2015 12th International Conference on Information Technology - New Generations 2015
DOI: 10.1109/itng.2015.40
|View full text |Cite
|
Sign up to set email alerts
|

Analysis of DDoS Attacks and an Introduction of a Hybrid Statistical Model to Detect DDoS Attacks on Cloud Computing Environment

Abstract: Cloud service availability has been one of the major concerns of cloud service providers (CSP), while hosting different cloud based information technology services by managing different resources on the internet. The vulnerability of internet, the distribute nature of cloud computing, various security issues related to cloud computing service models, and cloud's main attributes contribute to its susceptibility of security threats associated with cloud service availability. One of the major sophisticated threat… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
13
0

Year Published

2016
2016
2024
2024

Publication Types

Select...
5
4

Relationship

0
9

Authors

Journals

citations
Cited by 47 publications
(16 citation statements)
references
References 16 publications
0
13
0
Order By: Relevance
“…ments [16]. A separate variation that utilizes both the covariance approach and entropy based system is proposed by [18] that offers in-depth detection at the host and network levels.…”
Section: Literature Reviewmentioning
confidence: 99%
“…ments [16]. A separate variation that utilizes both the covariance approach and entropy based system is proposed by [18] that offers in-depth detection at the host and network levels.…”
Section: Literature Reviewmentioning
confidence: 99%
“…In the literature, there are many approaches used to detect DDoS attacks. They are discussed in [4], [5] and [9]. A hybrid statistical model is employed in [4] for DDoS attack detection.…”
Section: Introductionmentioning
confidence: 99%
“…They are discussed in [4], [5] and [9]. A hybrid statistical model is employed in [4] for DDoS attack detection. Entropy based detection of DDoS attacks is explored in [5] while various defines mechanisms for flooding DDoS attacks is investigated in [9].…”
Section: Introductionmentioning
confidence: 99%
“…The cloud users need not pay extra amount for resource over-provisioning by using dynamic scaling [2]. DDoS attacks have been a key challenge to the researchers and significant security issue to the cloud computing environment [3,4]. DDoS attackers can send huge number of forged requests from many zombie computers to the cloud server for making cloud resource unavailable.…”
Section: Introductionmentioning
confidence: 99%