2012 Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing 2012
DOI: 10.1109/imis.2012.76
|View full text |Cite
|
Sign up to set email alerts
|

Large-Scale Coordinated attacks: Impact on the Cloud Security

Abstract: To cite this version:Damien Riquet, Gilles Grimaud, Michaël Hauspie. Large-scale coordinated attacks : Impact on the cloud security. Abstract-Cloud Computing has emerged as a model to process large volumetric data. Though Cloud Computing is very popular, cloud security could delay its adoption. Security of the cloud must provide data confidentiality and protection of resources. Such architecture seems to be vulnerable when confronted to distributed attacks also known as large-scale coordinated attacks.In this … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
11
0

Year Published

2013
2013
2017
2017

Publication Types

Select...
5
3
1

Relationship

1
8

Authors

Journals

citations
Cited by 22 publications
(11 citation statements)
references
References 6 publications
0
11
0
Order By: Relevance
“…Riquet et al [21] study the impact of DDoS attacks on Cloud Computing with a defense such as an IDS (snort [22]) and a commercial firewall. Their experiments show that distributed attacks remain undetected, even with security solutions.…”
Section: Denial Of Servicementioning
confidence: 99%
“…Riquet et al [21] study the impact of DDoS attacks on Cloud Computing with a defense such as an IDS (snort [22]) and a commercial firewall. Their experiments show that distributed attacks remain undetected, even with security solutions.…”
Section: Denial Of Servicementioning
confidence: 99%
“…al., in [27] discussed coordinated attacks on a large scale and its impact on the cloud. The Firewalls and Intrusion Detection System are used for security using port scan.…”
Section: Literature Reviewmentioning
confidence: 99%
“…The general architecture of cloud can be described as the authentication server, which authenticates the user, the second is a user, which uses the services and third is the servers that provide services to the user. The user authenticates himself through an authentication server, and after the successful authentication, the user gets permeation to use the services provided by the server [8][9].…”
Section: Introductionmentioning
confidence: 99%
“…al., [13] discussed Firewall, intrusion detection and coordinated attacks on the cloud on a large scale. The authorized traffic defined by the security policy is filtered through the firewall.…”
Section: Literature Reviewmentioning
confidence: 99%