2022
DOI: 10.7717/peerj-cs.814
|View full text |Cite
|
Sign up to set email alerts
|

Real-time DDoS flood attack monitoring and detection (RT-AMD) model for cloud computing

Abstract: In recent years, the advent of cloud computing has transformed the field of computing and information technology. It has been enabling customers to rent virtual resources and take advantage of various on-demand services with the lowest costs. Despite the advantages of cloud computing, it faces several threats; an example is a distributed denial of service (DDoS) attack, which is considered among the most serious. This article presents real-time monitoring and detection of DDoS attacks on the cloud using a mach… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
1
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 11 publications
(3 citation statements)
references
References 31 publications
0
1
0
Order By: Relevance
“…The field of intrusion detection systems is widely studied in the literature. Some research papers, such as [15][16][17], cover the use of ML and DL to improve the network security of cloud computing.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…The field of intrusion detection systems is widely studied in the literature. Some research papers, such as [15][16][17], cover the use of ML and DL to improve the network security of cloud computing.…”
Section: Related Workmentioning
confidence: 99%
“…In [16], the authors demonstrate a proposed real-time monitoring and detection "RT-AMD" of DDoS attacks on cloud computing using machine learning algorithms and an intrusion detection system, which uses anomaly-based detection. They selected machine learning classifiers of naïve Bayes (NB), decision tree (DT), k-neighbors (KN), and random forest (RF) to build a predictive model and compare them by two primary criteria: accuracy and detection rate.…”
Section: Related Workmentioning
confidence: 99%
“…Peer-to-peer file-sharing systems are still the most popular method for any type of content sharing over the internet, especially using the BitTorrent protocol. Like any other technology using the internet, it is vulnerable to attacks, suffering from different kinds of denial-of-service attacks, such as query flooding and pollution [3]. For example, in the content pollution attack, a malicious user publishes a large number of decoys (same or similar meta-data) so that queries of a given content return predominantly fake/corrupted copies [4].…”
Section: Introductionmentioning
confidence: 99%