Cloud Computing Security - Concepts and Practice 2020
DOI: 10.5772/intechopen.92544
|View full text |Cite
|
Sign up to set email alerts
|

Introductory Chapter: Cloud Computing Security Challenges

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(2 citation statements)
references
References 0 publications
0
2
0
Order By: Relevance
“…In addition, denial of service can serve as a catalyst and be utilized as a diversion to hide the malicious activities that bypass the cloud firewall. As a result, it can rapidly spread and cause greater harm instead of just impacting a single device [43]. DoS attacks aim to hinder users from accessing IoT, cloud networks, and other computer services.…”
Section: Denial Of Service (Dos) Attacksmentioning
confidence: 99%
“…In addition, denial of service can serve as a catalyst and be utilized as a diversion to hide the malicious activities that bypass the cloud firewall. As a result, it can rapidly spread and cause greater harm instead of just impacting a single device [43]. DoS attacks aim to hinder users from accessing IoT, cloud networks, and other computer services.…”
Section: Denial Of Service (Dos) Attacksmentioning
confidence: 99%
“…The main incentive behind this kind of attack is to drive the cloud service owner to raise the elasticity levels to handle the increased traffic and utilize more virtual resources to serve the request and ensure the quality of service (QoS), thus making it irresponsible ultimately. Furthermore, denial of service may act as an instigator and be used as a smokescreen to conceal the malicious activities circumventing the firewall of the cloud, and thus, can expand quickly to cause more damage instead of affecting one device [87]. DoS attacks are carried out to prevent users from gaining access to IoT, cloud networks, and other computer services.…”
Section: Denial Of Service Attacksmentioning
confidence: 99%