2015
DOI: 10.14257/ijgdc.2015.8.3.12
|View full text |Cite
|
Sign up to set email alerts
|

Comprehensive Study of Various Techniques for Detecting DDoS Attacks in Cloud Environment

Abstract: Cloud computing is the most dynamic field of IT industry. It is becoming very famous due to its less resource consuming and higher output. Though Cloud computing is very vast and useful technology but it is not remained untouched from attackers or hackers. The most common attack notified on the cloud environment is DDoS attack. DDoS attacks i.e. Distributed Denial of service attacks happens on a cloud environment in such a way that, two or more than two attackers sends the multiple SOAP requests at the same cl… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2017
2017
2020
2020

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 6 publications
(4 citation statements)
references
References 10 publications
(10 reference statements)
0
4
0
Order By: Relevance
“…Much research has been dedicated to DDoS attack-detection technology. Soft computing or artificial-intelligence methods are widely used in attack-detection [4]. Depending on the analysis method, DDoS detection methods can be classified into the three types of misuse, anomaly-based, and hybrid detection.…”
Section: Related Researchmentioning
confidence: 99%
See 1 more Smart Citation
“…Much research has been dedicated to DDoS attack-detection technology. Soft computing or artificial-intelligence methods are widely used in attack-detection [4]. Depending on the analysis method, DDoS detection methods can be classified into the three types of misuse, anomaly-based, and hybrid detection.…”
Section: Related Researchmentioning
confidence: 99%
“…In this paper, the Gini coefficient is selected as the quantitative evaluation criterion of the single-decision tree division, as specified in formula (4). In this equation, represents the sample space of samples and categories, and represents the proportion of the samples of the entire sample.…”
Section: Random Forestmentioning
confidence: 99%
“…Average (µ) and Standard deviation (δ) are calculated for every normal access and attack on x and y attributes used (2) and (3). Formula (1) is used to calculate the likelihood of Incoming IP address (IIP) normal and attack.…”
Section: E Apply Gaussian Naive Bayes Methodsmentioning
confidence: 99%
“…Moreover, the performance of the detection schemes depends on how well it is operated and tested on all network protocols. Nowadays, Soft Computing or Artificial Intelligence-based methods are applied extensively for the attack detection (Singh, Hans, Kumar, & Singh, 2015). On the basis of analysis methods, detection approaches are classified into Signature-based, Anomaly-based and Hybrid detection (Agarwal & Mittal, 2012;Wu & Yen, 2009) as described in Figure 4.…”
Section: Approachesmentioning
confidence: 99%