Moving Target Defense‐Based Denial‐of‐Service Mitigation in Cloud Environments: A Survey
With the increased frequency and intensity of denial‐of‐service (DoS) attacks on critical
cloud‐hosted services, resource adaptation schemes adopted by the cloud service …
cloud‐hosted services, resource adaptation schemes adopted by the cloud service …
A study on container vulnerability exploit detection
Containers have become increasingly popular for deploying applications in cloud computing
infrastructures. However, recent studies have shown that containers are prone to various …
infrastructures. However, recent studies have shown that containers are prone to various …
Detecting Asymmetric Application-layer {Denial-of-Service} Attacks {In-Flight} with {FineLame}
Denial of service (DoS) attacks increasingly exploit algorithmic, semantic, or implementation
characteristics dormant in victim applications, often with minimal attacker resources …
characteristics dormant in victim applications, often with minimal attacker resources …
Coda: Runtime Detection of Application-Layer CPU-Exhaustion DoS Attacks in Containers
M Zhan, Y Li, H Yang, G Yu, B Li… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
Denial of service (DoS) attacks have increasingly exploited vulnerabilities in algorithms or
implementation methods in application-layer programs. In this type of attack, called CPU …
implementation methods in application-layer programs. In this type of attack, called CPU …
Leader: Defense Against Exploit-Based Denial-of-Service Attacks on Web Applications
Exploit-based denial-of-service attacks (exDoS) are challenging to detect and mitigate.
Rather than flooding the network with excessive traffic, these attacks generate low rates of …
Rather than flooding the network with excessive traffic, these attacks generate low rates of …
Defending web servers against flash crowd attacks
R Tandon, A Palia, J Ramani, B Paulsen… - … Conference on Applied …, 2021 - Springer
A flash crowd attack (FCA) floods a service, such as a Web server, with well-formed
requests, generated by numerous bots. FCA traffic is difficult to filter, since individual attack …
requests, generated by numerous bots. FCA traffic is difficult to filter, since individual attack …
Protecting Online Services from Sophisticated DDOS Attacks
R Tandon - 2022 - search.proquest.com
Distributed denial-of-service (DDoS) attacks are increasing in volume, frequency and
sophistication. Even two decades after the first DDoS attack, there are important challenges …
sophistication. Even two decades after the first DDoS attack, there are important challenges …
Automated detection and mitigation of application-level asymmetric DoS attacks
This paper presents a novel integrated platform for the automatic detection and mitigation of
denial-of-service (DoS) attacks in networked systems. Recently, these attacks have evolved …
denial-of-service (DoS) attacks in networked systems. Recently, these attacks have evolved …
Service Boosters: Library Operating Systems for the Datacenter
HM Demoulin - 2021 - search.proquest.com
Cloud applications are taking an increasingly important place our technology and economic
landscape. Consequently, they are subject to stringent performance requirements. High tail …
landscape. Consequently, they are subject to stringent performance requirements. High tail …
[PDF][PDF] Detecting application-layer denial-of-service attacks with finelame
HM Demoulin, I Pedisich - 2019 USENIX Annual Technical Conference …, 2019 - par.nsf.gov
Denial of service (DoS) attacks increasingly exploit algorithmic, semantic, or implementation
characteristics dormant in victim applications, often with minimal attacker resources …
characteristics dormant in victim applications, often with minimal attacker resources …