2022
DOI: 10.3390/app122312441
|View full text |Cite
|
Sign up to set email alerts
|

Distributed Denial of Service Attacks against Cloud Computing Environment: Survey, Issues, Challenges and Coherent Taxonomy

Abstract: Cloud computing (CC) plays a significant role in revolutionizing the information and communication technology (ICT) industry, allowing flexible delivery of new services and computing resources at a fraction of the costs for end-users than traditional computing. Unfortunately, many potential cyber threats impact CC-deployed services due to the exploitation of CC’s characteristics, such as resource sharing, elasticity, and multi-tenancy. This survey provides a comprehensive discussion on security issues and chal… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
12
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 17 publications
(12 citation statements)
references
References 78 publications
0
12
0
Order By: Relevance
“…Two distinct scenarios are explored to validate the methodology: Standard 5G Operations, which provides a benchmark by exploring the algorithm's performance under ideal conditions, and Sub-Optimal Base Station Performance, which tests the algorithm's resilience and adaptability in less-than-perfect conditions. This approach ensures efficient power allocation and provides a robust framework that maintains reliable communication despite unforeseen network challenges [25].…”
Section: Implementation Methodologymentioning
confidence: 99%
“…Two distinct scenarios are explored to validate the methodology: Standard 5G Operations, which provides a benchmark by exploring the algorithm's performance under ideal conditions, and Sub-Optimal Base Station Performance, which tests the algorithm's resilience and adaptability in less-than-perfect conditions. This approach ensures efficient power allocation and provides a robust framework that maintains reliable communication despite unforeseen network challenges [25].…”
Section: Implementation Methodologymentioning
confidence: 99%
“…Despite the severe implications of such attacks, exemplified by the incidents like the 2017 NotPetya malware outbreak that resulted in billions of USD in global damages through the irreparable compromise of thousands of computers [1], there is significantly less dedicated research on PDoS attacks compared to its temporary counterparts [2]. This lack of systematic study leaves a deep gap in the scientific knowledge, while industries, governments, and individuals remain vulnerable to this specific threat.…”
Section: Introductionmentioning
confidence: 99%
“…As known, there are potential risks associated with cloud computing, like exposure or leakage of data, unauthorized access to data, insider threats, regulatory violations, and others [7][8][9][10]. Also, there are additional challenges that need to be managed to make it more suitable for advanced use cases.…”
Section: Introductionmentioning
confidence: 99%
“…Usually, the optimization problem of the decision leads to a non-convex NP problem, meaning that determining the best strategy for allocating resources is difficult, especially in decentralized environments [32]. If we look at the action space A i in (2) and the reward function R i S i , A i in (8), they form a difficult problem to solve due to the large space size and the constrained reward function. Hence, we formulated the scheduling problem into an optimization problem to satisfy the constraints and to maximize the achieved reward, Q, to the highest possible, as follows:…”
mentioning
confidence: 99%
See 1 more Smart Citation