2022
DOI: 10.33889/ijmems.2022.7.1.006
|View full text |Cite
|
Sign up to set email alerts
|

A Step Towards Generation of DoS/DDoS Attacks Dataset for Docker-Centric Computing

Abstract: Docker provides an effective containerized environment for modern computing. However, the security issues present in Docker provide an edge to the attackers thus resulting in various attacks. Denial of Service (DoS) and Distributed Denial of Service (DDoS) are the common ones. In this paper, DoS and DDoS attack datasets have been generated using realistic testbed environments as older datasets have their own set of limitations, making them insufficient for today’s computing. An architectural framework is provi… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2023
2023
2023
2023

Publication Types

Select...
1
1

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(1 citation statement)
references
References 12 publications
0
1
0
Order By: Relevance
“…The security concerns inherent in Docker provide an edge to attackers [29] through denial-of-service (DoS) and distributed denial-of-service (DDoS) attacks. Furthermore, the possibility of privilege escalation is heightened when employing Docker containers, as they require operational access to the Linux kernel [16].…”
Section: Automated Cowrie Installationmentioning
confidence: 99%
“…The security concerns inherent in Docker provide an edge to attackers [29] through denial-of-service (DoS) and distributed denial-of-service (DDoS) attacks. Furthermore, the possibility of privilege escalation is heightened when employing Docker containers, as they require operational access to the Linux kernel [16].…”
Section: Automated Cowrie Installationmentioning
confidence: 99%