoS attacks have emerged as the most serious Internet risks, causing significant damage
to businesses and governments. This study utilized the BoT-IoT dataset obtained from the …

[PDF][PDF] A review on various DPM traceback schemes to detect DDoS attacks

S Suresh, NS Ram - Indian Journal of Science …, 2016 - sciresol.s3.us-east-2.amazonaws …
Objectives: Network security deals with the various attacks, in which distributed denial of
service (DDoS) is a kind of attacks are thriving every day in networks. The specified users of …