2014 IEEE/ACM 7th International Conference on Utility and Cloud Computing 2014
DOI: 10.1109/ucc.2014.48
|View full text |Cite
|
Sign up to set email alerts
|

AMAD: Resource Consumption Profile-Aware Attack Detection in IaaS Cloud

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2016
2016
2019
2019

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(2 citation statements)
references
References 22 publications
0
2
0
Order By: Relevance
“…VM Migration attack is conducted by the malicious increasing of the resource consumption of the VMs. It causes many costly VM migrations and degrades the performance of the cloud .…”
Section: Attacks On the Cloud Componentsmentioning
confidence: 99%
See 1 more Smart Citation
“…VM Migration attack is conducted by the malicious increasing of the resource consumption of the VMs. It causes many costly VM migrations and degrades the performance of the cloud .…”
Section: Attacks On the Cloud Componentsmentioning
confidence: 99%
“…AMAD framework is designed by Lazri et al . in to detect anomalies in the use of dynamic VM migration. AMAD detects the occurrence of abusive VM migration attack and pinpoints the VMs at the origin of the attack.…”
Section: Defense Against Denial‐of‐service Attacksmentioning
confidence: 99%