2023
DOI: 10.1016/j.jpdc.2023.04.003
|View full text |Cite
|
Sign up to set email alerts
|

Interactive anomaly-based DDoS attack detection method in cloud computing environments using a third party auditor

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2024
2024
2024
2024

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 8 publications
(2 citation statements)
references
References 63 publications
0
2
0
Order By: Relevance
“…Cloud‐based DDoS attack detection systems aim to mitigate and recognize such attacks promptly. These systems employ various approaches, including statistical analysis, machine learning, and anomaly detection techniques 2 . They analyze network traffic patterns, resource usage, and behavioral anomalies to differentiate between legitimate and malicious DDoS attacks in the system 3 .…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…Cloud‐based DDoS attack detection systems aim to mitigate and recognize such attacks promptly. These systems employ various approaches, including statistical analysis, machine learning, and anomaly detection techniques 2 . They analyze network traffic patterns, resource usage, and behavioral anomalies to differentiate between legitimate and malicious DDoS attacks in the system 3 .…”
Section: Introductionmentioning
confidence: 99%
“…These systems employ various approaches, including statistical analysis, machine learning, and anomaly detection techniques. 2 They analyze network traffic patterns, resource usage, and behavioral anomalies to differentiate between legitimate and malicious DDoS attacks in the system. 3 By monitoring the network's traffic flow, examining packet headers, and analyzing traffic behavior in real-time, malicious DDoS attacks can be detected by the intrusion detection system.…”
Section: Introductionmentioning
confidence: 99%