Defense mechanisms against DDoS attacks in a cloud computing environment: State-of-the-art and research challenges

N Agrawal, S Tapaswi - IEEE Communications Surveys & …, 2019 - ieeexplore.ieee.org
The salient features of cloud computing (such as on-demand self-service, resource pooling,
broad network access, rapid elasticity, and measured service) are being exploited by …

A survey of low rate ddos detection techniques based on machine learning in software-defined networks

AA Alashhab, MSM Zahid, MA Azim, MY Daha… - Symmetry, 2022 - mdpi.com
Software-defined networking (SDN) is a new networking paradigm that provides centralized
control, programmability, and a global view of topology in the controller. SDN is becoming …

A flexible SDN-based architecture for identifying and mitigating low-rate DDoS attacks using machine learning

JA Perez-Diaz, IA Valdovinos, KKR Choo, D Zhu - IEEE Access, 2020 - ieeexplore.ieee.org
While there have been extensive studies of denial of service (DoS) attacks and DDoS attack
mitigation, such attacks remain challenging to mitigate. For example, Low-Rate DDoS (LR …

Realtime robust malicious traffic detection via frequency domain analysis

C Fu, Q Li, M Shen, K Xu - Proceedings of the 2021 ACM SIGSAC …, 2021 - dl.acm.org
Machine learning (ML) based malicious traffic detection is an emerging security paradigm,
particularly for zero-day attack detection, which is complementary to existing rule based …

{FlowRadar}: A better {NetFlow} for data centers

Y Li, R Miao, C Kim, M Yu - 13th USENIX symposium on networked …, 2016 - usenix.org
NetFlow has been a widely used monitoring tool with a variety of applications. NetFlow
maintains an active working set of flows in a hash table that supports flow insertion, collision …

Low-rate DoS attacks, detection, defense, and challenges: A survey

W Zhijun, L Wen**g, L Liang, Y Meng - IEEE access, 2020 - ieeexplore.ieee.org
Low-rate Denial of service (LDoS) attacks has become one of the biggest threats to the
Internet, cloud computing platforms, and big data centers. As an evolutionary species of …

[PDF][PDF] N degrees of separation: multi-dimensional separation of concerns

P Tarr, H Ossher, W Harrison, SM Sutton Jr - Proceedings of the 21st …, 1999 - dl.acm.org
Done well, separation of concerns can provide many software engineering benefits,
including reduced complexity, im-proved reusability, and simpler evolution. The choice of …

Detection of reduction-of-quality DDoS attacks using Fuzzy Logic and machine learning algorithms

V de Miranda Rios, PRM Inácio, D Magoni… - Computer Networks, 2021 - Elsevier
Abstract Distributed Denial of Service (DDoS) attacks are still among the most dangerous
attacks on the Internet. With the advance of methods for detecting and mitigating these …

{EyeQ}: Practical network performance isolation at the edge

V Jeyakumar, M Alizadeh, D Mazières… - … USENIX Symposium on …, 2013 - usenix.org
The datacenter network is shared among untrusted tenants in a public cloud, and hundreds
of services in a private cloud. Today we lack fine-grained control over network bandwidth …

An efficient DDoS TCP flood attack detection and prevention system in a cloud environment

A Sahi, D Lai, Y Li, M Diykh - IEEE Access, 2017 - ieeexplore.ieee.org
Although the number of cloud projects has dramatically increased over the last few years,
ensuring the availability and security of project data, services, and resources is still a crucial …