Distributed denial of service (DDoS) resilience in cloud: Review and conceptual cloud DDoS mitigation framework

O Osanaiye, KKR Choo, M Dlodlo - Journal of Network and Computer …, 2016 - Elsevier
Despite the increasing popularity of cloud services, ensuring the security and availability of
data, resources and services remains an ongoing research challenge. Distributed denial of …

Comprehensive review of artificial intelligence and statistical approaches in distributed denial of service attack and defense methods

BA Khalaf, SA Mostafa, A Mustapha… - IEEE …, 2019 - ieeexplore.ieee.org
Until now, an effective defense method against Distributed Denial of Service (DDoS) attacks
is yet to be offered by security systems. Incidents of serious damage due to DDoS attacks …

Security threats, defense mechanisms, challenges, and future directions in cloud computing

S El Kafhali, I El Mir, M Hanini - Archives of Computational Methods in …, 2022 - Springer
Several new technologies such as the smart cities, the Internet of Things (IoT), and 5G
Internet need services offered by cloud computing for processing and storing more …

Mitigating TCP SYN flooding based EDOS attack in cloud computing environment using binomial distribution in SDN

SQA Shah, FZ Khan, M Ahmad - Computer Communications, 2022 - Elsevier
Cloud Computing provides an auto-scaling feature for dynamic resource utilization to cope
with their customers' requirements and charge as 'pay-per-use'. Attackers get the benefit of …

The impact and mitigation of ICMP based economic denial of sustainability attack in cloud computing environment using software defined network

SQA Shah, FZ Khan, M Ahmad - Computer Networks, 2021 - Elsevier
High availability in network services is a crucial requirement for quality of experience. Denial
of Service (DoS) and Distribute Denial of Service (DDoS) attacks are under contemplation …

Secured sharing of data in cloud via dual authentication, dynamic unidirectional PRE, and CPABE

N Agarwal, A Rana, JP Pandey… - International Journal of …, 2020 - igi-global.com
Cloud computing is an emergent computing paradigm; however, data security is a significant
issue in recent time while outsourcing the data to the cloud preventing users to upload their …

A lightweight approach to detect the low/high rate IP spoofed cloud DDoS attacks

N Agrawal, S Tapaswi - … on cloud and service computing (SC2), 2017 - ieeexplore.ieee.org
In cloud computing, broadly two facets of Distributed Denial-of-Service (DDoS) attack exist.
The attacker uses Internet Protocol (IP) spoofing technique for launching the DDoS attack to …

Classification of SSL servers based on their SSL handshake for automated security assessment

S Pukkawanna, G Blanc, J Garcia-Alfaro… - … on building analysis …, 2014 - ieeexplore.ieee.org
The Secure Socket Layer (SSL) and Transport Layer Security (TLS) are the most widely
deployed security protocols used in systems required to secure information such as online …

[PDF][PDF] How to evaluate the defense against dos and ddos attacks in cloud computing: a survey and taxonomy

T Halabi, M Bellaiche - … Journal of Computer Science and Information …, 2016 - academia.edu
Security is one of the obstacles preventing the full migration towards Cloud Computing.
Denial of Service attacks are serious threats to the Cloud security, and current research is …

Application of Artificial Intelligence in the Recruitment Process of HRM

RC Goswami, H Joshi, S Gautam - … Intelligence Techniques in …, 2023 - taylorfrancis.com
Human resources management (HRM) is a management function that focuses on hiring,
motivating, and retaining employees in a company. It concentrates on the people who work …