Defense mechanisms against DDoS attacks in a cloud computing environment: State-of-the-art and research challenges
N Agrawal, S Tapaswi - IEEE Communications Surveys & …, 2019 - ieeexplore.ieee.org
The salient features of cloud computing (such as on-demand self-service, resource pooling,
broad network access, rapid elasticity, and measured service) are being exploited by …
broad network access, rapid elasticity, and measured service) are being exploited by …
A survey of low rate ddos detection techniques based on machine learning in software-defined networks
Software-defined networking (SDN) is a new networking paradigm that provides centralized
control, programmability, and a global view of topology in the controller. SDN is becoming …
control, programmability, and a global view of topology in the controller. SDN is becoming …
A flexible SDN-based architecture for identifying and mitigating low-rate DDoS attacks using machine learning
While there have been extensive studies of denial of service (DoS) attacks and DDoS attack
mitigation, such attacks remain challenging to mitigate. For example, Low-Rate DDoS (LR …
mitigation, such attacks remain challenging to mitigate. For example, Low-Rate DDoS (LR …
Realtime robust malicious traffic detection via frequency domain analysis
Machine learning (ML) based malicious traffic detection is an emerging security paradigm,
particularly for zero-day attack detection, which is complementary to existing rule based …
particularly for zero-day attack detection, which is complementary to existing rule based …
{FlowRadar}: A better {NetFlow} for data centers
NetFlow has been a widely used monitoring tool with a variety of applications. NetFlow
maintains an active working set of flows in a hash table that supports flow insertion, collision …
maintains an active working set of flows in a hash table that supports flow insertion, collision …
Low-rate DoS attacks, detection, defense, and challenges: A survey
W Zhijun, L Wen**g, L Liang, Y Meng - IEEE access, 2020 - ieeexplore.ieee.org
Low-rate Denial of service (LDoS) attacks has become one of the biggest threats to the
Internet, cloud computing platforms, and big data centers. As an evolutionary species of …
Internet, cloud computing platforms, and big data centers. As an evolutionary species of …
[PDF][PDF] N degrees of separation: multi-dimensional separation of concerns
P Tarr, H Ossher, W Harrison, SM Sutton Jr - Proceedings of the 21st …, 1999 - dl.acm.org
Done well, separation of concerns can provide many software engineering benefits,
including reduced complexity, im-proved reusability, and simpler evolution. The choice of …
including reduced complexity, im-proved reusability, and simpler evolution. The choice of …
Detection of reduction-of-quality DDoS attacks using Fuzzy Logic and machine learning algorithms
Abstract Distributed Denial of Service (DDoS) attacks are still among the most dangerous
attacks on the Internet. With the advance of methods for detecting and mitigating these …
attacks on the Internet. With the advance of methods for detecting and mitigating these …
{EyeQ}: Practical network performance isolation at the edge
The datacenter network is shared among untrusted tenants in a public cloud, and hundreds
of services in a private cloud. Today we lack fine-grained control over network bandwidth …
of services in a private cloud. Today we lack fine-grained control over network bandwidth …
An efficient DDoS TCP flood attack detection and prevention system in a cloud environment
Although the number of cloud projects has dramatically increased over the last few years,
ensuring the availability and security of project data, services, and resources is still a crucial …
ensuring the availability and security of project data, services, and resources is still a crucial …