2018
DOI: 10.1007/s12046-018-0800-7
|View full text |Cite
|
Sign up to set email alerts
|

A statistical and distributed packet filter against DDoS attacks in Cloud environment

Abstract: Distributed Denial of Service (DDoS) attacks are a serious threat to Cloud. These attacks consume large amount of resources and increase the service usage cost by a significant factor. Due to multi-tenancy and self-provisioning properties of Cloud, traditional DDoS detection techniques cannot be directly applied. Hence, there is a need for Cloud-specific DDoS detection framework. In this paper, a statistical and distributed network packet filtering model is proposed against DDoS attacks in Cloud. The key idea … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
5
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 23 publications
(5 citation statements)
references
References 16 publications
0
5
0
Order By: Relevance
“…16 The author introduced the statistical method of detecting the malicious packets of DDoS attacks. 17 Bayesian theorem checks the conditional legitimate probability of the data packet. 18 The author proposed a related metric such as the correlation coefficient to determine the attack flow and discriminate the suspicious flow.…”
Section: Literature Surveymentioning
confidence: 99%
See 2 more Smart Citations
“…16 The author introduced the statistical method of detecting the malicious packets of DDoS attacks. 17 Bayesian theorem checks the conditional legitimate probability of the data packet. 18 The author proposed a related metric such as the correlation coefficient to determine the attack flow and discriminate the suspicious flow.…”
Section: Literature Surveymentioning
confidence: 99%
“…There are N numbers of techniques present fire DDoS attack, like Gregorian pointed out the SYN, SYN‐ACK packets change the TCP handshakes' flaws and determine the SYN attacks 16 . The author introduced the statistical method of detecting the malicious packets of DDoS attacks 17 . Bayesian theorem checks the conditional legitimate probability of the data packet 18 …”
Section: Literature Surveymentioning
confidence: 99%
See 1 more Smart Citation
“…It can be written as [1][2][3]5,7,10], [6,[8][9]. Similarly, a − c can be translated into [1][2][3]5,7,10], [10,12]. 4.…”
Section: Map Policies To Rulesmentioning
confidence: 99%
“…Existing packet filtering techniques [8][9][10][11][12] were initially used in the network to provide security protection. The access control function of the network packet is implemented on the router, and the security function of it is separated.…”
Section: Introductionmentioning
confidence: 99%