2016
DOI: 10.1002/sec.1539
|View full text |Cite
|
Sign up to set email alerts
|

A survey and taxonomy of DoS attacks in cloud computing

Abstract: Denial‐of‐service (DoS) attacks are one of the major security challenges in the emerging cloud computing models. Currently, numerous types of DoS attacks are conducted against the various cloud services and resources, which target their availability, service level agreements, and performance. This paper presents an in‐depth study of the various types of the DoS attacks proposed for the cloud computing environment and classifies them based on the cloud components or services, which they target. Besides, it prov… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
29
0
1

Year Published

2017
2017
2023
2023

Publication Types

Select...
8
1

Relationship

0
9

Authors

Journals

citations
Cited by 92 publications
(30 citation statements)
references
References 103 publications
(143 reference statements)
0
29
0
1
Order By: Relevance
“…Cloud Computing is a technology based on network, and its deployment model and services makes its resources exposed to internal and external attacks [27]. The main advantage to DDoS attacker is the virtualization feature of cloud computing.…”
Section: Cloud Computingmentioning
confidence: 99%
“…Cloud Computing is a technology based on network, and its deployment model and services makes its resources exposed to internal and external attacks [27]. The main advantage to DDoS attacker is the virtualization feature of cloud computing.…”
Section: Cloud Computingmentioning
confidence: 99%
“…Not like DoS, DDoS exploits the massive useful resource asymmetry between the internet and the victim. By means of its many-to-one attack measurement [10] [13], DDoS can block sufferer off-net thereby its protection level come to be inappropriate.…”
Section: Service Denial Attacksmentioning
confidence: 99%
“…DDoS attack methods of inherited attack and IP spoofing hardens tracing of attackers to be tough [13]- [15]. DoS mitigation is hard in a disbursed environment, as it is able to be of any shape both ping of death or clone attack.…”
Section: Documentation Of Service Denial Attacksmentioning
confidence: 99%
“…In this type of attack, message content manipulation is used, which in turn causes a crash in the web server. Due to the complexity and parsing of XML documents, even a small malformed XML message can cause a huge consumption of server resources [21]. There are numerous types of XDoS attacks.…”
Section: Xml-based Dos Attacksmentioning
confidence: 99%