Defense mechanisms against DDoS attacks in a cloud computing environment: State-of-the-art and research challenges

N Agrawal, S Tapaswi - IEEE Communications Surveys & …, 2019 - ieeexplore.ieee.org
The salient features of cloud computing (such as on-demand self-service, resource pooling,
broad network access, rapid elasticity, and measured service) are being exploited by …

Detecting HTTP-based application layer DoS attacks on web servers in the presence of sampling

HH Jazi, H Gonzalez, N Stakhanova, AA Ghorbani - Computer Networks, 2017 - Elsevier
A recent escalation of application layer Denial of Service (DoS) attacks on the Internet has
quickly shifted the interest of the research community traditionally focused on network-based …

Detection of reduction-of-quality DDoS attacks using Fuzzy Logic and machine learning algorithms

V de Miranda Rios, PRM Inácio, D Magoni… - Computer Networks, 2021 - Elsevier
Abstract Distributed Denial of Service (DDoS) attacks are still among the most dangerous
attacks on the Internet. With the advance of methods for detecting and mitigating these …

[HTML][HTML] HTTP flood attack detection in application layer using machine learning metrics and bio inspired bat algorithm

I Sreeram, VPK Vuppala - Applied computing and informatics, 2019 - Elsevier
The internet network is mostly victimized to the Distributed Denial of Service (DDOS) attack,
which is one that intentionally occupies the computing resources and bandwidth in order to …

Detection and mitigation of low-rate denial-of-service attacks: A survey

VDM Rios, PRM Inácio, D Magoni, MM Freire - IEEE Access, 2022 - ieeexplore.ieee.org
The potential for being the target of Denial of Service (DoS) attacks is one of the most severe
security threats on the Internet. Attackers have been modifying their attack format over the …

[HTML][HTML] Flow level detection and filtering of low-rate DDoS

C Zhang, Z Cai, W Chen, X Luo, J Yin - Computer Networks, 2012 - Elsevier
The recently proposed TCP-targeted Low-rate Distributed Denial-of-Service (LDDoS)
attacks send fewer packets to attack legitimate flows by exploiting the vulnerability in TCP's …

Low-rate DoS attacks detection based on network multifractal

Z Wu, L Zhang, M Yue - IEEE Transactions on Dependable and …, 2015 - ieeexplore.ieee.org
Low-rate denial of service (LDoS) attacks send periodic pulse sequences with relative low
rate to form aggregation flows at the victim end. LDoS attack flows have the characteristics of …

[PDF][PDF] Sans institute infosec reading room

RF Rights - Risk, 2001 - picture.iczhiku.com
As Technology pushes the limits of removable media-so drives the need for a new file
system in order to support the larger capacities and faster access speeds being designed …

Stealthy denial of service strategy in cloud computing

M Ficco, M Rak - IEEE transactions on cloud computing, 2014 - ieeexplore.ieee.org
The success of the cloud computing paradigm is due to its on-demand, self-service, and pay-
by-use nature. According to this paradigm, the effects of Denial of Service (DoS) attacks …

Slow rate denial of service attacks against HTTP/2 and detection

N Tripathi, N Hubballi - Computers & security, 2018 - Elsevier
HTTP/2 is a newly standardized protocol designed to efficiently utilize the TCP's
transmission rate and has other advantages compared to HTTP/1.1. However its threat …