Moving Target Defense‐Based Denial‐of‐Service Mitigation in Cloud Environments: A Survey

M Nguyen, S Debroy - Security and Communication Networks, 2022 - Wiley Online Library
With the increased frequency and intensity of denial‐of‐service (DoS) attacks on critical
cloud‐hosted services, resource adaptation schemes adopted by the cloud service …

A study on container vulnerability exploit detection

O Tunde-Onadele, J He, T Dai… - 2019 ieee international …, 2019 - ieeexplore.ieee.org
Containers have become increasingly popular for deploying applications in cloud computing
infrastructures. However, recent studies have shown that containers are prone to various …

Detecting Asymmetric Application-layer {Denial-of-Service} Attacks {In-Flight} with {FineLame}

HM Demoulin, I Pedisich, N Vasilakis, V Liu… - 2019 USENIX Annual …, 2019 - usenix.org
Denial of service (DoS) attacks increasingly exploit algorithmic, semantic, or implementation
characteristics dormant in victim applications, often with minimal attacker resources …

Coda: Runtime Detection of Application-Layer CPU-Exhaustion DoS Attacks in Containers

M Zhan, Y Li, H Yang, G Yu, B Li… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
Denial of service (DoS) attacks have increasingly exploited vulnerabilities in algorithms or
implementation methods in application-layer programs. In this type of attack, called CPU …

Leader: Defense Against Exploit-Based Denial-of-Service Attacks on Web Applications

R Tandon, H Wang, N Weideman, S Arakelyan… - Proceedings of the 26th …, 2023 - dl.acm.org
Exploit-based denial-of-service attacks (exDoS) are challenging to detect and mitigate.
Rather than flooding the network with excessive traffic, these attacks generate low rates of …

Defending web servers against flash crowd attacks

R Tandon, A Palia, J Ramani, B Paulsen… - … Conference on Applied …, 2021 - Springer
A flash crowd attack (FCA) floods a service, such as a Web server, with well-formed
requests, generated by numerous bots. FCA traffic is difficult to filter, since individual attack …

Protecting Online Services from Sophisticated DDOS Attacks

R Tandon - 2022 - search.proquest.com
Distributed denial-of-service (DDoS) attacks are increasing in volume, frequency and
sophistication. Even two decades after the first DDoS attack, there are important challenges …

Automated detection and mitigation of application-level asymmetric DoS attacks

HM Demoulin, I Pedisich, LTX Phan… - proceedings of the …, 2018 - dl.acm.org
This paper presents a novel integrated platform for the automatic detection and mitigation of
denial-of-service (DoS) attacks in networked systems. Recently, these attacks have evolved …

Service Boosters: Library Operating Systems for the Datacenter

HM Demoulin - 2021 - search.proquest.com
Cloud applications are taking an increasingly important place our technology and economic
landscape. Consequently, they are subject to stringent performance requirements. High tail …

[PDF][PDF] Detecting application-layer denial-of-service attacks with finelame

HM Demoulin, I Pedisich - 2019 USENIX Annual Technical Conference …, 2019 - par.nsf.gov
Denial of service (DoS) attacks increasingly exploit algorithmic, semantic, or implementation
characteristics dormant in victim applications, often with minimal attacker resources …