2018
DOI: 10.1007/978-981-13-1217-5_1
|View full text |Cite
|
Sign up to set email alerts
|

Experimental Analysis of DDoS Attacks on OpenStack Cloud Platform

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
5
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 10 publications
(5 citation statements)
references
References 4 publications
0
5
0
Order By: Relevance
“…They access social media to connect with friends or family and access movie streaming websites as entertainment when studying. They have also tried hacking tutorials or attacks on computer networks from articles during productive hours [14].…”
Section: A Observation Resultsmentioning
confidence: 99%
“…They access social media to connect with friends or family and access movie streaming websites as entertainment when studying. They have also tried hacking tutorials or attacks on computer networks from articles during productive hours [14].…”
Section: A Observation Resultsmentioning
confidence: 99%
“…MANO reports back the “scale in/out” decision to NFVI/VIM layer. Based on CPU metrics, it manages the deployment of IPS VMs depending on CPU utilization, which has a critical role on computation capacity of a VM 33,34 . Memory utilization is not considered as decision parameter in the policies of MANO as its utilization of VM does not increase as much as CPU.…”
Section: The Proposed Framework Of Ddos Mitigationmentioning
confidence: 99%
“…Based on CPU metrics, it manages the deployment of IPS VMs depending on CPU utilization, which has a critical role on computation capacity of a VM. 33,34 Memory utilization is not considered as decision parameter in the policies of MANO as its utilization of VM does not increase as much as CPU. The number of packets is another important parameter for mitigation of DDoS attacks.…”
Section: Management and Orchestrationmentioning
confidence: 99%
“…Aanshi Bhardwaj et al [15] analyzed and evaluated the DDoS attack using the OpenStack cloud platform and captures the attack Wireshark graph. This article studied only the DDoS attack using various tools.…”
Section: Slow Http Read Attacksmentioning
confidence: 99%