2015
DOI: 10.1016/j.procs.2015.12.037
|View full text |Cite
|
Sign up to set email alerts
|

Defence for Distributed Denial of Service Attacks in Cloud Computing

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
17
0

Year Published

2016
2016
2023
2023

Publication Types

Select...
4
3
1
1

Relationship

0
9

Authors

Journals

citations
Cited by 38 publications
(17 citation statements)
references
References 22 publications
0
17
0
Order By: Relevance
“…Apart from these, thestudy also discussed the various security problems, latest developments for thesecurity of virtual machines and latestdefense mechanisms. Thus study provided the detail for future research direction [8].…”
Section: H Wang Et Al [2002]mentioning
confidence: 89%
“…Apart from these, thestudy also discussed the various security problems, latest developments for thesecurity of virtual machines and latestdefense mechanisms. Thus study provided the detail for future research direction [8].…”
Section: H Wang Et Al [2002]mentioning
confidence: 89%
“…This work automates the reservation at the cost of high computational overhead. A defence system for distributed denial of service is reviewed in [8]. This article classifies the DDoS cloud protection systems into knowledge and anamoly based systems for purpose of review.…”
Section: Review Of Literaturementioning
confidence: 99%
“…There seems to be very little research conducted in the literature regarding the code integrity. It is crucial to make certain the correctness of application execution especially when dealing with computation/ code offloading, code integrity is key and as stated in [37] "loss of integrity can leads to modification attack".…”
Section: Testing Data Integrity After Encryptionmentioning
confidence: 99%
“…Availability and reliability of MCC is crucial both for the user as well as the cloud service provider, this could be a security issue as stated in [37] by Bhatia and Verma, availability ensures that authorised parties are able to access information when required.…”
Section: Service Availability Riskmentioning
confidence: 99%