Distributed denial of service (DDoS) resilience in cloud: Review and conceptual cloud DDoS mitigation framework

O Osanaiye, KKR Choo, M Dlodlo - Journal of Network and Computer …, 2016 - Elsevier
Despite the increasing popularity of cloud services, ensuring the security and availability of
data, resources and services remains an ongoing research challenge. Distributed denial of …

A survey on cloud computing security: Issues, threats, and solutions

S Singh, YS Jeong, JH Park - Journal of Network and Computer …, 2016 - Elsevier
Over the internet, the cloud computing reveals a remarkable potential to provide on-demand
services to consumers with greater flexibility in a cost effective manner. While moving …

A survey on distributed denial of service (DDoS) attacks in SDN and cloud computing environments

S Dong, K Abbas, R Jain - IEEE Access, 2019 - ieeexplore.ieee.org
Recently, software defined networks (SDNs) and cloud computing have been widely
adopted by researchers and industry. However, widespread acceptance of these novel …

DDoS detection system: Using a set of classification algorithms controlled by fuzzy logic system in apache spark

A Alsirhani, S Sampalli… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
Distributed denial of service (DDoS) attacks are a major security threat against the
availability of conventional or cloud computing resources. Numerous DDoS attacks, which …

A cloud computing based network monitoring and threat detection system for critical infrastructures

Z Chen, G Xu, V Mahalingam, L Ge, J Nguyen, W Yu… - Big Data Research, 2016 - Elsevier
Critical infrastructure systems perform functions and missions that are essential for our
national economy, health, and security. These functions are vital to commerce, government …

Towards Large‐Scale, Heterogeneous Anomaly Detection Systems in Industrial Networks: A Survey of Current Trends

M Iturbe, I Garitano, U Zurutuza… - Security and …, 2017 - Wiley Online Library
Industrial Networks (INs) are widespread environments where heterogeneous devices
collaborate to control and monitor physical processes. Some of the controlled processes …

Mitigating TCP SYN flooding based EDOS attack in cloud computing environment using binomial distribution in SDN

SQA Shah, FZ Khan, M Ahmad - Computer Communications, 2022 - Elsevier
Cloud Computing provides an auto-scaling feature for dynamic resource utilization to cope
with their customers' requirements and charge as 'pay-per-use'. Attackers get the benefit of …

A survey on the security of cloud computing

L Alhenaki, A Alwatban, B Alamri… - 2019 2nd international …, 2019 - ieeexplore.ieee.org
Within the recent decade, major innovations in technology have emerged, that potentially
add more convenience to daily life practices not only on an enterprise level but on an …

Detection of ddos attacks in openstack-based private cloud using apache spark

S Gumaste, DG Narayan, S Shinde, K Amit - Journal of Telecommunications …, 2020 - jtit.pl
Security is a critical concern for cloud service providers. Distributed denial of service (DDoS)
attacks are the most frequent of all cloud security threats, and the consequences of damage …

An anomaly-based framework for mitigating effects of DDoS attacks using a third party auditor in cloud computing environments

S Mahdavi Hezavehi, R Rahmani - Cluster Computing, 2020 - Springer
Today, the providers of cloud computing services are among the most prominent service
suppliers worldwide. Availability of cloud services is one of the most important concerns of …