2017
DOI: 10.1016/j.comcom.2017.03.010
|View full text |Cite
|
Sign up to set email alerts
|

DDoS attacks in cloud computing: Issues, taxonomy, and future directions

Abstract: Security issues related to the cloud computing are relevant to various stakeholders for an informed cloud adoption decision. Apart from data breaches, the cyber security research community is revisiting the attack space for cloud-specific solutions as these issues affect budget, resource management, and service quality. Distributed Denial of Service (DDoS) attack is one such serious attack in the cloud space. In this paper, we present developments related to DDoS attack mitigation solutions in the cloud. In pa… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
112
0

Year Published

2017
2017
2024
2024

Publication Types

Select...
8
2

Relationship

0
10

Authors

Journals

citations
Cited by 243 publications
(112 citation statements)
references
References 70 publications
0
112
0
Order By: Relevance
“…Based on these attributes status pattern, this work proposes a novel framework for detecting DDoS attacks. Legal VMs reveal the similar status patterns and malicious VMs disclose the similar status patterns in a cloud server [8]. Using this technique, malicious VMs are identified and relevant attack behaviors are discovered by applying entropy information theory.…”
Section: *Author For Correspondencementioning
confidence: 99%
“…Based on these attributes status pattern, this work proposes a novel framework for detecting DDoS attacks. Legal VMs reveal the similar status patterns and malicious VMs disclose the similar status patterns in a cloud server [8]. Using this technique, malicious VMs are identified and relevant attack behaviors are discovered by applying entropy information theory.…”
Section: *Author For Correspondencementioning
confidence: 99%
“…EDoS are also tagged in the bibliography as Reduction of Quality (RoQ) threats [13], or Fraudulent Resource Consumption attacks (FRC) [14]. These intrusions take advantage of the "pay-as-you-go" accounting model offered by most of the Cloud Computing providers and their auto-scaling services [15]. Their modus operandi slightly varies depending on the providers and the Cloud solutions they offer (e.g., OpenStack, Microsoft Azure, Amazon EC2, etc.)…”
Section: Economic Denial Of Sustainability Attacksmentioning
confidence: 99%
“…Apart from these, thestudy also discussed the various measures that could be used to evaluate the various solutions defined in the study. To sum up, thestudy provided the guidelines about how to build an effective mechanism for detection of attacks [11].…”
Section: G Soman Et Almentioning
confidence: 99%