2011
DOI: 10.1016/j.jnca.2010.06.004
|View full text |Cite
|
Sign up to set email alerts
|

Cloud security defence to protect cloud computing against HTTP-DoS and XML-DoS attacks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

1
101
0
1

Year Published

2012
2012
2019
2019

Publication Types

Select...
8

Relationship

0
8

Authors

Journals

citations
Cited by 203 publications
(103 citation statements)
references
References 17 publications
1
101
0
1
Order By: Relevance
“…In their work, VMs with obsolete packages were marked with ICS (Image Creation Station) and the starting of a VM with obsolete packages was prevented by XGE (Xen Grid Engine) [15]. HTTP DoS (HDoS) and XML DoS (XDoS) attacks are comparatively easy to accomplish but twice as hard for the security experts to protect against [16]. Chonka et al [16] in their study claimed to provide protection against HDoS and XDoS attacks using a trace back mechanism they named Cloud Trace Back (CTB).…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…In their work, VMs with obsolete packages were marked with ICS (Image Creation Station) and the starting of a VM with obsolete packages was prevented by XGE (Xen Grid Engine) [15]. HTTP DoS (HDoS) and XML DoS (XDoS) attacks are comparatively easy to accomplish but twice as hard for the security experts to protect against [16]. Chonka et al [16] in their study claimed to provide protection against HDoS and XDoS attacks using a trace back mechanism they named Cloud Trace Back (CTB).…”
Section: Related Workmentioning
confidence: 99%
“…HTTP DoS (HDoS) and XML DoS (XDoS) attacks are comparatively easy to accomplish but twice as hard for the security experts to protect against [16]. Chonka et al [16] in their study claimed to provide protection against HDoS and XDoS attacks using a trace back mechanism they named Cloud Trace Back (CTB). Hop-count filtering [17] uses information about a source IP address and its corresponding hops from a destination that are recorded in a table at the destination side when the destination is not under attack.…”
Section: Related Workmentioning
confidence: 99%
“…Authors of [148] test a cloud traceback model using back propagation neural network called Cloud Protector, which is trained to detect and filter DDoS attack traffic in cloud environment. More studies on DDoS related issues in cloud computing environments can be found in [149][150][151][152][153].…”
Section: Ddos Defense In Cloud Computing Environmentmentioning
confidence: 99%
“…The other type of cloud is Software as a Service (SaaS). Under this service, users are allowed to access cloud infrastructure and application via end-user devices like a web browser [5]. A cloud service provider could provide services to the clients as private clouds or public cloud or hybrid or community clouds.…”
Section: Introductionmentioning
confidence: 99%
“…This allows many institutions to cut on IT infrastructure, application and manpower resources. Like other utilities, the cloud could also be managed as "metering" service [5]. The cloud usage could be monitored, controlled and reported, this in turn allows transparency for both the provider and consumer of the service.…”
Section: Introductionmentioning
confidence: 99%