2017
DOI: 10.1515/cait-2017-0040
|View full text |Cite
|
Sign up to set email alerts
|

Mitigation of Distributed Denial of Service Attacks in the Cloud

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
6

Relationship

0
6

Authors

Journals

citations
Cited by 7 publications
(3 citation statements)
references
References 29 publications
0
3
0
Order By: Relevance
“…There is a type of attack going on where the hackers try to prevent legitimate users from using the service. 49,50 In this type of attack, the attacker often sends repeated messages asking the network or server to verify requests in case the answers are coming from the incorrect places. When transferring the authentication authorization, the network or server will not be able to discover the attacker's recovery address, forcing the server to wait before cutting the connection.…”
Section: Denial Of Service Attacksmentioning
confidence: 99%
See 1 more Smart Citation
“…There is a type of attack going on where the hackers try to prevent legitimate users from using the service. 49,50 In this type of attack, the attacker often sends repeated messages asking the network or server to verify requests in case the answers are coming from the incorrect places. When transferring the authentication authorization, the network or server will not be able to discover the attacker's recovery address, forcing the server to wait before cutting the connection.…”
Section: Denial Of Service Attacksmentioning
confidence: 99%
“…The intensive assault efforts may affect cloud systems in a variety of ways. These include data corruption, sensitive data inaccessibility, sensitive data loss, unauthorized users making unforeseen modifications, and corrupt software or services that are performing essential system functions. Denial of service attacks : There is a type of attack going on where the hackers try to prevent legitimate users from using the service 49,50 . In this type of attack, the attacker often sends repeated messages asking the network or server to verify requests in case the answers are coming from the incorrect places.…”
Section: Threats In Cloud Computingmentioning
confidence: 99%
“…Botnets have also been discovered in traditional as well as mobile clouds, as a means of enhancing their strength, ubiquity and coverage. This has been discussed by recent studies such as Mtibaa et al [127], Li et al [128] and Zhaoet et al [129]; and techniques for the detection of botnets in cloud environments have been proposed by Badiset al [130] and Kebande and Venter (2014) [131], while countermeasures have also been reviewed and proposed to mitigate the impact of botnet-propelled attacks in cloud-based environments, as can be found in Alosaimi et al [132] and Wahab et al [133], who proposed an adaptive solution for detecting insider attacks in cloud environments, and also by Daffu and Kaur (2016) [134], respectively, amongst others.…”
Section: Botnets In Mobile and Cloud Environmentsmentioning
confidence: 99%