2022
DOI: 10.1109/tii.2022.3146290
|View full text |Cite
|
Sign up to set email alerts
|

SDMTA: Attack Detection and Mitigation Mechanism for DDoS Vulnerabilities in Hybrid Cloud Environment

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
11
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
3
3

Relationship

1
5

Authors

Journals

citations
Cited by 39 publications
(11 citation statements)
references
References 28 publications
0
11
0
Order By: Relevance
“…Simulation result shows 98% accuracy rate and has a great performance over traditional methods [27]. In 2022, Sandeep Kautish propose DDOS strategy for cloud computing environment when we compare it with existing methods, it's accuracy is 96% [28]. In 2022, Qiuhua Wang focus deep learning based approach for cyber attack detection.…”
Section: Literature Reviewmentioning
confidence: 99%
“…Simulation result shows 98% accuracy rate and has a great performance over traditional methods [27]. In 2022, Sandeep Kautish propose DDOS strategy for cloud computing environment when we compare it with existing methods, it's accuracy is 96% [28]. In 2022, Qiuhua Wang focus deep learning based approach for cyber attack detection.…”
Section: Literature Reviewmentioning
confidence: 99%
“…The term K g and P g in Equation ( 15) represents the insignificant gate weights. The gate masses are displayed in Equations ( 16) and (17).…”
Section: F I G U R Ementioning
confidence: 99%
“…In 2022, Kautish and Vidyarthi 17 . have proposed a unique mitigation technique for DDoS attacks using the Hybrid Cloud Setting with the aid of the “Dispersed Denial‐Of‐Mitigation Tree Architecture (SDMTA).” The suggested SDMTA mitigating design incorporated continuous network surveillance to sustain prediction approaches.…”
Section: Introductionmentioning
confidence: 99%
“…• Mitigation tree architecture: Kautish et al 63 proposed scattered denial-of-service mitigation tree architecture (SDMTA) mitigation architecture that integrates network monitoring for efficient DDoS detection mechanisms. With businesses operating globally, network devices like routers, switches, firewalls, VMs, and storage devices must be connected and monitored.…”
Section: • Duplication Of Os and Isolation Of Applicationmentioning
confidence: 99%
“…It is assumed that legitimate users and the service provider are observing the network for so long and gaining probabilistic information about another user being malicious or not. Therefore, this probabilistic information is used by the provider and legitimate users to change their actions to deal with malicious users present in the network. Mitigation tree architecture : Kautish et al 63 proposed scattered denial‐of‐service mitigation tree architecture (SDMTA) mitigation architecture that integrates network monitoring for efficient DDoS detection mechanisms. With businesses operating globally, network devices like routers, switches, firewalls, VMs, and storage devices must be connected and monitored.…”
Section: Defense Mechanism For Direct Attackmentioning
confidence: 99%