DOI: 10.32469/10355/66749
|View full text |Cite
|
Sign up to set email alerts
|

Dolus : cyber defense using pretense against DDoS attacks in cloud platforms

Abstract: Cloud-hosted services are being increasingly used in online businesses in e.g., retail, healthcare, manufacturing, entertainment due to benefits such as scalability and reliability. These benefits are fueled by innovations in orchestration of cloud platforms that make them totally programmable as Software Defined everything Infrastructures (SDxI). At the same time, sophisticated targeted attacks such as Distributed Denial-of-Service (DDoS) are growing on an unprecedented scale threatening the availability of o… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(1 citation statement)
references
References 23 publications
0
1
0
Order By: Relevance
“…Concerning the latter mitigation type, isolation mechanisms have attracted considerable interest in recent years not only to mitigate DDoS attacks from an SDN Controller, 34,35 but also enable learning mechanisms to strengthen detection mechanisms in spotting new types of cyber threats, or adapting the existing ones to new behaviors. In this sense, Neupane et al 36 proposed a learning scheme that can be used during flooding attacks to analyze their features and determine both the cyber‐attack type and where it originates from. Depending on the attack type, defense systems could activate other types of detection mechanisms.…”
Section: Related Workmentioning
confidence: 99%
“…Concerning the latter mitigation type, isolation mechanisms have attracted considerable interest in recent years not only to mitigate DDoS attacks from an SDN Controller, 34,35 but also enable learning mechanisms to strengthen detection mechanisms in spotting new types of cyber threats, or adapting the existing ones to new behaviors. In this sense, Neupane et al 36 proposed a learning scheme that can be used during flooding attacks to analyze their features and determine both the cyber‐attack type and where it originates from. Depending on the attack type, defense systems could activate other types of detection mechanisms.…”
Section: Related Workmentioning
confidence: 99%