2021
DOI: 10.1016/j.cosrev.2020.100332
|View full text |Cite
|
Sign up to set email alerts
|

Distributed denial of service attacks in cloud: State-of-the-art of scientific and commercial solutions

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
16
0
1

Year Published

2021
2021
2024
2024

Publication Types

Select...
5
5

Relationship

0
10

Authors

Journals

citations
Cited by 53 publications
(17 citation statements)
references
References 35 publications
0
16
0
1
Order By: Relevance
“…In general, the traceability of a DoS cyber-attack is summarized in applications that can provide a log based on the responses of signatures or alerts caused by an anomalous event. In [ 50 ], it is concluded that most of the evidences that can be useful to examine such attack are those based on anomalies, since they allow observing those patterns that deviate from a base profile.…”
Section: Proposed Methodologymentioning
confidence: 99%
“…In general, the traceability of a DoS cyber-attack is summarized in applications that can provide a log based on the responses of signatures or alerts caused by an anomalous event. In [ 50 ], it is concluded that most of the evidences that can be useful to examine such attack are those based on anomalies, since they allow observing those patterns that deviate from a base profile.…”
Section: Proposed Methodologymentioning
confidence: 99%
“…As per the last two-decade research work regarding web application attacks and OWASP top 10 attack reports of 2013 and 2016 [26,27], the SQL injection attack is at top of all. is attack is more dangerous for web applications in the form of information stealing, DoS attack [28], system crashing, alteration in database records to insert the fake information, traffic redirection, and getting root rights of system.…”
Section: Crashing Database Servermentioning
confidence: 99%
“…A CDN is certainly a powerful tool and the fact that major CDN operators are mostly US-based could be a key reason for the large adoption of CDNs in the US dataset but not in the other datasets. A broader analysis of the technological solutions available for defending against denial of service attacks in cloud environments and in data can be found in [56], while techniques for discriminating between denial of service attacks and sudden, massive usage of services are analyzed in [57,58].…”
Section: Distribution Across Network and Autonomous Systemsmentioning
confidence: 99%