Defense mechanisms against DDoS attacks in a cloud computing environment: State-of-the-art and research challenges
N Agrawal, S Tapaswi - IEEE Communications Surveys & …, 2019 - ieeexplore.ieee.org
The salient features of cloud computing (such as on-demand self-service, resource pooling,
broad network access, rapid elasticity, and measured service) are being exploited by …
broad network access, rapid elasticity, and measured service) are being exploited by …
Security data collection and data analytics in the internet: A survey
Attacks over the Internet are becoming more and more complex and sophisticated. How to
detect security threats and measure the security of the Internet arises a significant research …
detect security threats and measure the security of the Internet arises a significant research …
SlowITe, a novel denial of service attack affecting MQTT
Security of the Internet of Things is a crucial topic, due to the criticality of the networks and
the sensitivity of exchanged data. In this paper, we target the Message Queue Telemetry …
the sensitivity of exchanged data. In this paper, we target the Message Queue Telemetry …
Distributed real-time SlowDoS attacks detection over encrypted traffic using Artificial Intelligence
N Garcia, T Alcaniz, A González-Vidal… - Journal of Network and …, 2021 - Elsevier
SlowDoS attacks exploit slow transmissions on application-level protocols like HTTP to carry
out denial of service against web-servers. These attacks are difficult to be detected with …
out denial of service against web-servers. These attacks are difficult to be detected with …
Slow DoS attacks: definition and categorisation
Denial of service (DoS) attacks evolved and consolidated as severe security threats to
network servers, not only for internet service providers but also for governments. Earlier DoS …
network servers, not only for internet service providers but also for governments. Earlier DoS …
Stealthy denial of service strategy in cloud computing
M Ficco, M Rak - IEEE transactions on cloud computing, 2014 - ieeexplore.ieee.org
The success of the cloud computing paradigm is due to its on-demand, self-service, and pay-
by-use nature. According to this paradigm, the effects of Denial of Service (DoS) attacks …
by-use nature. According to this paradigm, the effects of Denial of Service (DoS) attacks …
Sync-millibottleneck attack on microservices cloud architecture
The modern web services landscape is characterized by numerous fine-grained, loosely
coupled microservices with increasingly stringent low-latency requirements. However, this …
coupled microservices with increasingly stringent low-latency requirements. However, this …
Trust management for defending on-off attacks
A trust management scheme can be used to aid an automated decision-making process for
an access control policy. Since unintentional temporary errors are possible, the trust …
an access control policy. Since unintentional temporary errors are possible, the trust …
Slowtt: A slow denial of service against iot networks
The security of Internet of Things environments is a critical and trending topic, due to the
nature of the networks and the sensitivity of the exchanged information. In this paper, we …
nature of the networks and the sensitivity of the exchanged information. In this paper, we …
How secure are web servers? An empirical study of slow HTTP DoS attacks and detection
Slow HTTP Denial of Service (DoS) is an application layer DoS attack in which large number
of incomplete HTTP requests are sent. If number of such open connections in the server …
of incomplete HTTP requests are sent. If number of such open connections in the server …