Defense mechanisms against DDoS attacks in a cloud computing environment: State-of-the-art and research challenges

N Agrawal, S Tapaswi - IEEE Communications Surveys & …, 2019 - ieeexplore.ieee.org
The salient features of cloud computing (such as on-demand self-service, resource pooling,
broad network access, rapid elasticity, and measured service) are being exploited by …

Security data collection and data analytics in the internet: A survey

X **g, Z Yan, W Pedrycz - IEEE Communications Surveys & …, 2018 - ieeexplore.ieee.org
Attacks over the Internet are becoming more and more complex and sophisticated. How to
detect security threats and measure the security of the Internet arises a significant research …

SlowITe, a novel denial of service attack affecting MQTT

I Vaccari, M Aiello, E Cambiaso - Sensors, 2020 - mdpi.com
Security of the Internet of Things is a crucial topic, due to the criticality of the networks and
the sensitivity of exchanged data. In this paper, we target the Message Queue Telemetry …

Distributed real-time SlowDoS attacks detection over encrypted traffic using Artificial Intelligence

N Garcia, T Alcaniz, A González-Vidal… - Journal of Network and …, 2021 - Elsevier
SlowDoS attacks exploit slow transmissions on application-level protocols like HTTP to carry
out denial of service against web-servers. These attacks are difficult to be detected with …

Slow DoS attacks: definition and categorisation

E Cambiaso, G Papaleo, G Chiola… - International Journal of …, 2013 - inderscienceonline.com
Denial of service (DoS) attacks evolved and consolidated as severe security threats to
network servers, not only for internet service providers but also for governments. Earlier DoS …

Stealthy denial of service strategy in cloud computing

M Ficco, M Rak - IEEE transactions on cloud computing, 2014 - ieeexplore.ieee.org
The success of the cloud computing paradigm is due to its on-demand, self-service, and pay-
by-use nature. According to this paradigm, the effects of Denial of Service (DoS) attacks …

Sync-millibottleneck attack on microservices cloud architecture

X Gu, Q Wang, Q Yan, J Liu, C Pu - Proceedings of the 19th ACM ASIA …, 2024 - dl.acm.org
The modern web services landscape is characterized by numerous fine-grained, loosely
coupled microservices with increasingly stringent low-latency requirements. However, this …

Trust management for defending on-off attacks

Y Chae, LC DiPippo, YL Sun - IEEE Transactions on Parallel …, 2014 - ieeexplore.ieee.org
A trust management scheme can be used to aid an automated decision-making process for
an access control policy. Since unintentional temporary errors are possible, the trust …

Slowtt: A slow denial of service against iot networks

I Vaccari, M Aiello, E Cambiaso - Information, 2020 - mdpi.com
The security of Internet of Things environments is a critical and trending topic, due to the
nature of the networks and the sensitivity of the exchanged information. In this paper, we …

How secure are web servers? An empirical study of slow HTTP DoS attacks and detection

N Tripathi, N Hubballi, Y Singh - 2016 11th International …, 2016 - ieeexplore.ieee.org
Slow HTTP Denial of Service (DoS) is an application layer DoS attack in which large number
of incomplete HTTP requests are sent. If number of such open connections in the server …