2019
DOI: 10.1007/s11276-019-01937-4
|View full text |Cite
|
Sign up to set email alerts
|

An OpenStack based cloud testbed framework for evaluating HTTP flooding attacks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
7
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
7
1

Relationship

2
6

Authors

Journals

citations
Cited by 12 publications
(8 citation statements)
references
References 7 publications
0
7
0
Order By: Relevance
“…The critical analysis conducted in Section 8 extensively elaborate similarities and differences between each script. The usage of these attack scripts are publicly available, and have been mentioned and employed broadly by many earlier studies [ 2 , 35 , 36 , 39 , 40 , 42 , 43 , 44 ]. Although DDoS as services available as noted by Hameed and Ali [ 45 ], the usage of attack scripts to be executed in local area network is preferable as DDoS as services require transmission of attack traffic across the network which increases the possibility of the attack traffic to be detected and blocked by many intermediate networks managed by the internet service provider (ISP).…”
Section: Methodsmentioning
confidence: 99%
See 1 more Smart Citation
“…The critical analysis conducted in Section 8 extensively elaborate similarities and differences between each script. The usage of these attack scripts are publicly available, and have been mentioned and employed broadly by many earlier studies [ 2 , 35 , 36 , 39 , 40 , 42 , 43 , 44 ]. Although DDoS as services available as noted by Hameed and Ali [ 45 ], the usage of attack scripts to be executed in local area network is preferable as DDoS as services require transmission of attack traffic across the network which increases the possibility of the attack traffic to be detected and blocked by many intermediate networks managed by the internet service provider (ISP).…”
Section: Methodsmentioning
confidence: 99%
“…Sreeram and Vuppala [ 37 ] contend that an excessive search request and login is one of the patterns of HTTP DDoS attacks while Yadav and Selvakumar [ 33 ] noted that HTTP DDoS attacks contain diverse URL and comprise of headers known as user-agent and referrer. The request headers included in HTTP DDoS comprised of an equivalent user-agent including legitimate, incorrect URL and a repeatable request against the equal URL [ 39 ].…”
Section: Http Ddos Request Headersmentioning
confidence: 99%
“…A. Dhanapal et al [21] proposed an OpenStack cloud testbed model for evaluating the DDoS attacks in the cloud environment. This work explored various attack possibilities for the application running in the cloud environment.…”
Section: Slow Http Read Attacksmentioning
confidence: 99%
“…The proposed work is enhanced over our previous works in [21] and [22] to detect, mitigate and prevent slow HTTP DDoS attacks in the cloud environment. The novelty contribution of this works to define the multi-stage zonal classification model integrated into the cloud to detect and prevent the slow HTTP DDoS attack.…”
Section: Slow Http Read Attacksmentioning
confidence: 99%
“…The proposed solution enhanced the OpenStack framework discussed in [15] and implemented the solution to detect the different type of slow HTTP DDoS attacks in the cloud environment. The slowHTTPTest tool is used to generate the variants of slow HTTP DDoS attack to the NGINX web server running in the OpenStack cloud.…”
mentioning
confidence: 99%