2017
DOI: 10.3390/fi9030043
|View full text |Cite
|
Sign up to set email alerts
|

A Survey of Denial-of-Service and Distributed Denial of Service Attacks and Defenses in Cloud Computing

Abstract: Cloud Computing is a computing model that allows ubiquitous, convenient and on-demand access to a shared pool of highly configurable resources (e.g., networks, servers, storage, applications and services). Denial-of-Service (DoS) and Distributed Denial-of-Service (DDoS) attacks are serious threats to the Cloud services' availability due to numerous new vulnerabilities introduced by the nature of the Cloud, such as multi-tenancy and resource sharing. In this paper, new types of DoS and DDoS attacks in Cloud Com… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
25
0
1

Year Published

2018
2018
2023
2023

Publication Types

Select...
4
4

Relationship

0
8

Authors

Journals

citations
Cited by 54 publications
(26 citation statements)
references
References 41 publications
0
25
0
1
Order By: Relevance
“…used to verify the cloud requests (the request source) before they reach the cloud servers [6], [25]. The authors in [26] presented an IDS on the virtual machine.…”
Section: Prevent Sharing the User Credential Information Between Cloumentioning
confidence: 99%
See 2 more Smart Citations
“…used to verify the cloud requests (the request source) before they reach the cloud servers [6], [25]. The authors in [26] presented an IDS on the virtual machine.…”
Section: Prevent Sharing the User Credential Information Between Cloumentioning
confidence: 99%
“…It is like a contract between the cloud service provider and its customers to prevent this attack. It protects the cloud resources like the Data Segregation, and the Data Location [25]. 5.…”
Section: Denial Of Servicementioning
confidence: 99%
See 1 more Smart Citation
“…This paper gives an effective real time detection of these attacks with minimal detection delay. Results collect the delay and throughput data and apply a change point detection algorithm to observe the change of distribution Adrien Bonguet et.al (2017) [12] Cloud Computing is a computing model that allows ubiquitous, convenient and on-demandaccess to a shared pool of highly configurable resources (e.g., networks, servers, storage, applications and services). Denial-of-Service (DoS) and Distributed Denial-of-Service (DDoS) attacks are serious threats to the Cloud services' availability due to numerous new vulnerabilities introduced by the nature of the Cloud, such as multi-tenancy and resource sharing.…”
Section: Gradient Matrix and Ip Tracebackingmentioning
confidence: 99%
“…HTTP-DoS and XML-Dos attacks are known to lead to exhaustion of resources [4]. Cloud-based intrusion detection techniques are an improved version of traditional intrusion detection system.…”
Section: Literature Reviewmentioning
confidence: 99%