2014
DOI: 10.1504/ijguc.2014.065384
|View full text |Cite
|
Sign up to set email alerts
|

A multilevel thrust filtration defending mechanism against DDoS attacks in cloud computing environment

Abstract: Cloud computing is a technology which not only gained advantages from ascendant technologies, but also suffered from its security breaches, of which availability is the most serious security issue. Distributed Denial of Service (DDoS) is a kind of resource-availabilityrelated attack launched with the aim of subverting the Data Centre (DC) for resource unavailability to the legitimate clients. In this paper, we propose 'Multilevel Thrust Filtration (MTF) mechanism' as a solution, which authenticates the incomin… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0

Year Published

2016
2016
2022
2022

Publication Types

Select...
6
2

Relationship

0
8

Authors

Journals

citations
Cited by 29 publications
(6 citation statements)
references
References 19 publications
0
6
0
Order By: Relevance
“…Among other approaches, the work of Iyengare et al [22] proposes a Multilevel Thrust Filtration (MTF) that contains four detection and prevention modules, which are traffic analysis, anomaly detection, anomaly classification, and attack prevention. The proposed method filters the incoming packets and detects four types of traffic congestion, which are spoofing, ash crowd, DDoS, and aggressive legitimate traffic.…”
Section: Related Workmentioning
confidence: 99%
“…Among other approaches, the work of Iyengare et al [22] proposes a Multilevel Thrust Filtration (MTF) that contains four detection and prevention modules, which are traffic analysis, anomaly detection, anomaly classification, and attack prevention. The proposed method filters the incoming packets and detects four types of traffic congestion, which are spoofing, ash crowd, DDoS, and aggressive legitimate traffic.…”
Section: Related Workmentioning
confidence: 99%
“…Similarly, in order to extract the PS s, all sentences containing the verb term “propose” or “present” or “develop” or “address” or “design” are extracted since authors commonly demonstrate their contributions, novelty or solutions by using these verbs. For instance, “ In this paper, we propose “Multilevel Thrust Filtration (MTF) mechanism” as a solution, which authenticates the incoming… (Iyengar et al, 2014 )” briefly summarizes the solution proposed in the article using the verb “propose.” The solutions or techniques proposed to solve research problems in academic articles are most likely represented in the sentences as such.…”
Section: Methodsmentioning
confidence: 99%
“…This metric, which can also be expressed as the rate of serviced requests, is used by authors to demonstrate the enhanced performance of the cloud service in defense and nondefense scenarios when detection and mitigation of attacks occur [115], [122]. Research also considers the goodput metric as a means of measuring the rate of legitimate requests that the system serves [123]. Good performance yields high goodput rates.…”
Section: ) Attack Mitigationmentioning
confidence: 99%
“…Cloud resource consumption: Authors use this metric in defense and non-defense scenarios as a way of demonstrating how the defense system alleviates the impact that DDoS attacks have on cloud service performance. It is typically expressed through CPU consumption [126] or network bandwidth utilization [123], [124] and [127]. It can be evaluated while the type of attack is made to vary [128].…”
Section: ) Attack Mitigationmentioning
confidence: 99%
See 1 more Smart Citation