作者
Hammi Badis, Guillaume Doyen, Rida Khatoun
发表日期
2014/5/5
研讨会论文
2014 IEEE Network Operations and Management Symposium (NOMS)
页码范围
1-9
出版商
IEEE
简介
Cloud computing is gaining ground and becoming one of the fast growing segments of the IT industry. However, if its numerous advantages are mainly used to support a legitimate activity, it is now exploited for a use it was not meant for: malicious users leverage its power and fast provisioning to turn it into an attack support. Botnets supporting DDoS attacks are among the greatest beneficiaries of this malicious use since they can be setup on demand and at very large scale without requiring a long dissemination phase nor an expensive deployment costs. For cloud service providers, preventing their infrastructure from being turned into an Attack as a Service delivery model is very challenging since it requires detecting threats at the source, in a highly dynamic and heterogeneous environment. In this paper, we present the result of an experiment campaign we performed in order to understand the operational behavior …
引用总数
20142015201620172018201920202021202220232514332245
学术搜索中的文章
H Badis, G Doyen, R Khatoun - 2014 IEEE Network Operations and Management …, 2014