2015 7th International Conference on Electronics, Computers and Artificial Intelligence (ECAI) 2015
DOI: 10.1109/ecai.2015.7301202
|View full text |Cite
|
Sign up to set email alerts
|

A slow read attack using cloud

Abstract: Cloud computing relies on sharing computing resources rather than having local servers or personal devices to handle applications. Nowadays, cloud computing has become one of the fastest growing fields in information technology. However, several new security issues of cloud computing have emerged due to its service delivery models. In this paper, we discuss the case of distributed denial-of-service (DDoS) attack using Cloud resources. First, we show how such attack using a cloud platform could not be detected … Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2016
2016
2024
2024

Publication Types

Select...
3
2

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(3 citation statements)
references
References 18 publications
0
3
0
Order By: Relevance
“…Mitigating slow read DDoS attacks to ensure high availability of the web server's resources was explored by Ameyed et al (2015). In their approach, a failure isolation zone that ensured high availability and redundancy in the cloud was implemented by distributing traffic between web servers in two zones.…”
Section: Sdn-based Attack Mitigation Techniquesmentioning
confidence: 99%
See 1 more Smart Citation
“…Mitigating slow read DDoS attacks to ensure high availability of the web server's resources was explored by Ameyed et al (2015). In their approach, a failure isolation zone that ensured high availability and redundancy in the cloud was implemented by distributing traffic between web servers in two zones.…”
Section: Sdn-based Attack Mitigation Techniquesmentioning
confidence: 99%
“…Mitigation of the slow HTTP DDoS attack refers to the use of methods that prevent service degradation or resource exhaustion on the web server when an attack is detected by halting or diminishing the rate of attack (Jaafar et al, 2019;Yeasir et al, 2015). Previous volumetric and slow DDoS attack mitigation techniques include redirecting the traffic to a verifying device as identified in the work by Beigi-Mohammadi et al (2017), Lukaseder et al (2018, and Schehlmann and Baier (2013); limiting the rate of attack, which was used by Bhunia and Gurusamy (2017) and Yuan et al (2017); dropping the attack traffic selectively as explored by Fonseca and Nigam (2016); or spreading the traffic to replicas of the attack victim (Ameyed et al, 2015;Sattar et al, 2016). In view of these mitigation strategies, a global view of the network status and traffic that traverse the network is needed for effective detection and mitigation of slow HTTP DDoS (Lukaseder et al, 2018).…”
Section: Introductionmentioning
confidence: 99%
“…In this attack, the attacker sends legitimate application layer requests but it reads responses very slowly by advertising small TCP receive Window size to conduct a slow communication with the destination. If the attacker can send many requests for a web server, it will reach its maximum capacity and may become unavailable for new requests .…”
Section: Denial‐of‐service On the Cloud Networking Infrastructurementioning
confidence: 99%