A comprehensive review of vulnerabilities and AI-enabled defense against DDoS attacks for securing cloud services

S Kumar, M Dwivedi, M Kumar, SS Gill - Computer Science Review, 2024 - Elsevier
The advent of cloud computing has made a global impact by providing on-demand services,
elasticity, scalability, and flexibility, hence delivering cost-effective resources to end users in …

A survey of software aging and rejuvenation studies

D Cotroneo, R Natella, R Pietrantuono… - ACM Journal on …, 2014 - dl.acm.org
Software aging is a phenomenon plaguing many long-running complex software systems,
which exhibit performance degradation or an increasing failure rate. Several strategies …

Perffuzz: Automatically generating pathological inputs

C Lemieux, R Padhye, K Sen, D Song - Proceedings of the 27th ACM …, 2018 - dl.acm.org
Performance problems in software can arise unexpectedly when programs are provided with
inputs that exhibit worst-case behavior. A large body of work has focused on diagnosing …

Industrial IoT security threats and concerns by considering Cisco and Microsoft IoT reference models

Z Bakhshi, A Balador, J Mustafa - 2018 IEEE wireless …, 2018 - ieeexplore.ieee.org
This paper investigates security concerns and issues for Industrial Internet of Things (IIoT).
The IIoT is an emerging transformation, bringing great values to every industry. Although this …

A survey of denial-of-service and distributed denial of service attacks and defenses in cloud computing

A Bonguet, M Bellaiche - Future Internet, 2017 - mdpi.com
Cloud Computing is a computing model that allows ubiquitous, convenient and on-demand
access to a shared pool of highly configurable resources (eg, networks, servers, storage …

An Anomaly-based Detection System for Monitoring Kubernetes Infrastructures

JG Almaraz-Rivera - IEEE Latin America Transactions, 2023 - ieeexplore.ieee.org
Network monitoring is crucial to analyze infrastructure baselines and alert whenever an
abnormal behavior is observed. However, human effort is limited in time and scope since …

In the Compression {Hornet's} Nest: A Security Study of Data Compression in Network Services

G Pellegrino, D Balzarotti, S Winter, N Suri - 24th USENIX Security …, 2015 - usenix.org
In this paper, we investigate the current use of data compression in network services that are
at the core of modern web-based applications. While compression reduces network traffic, if …

A lightweight tool for anomaly detection in cloud data centres

S Barbhuiya, Z Papazachos, P Kilpatrick… - … Conference on Cloud …, 2015 - scitepress.org
Cloud data centres are critical business infrastructures and the fastest growing service
providers. Detecting anomalies in Cloud data centre operation is vital. Given the vast …

Detection of attacks on the Internet of Things based on intelligent analysis of devices functioning indicators

T Ovasapyan, D Moskvin, A Tsvetkov - 13th International Conference on …, 2020 - dl.acm.org
The work is devoted to the effectiveness study of applying intelligent data analysis to devices
functioning indicators in order to detect attacks on the Internet of Things networks. The …

Medusa: Unveil Memory Exhaustion DoS Vulnerabilities in Protocol Implementations

Z Du, Y Li, Y Zheng, X Zhang, C Zhang, Y Liu… - Proceedings of the …, 2024 - dl.acm.org
Web services have brought great convenience to our daily lives. Meanwhile, they are
vulnerable to Denial-of-Service (DoS) attacks. DoS attacks launched via vulnerabilities in …