2021
DOI: 10.1007/s11276-021-02604-3
|View full text |Cite
|
Sign up to set email alerts
|

A service governance and isolation based approach to mitigate internal collateral damages in cloud caused by DDoS attack

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
4
1

Relationship

1
4

Authors

Journals

citations
Cited by 8 publications
(4 citation statements)
references
References 35 publications
0
4
0
Order By: Relevance
“…Existing methods in the literature are not sufficiently effective at handling internal collateral damages. In order to provide resource governance and separation between co-located services and improve service performance for good users, the author 69 thus proposes a novel service containerization technique. The outcomes show that by improving service performance, the suggested technique can lessen the side effects of DDoS attacks on co-located services like SSH and disc I/O.…”
Section: Resource and Service-oriented Collateral Damagesmentioning
confidence: 99%
See 1 more Smart Citation
“…Existing methods in the literature are not sufficiently effective at handling internal collateral damages. In order to provide resource governance and separation between co-located services and improve service performance for good users, the author 69 thus proposes a novel service containerization technique. The outcomes show that by improving service performance, the suggested technique can lessen the side effects of DDoS attacks on co-located services like SSH and disc I/O.…”
Section: Resource and Service-oriented Collateral Damagesmentioning
confidence: 99%
“…Existing methods in the literature are not sufficiently effective at handling internal collateral damages. In order to provide resource governance and separation between co‐located services and improve service performance for good users, the author 69 thus proposes a novel service containerization technique. The outcomes show that by improving service performance, the suggested technique can lessen the side effects of DDoS attacks on co‐located services like SSH and disc I/O. Container separation : Kumar et al 70 proposed an approach that aims to mitigate DDoS attacks by separating incoming requests at the container level and applying scale‐inside‐out for attack requests within a separate container.…”
Section: Defense Mechanism For Indirect Attackmentioning
confidence: 99%
“…Hence, low-rate DDoS attacks are more difficult to identify rather than high-rate DDoS attacks. 19,20 Data sets representing legitimate traffic produced by IoT devices are necessary for the creation of an anomaly detection system. 21 Many machine learning 22 related models are presented to detect DDoS attacks in cloud computing.…”
Section: Introductionmentioning
confidence: 99%
“…This type of attack is termed a low‐rate DDoS attack like legitimate traffic. Hence, low‐rate DDoS attacks are more difficult to identify rather than high‐rate DDoS attacks 19,20 . Data sets representing legitimate traffic produced by IoT devices are necessary for the creation of an anomaly detection system 21 …”
Section: Introductionmentioning
confidence: 99%