2012 IEEE Students' Conference on Electrical, Electronics and Computer Science 2012
DOI: 10.1109/sceecs.2012.6184829
|View full text |Cite
|
Sign up to set email alerts
|

A comber approach to protect cloud computing against XML DDoS and HTTP DDoS attack

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
36
0

Year Published

2015
2015
2019
2019

Publication Types

Select...
4
4

Relationship

0
8

Authors

Journals

citations
Cited by 70 publications
(36 citation statements)
references
References 10 publications
0
36
0
Order By: Relevance
“…There are many taxonomies detailing cloud vulnerabilities and attacks (Khajeh-Hosseini et al, 2010;Karnwal et al, 2012;Chonka and Abawajy, 2012;Aliyev et al, 2013;Dahbur et al, 2011;Grobauer et al, 2011). As such, it can be inferred that as the use of the cloud in organisations develops, so will the rate of DDoS attacks.…”
Section: Methods For Intrusion Detection In the Cloud Environmentmentioning
confidence: 99%
“…There are many taxonomies detailing cloud vulnerabilities and attacks (Khajeh-Hosseini et al, 2010;Karnwal et al, 2012;Chonka and Abawajy, 2012;Aliyev et al, 2013;Dahbur et al, 2011;Grobauer et al, 2011). As such, it can be inferred that as the use of the cloud in organisations develops, so will the rate of DDoS attacks.…”
Section: Methods For Intrusion Detection In the Cloud Environmentmentioning
confidence: 99%
“…Due to the distributed nature of the Cloud environment, attacks such as Denial of Service (DoS) which are distributed (DDoS), HTTP and XML-based DDoS are found to be more destructive than the traditional DDoS [23]. These research have found that traditional firewalls, network intrusion detection and prevention (IDP) systems are not adequate to defend against DDoS, XMLDoS and HTTP-DoS attacks.…”
Section: -Y Chan Et Al / Intrusion Detection and Prevention Of Web mentioning
confidence: 99%
“…While PaaS and IaaS inherit mainly the systems and networks' vulnerabilities, intrusion detection research has focused on addressing HTTP anomalies, HTTP-DoS and DDoS using host and network-based Table 1a provides further details [5,7,12,17,19,23,25]. There are other research [2-4, 6, 8, 14] that have demonstrated and validated the capabilities of their Cloud-based ID systems with satisfactory results in detecting mainly network DoS and DDoS.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…The main technology of web services is XML that can be understood by web service IDSs, meaning that, web services are considered as the main parts of today's web applications and hence, intrusion detection systems are helpful in protecting the web services (Najjar and Azgomi, 2010). Firewalls can secure the organizations network, but they have two open TCP ports that are utilized for transmitting requests in web services (for HTTP port 80 and for HTTPS port 447) (Karnwal et al, 2012). Data mining approaches for intrusion detection system is designed as in-depth defense mechanism and acts behind the firewalls within the security structure of an enterprise.…”
Section: Intrusion Detection System (Ids) and Web Servicesmentioning
confidence: 99%