2016
DOI: 10.1016/j.jnca.2016.01.001
|View full text |Cite
|
Sign up to set email alerts
|

Distributed denial of service (DDoS) resilience in cloud: Review and conceptual cloud DDoS mitigation framework

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
128
0
2

Year Published

2016
2016
2024
2024

Publication Types

Select...
8
1

Relationship

0
9

Authors

Journals

citations
Cited by 275 publications
(130 citation statements)
references
References 83 publications
0
128
0
2
Order By: Relevance
“…Reference [37] proposed a conceptual cloud DDOS change-point detection mechanism as a means to detecting and preventing DDOS attacks. The technique consists of a change point detection, a packet inter-arrival time (IAT), and a flow based classifier (FBC).…”
Section: Change-point Detection Framework In the Cloudmentioning
confidence: 99%
See 1 more Smart Citation
“…Reference [37] proposed a conceptual cloud DDOS change-point detection mechanism as a means to detecting and preventing DDOS attacks. The technique consists of a change point detection, a packet inter-arrival time (IAT), and a flow based classifier (FBC).…”
Section: Change-point Detection Framework In the Cloudmentioning
confidence: 99%
“…The technique is still in its conceptual stage and not practically tested but claims that by reading a packet header to determine its source and destination addresses, it will be possible to determine the packet inter-arrival time of packets from the same source and hence easy to detect any anomalies in packet transmission. A probable demerit with the approach is the possibility of high rates of false negatives and false positives [37].…”
Section: Change-point Detection Framework In the Cloudmentioning
confidence: 99%
“…However, it searches the space of all possible patterns for rules that meet the user-specified support and confidence thresholds. As an output, it generates new global actions response like rule or signature, which will be used by NIDS and Firewall [19]. A Responses Generation Algorithm may result in a large number of rules, which may turn out to be unusable or inapplicable for analysis.…”
Section: ) Responses Generation Algorithmmentioning
confidence: 99%
“…Issues related to cloud security are relevant to the various stakeholders as follows; decision-making on cloud adoption [6], resource management and service quality delivery [7,8], Distributed Denial of Service (DDoS) attacks [9][10][11], fatal attacks [12], machine learning-based cloud security [13], Threat and Risk Management (TRM) schemes [14], an integrated cloud incident handling and forensics model [15], a cross tenant access control model [16], and so on.…”
Section: Introductionmentioning
confidence: 99%