Distributed denial of service (DDoS) resilience in cloud: Review and conceptual cloud DDoS mitigation framework
Despite the increasing popularity of cloud services, ensuring the security and availability of
data, resources and services remains an ongoing research challenge. Distributed denial of …
data, resources and services remains an ongoing research challenge. Distributed denial of …
A survey on cloud computing security: Issues, threats, and solutions
Over the internet, the cloud computing reveals a remarkable potential to provide on-demand
services to consumers with greater flexibility in a cost effective manner. While moving …
services to consumers with greater flexibility in a cost effective manner. While moving …
A survey on distributed denial of service (DDoS) attacks in SDN and cloud computing environments
S Dong, K Abbas, R Jain - IEEE Access, 2019 - ieeexplore.ieee.org
Recently, software defined networks (SDNs) and cloud computing have been widely
adopted by researchers and industry. However, widespread acceptance of these novel …
adopted by researchers and industry. However, widespread acceptance of these novel …
DDoS detection system: Using a set of classification algorithms controlled by fuzzy logic system in apache spark
A Alsirhani, S Sampalli… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
Distributed denial of service (DDoS) attacks are a major security threat against the
availability of conventional or cloud computing resources. Numerous DDoS attacks, which …
availability of conventional or cloud computing resources. Numerous DDoS attacks, which …
A cloud computing based network monitoring and threat detection system for critical infrastructures
Critical infrastructure systems perform functions and missions that are essential for our
national economy, health, and security. These functions are vital to commerce, government …
national economy, health, and security. These functions are vital to commerce, government …
Towards Large‐Scale, Heterogeneous Anomaly Detection Systems in Industrial Networks: A Survey of Current Trends
Industrial Networks (INs) are widespread environments where heterogeneous devices
collaborate to control and monitor physical processes. Some of the controlled processes …
collaborate to control and monitor physical processes. Some of the controlled processes …
Mitigating TCP SYN flooding based EDOS attack in cloud computing environment using binomial distribution in SDN
Cloud Computing provides an auto-scaling feature for dynamic resource utilization to cope
with their customers' requirements and charge as 'pay-per-use'. Attackers get the benefit of …
with their customers' requirements and charge as 'pay-per-use'. Attackers get the benefit of …
A survey on the security of cloud computing
L Alhenaki, A Alwatban, B Alamri… - 2019 2nd international …, 2019 - ieeexplore.ieee.org
Within the recent decade, major innovations in technology have emerged, that potentially
add more convenience to daily life practices not only on an enterprise level but on an …
add more convenience to daily life practices not only on an enterprise level but on an …
Detection of ddos attacks in openstack-based private cloud using apache spark
Security is a critical concern for cloud service providers. Distributed denial of service (DDoS)
attacks are the most frequent of all cloud security threats, and the consequences of damage …
attacks are the most frequent of all cloud security threats, and the consequences of damage …
An anomaly-based framework for mitigating effects of DDoS attacks using a third party auditor in cloud computing environments
S Mahdavi Hezavehi, R Rahmani - Cluster Computing, 2020 - Springer
Today, the providers of cloud computing services are among the most prominent service
suppliers worldwide. Availability of cloud services is one of the most important concerns of …
suppliers worldwide. Availability of cloud services is one of the most important concerns of …