Proceedings of the 7th International Conference on Ubiquitous Information Management and Communication 2013
DOI: 10.1145/2448556.2448592
|View full text |Cite
|
Sign up to set email alerts
|

Detecting flooding based DoS attack in cloud computing environment using covariance matrix approach

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
21
0

Year Published

2013
2013
2020
2020

Publication Types

Select...
5
3
1

Relationship

1
8

Authors

Journals

citations
Cited by 35 publications
(21 citation statements)
references
References 6 publications
0
21
0
Order By: Relevance
“…The distribution ratio of the entropy is utilized to determine flow of attack. Ismail et al [21] proposed a model for detecting DDoS attack in the cloud environment using covariance matrix. Similar research work in statistical based cloud IDS are the work of Gupta and Kumar [22] and Shamsomoali and Zareapoor [23].…”
Section: Statistical-based Techniquementioning
confidence: 99%
See 1 more Smart Citation
“…The distribution ratio of the entropy is utilized to determine flow of attack. Ismail et al [21] proposed a model for detecting DDoS attack in the cloud environment using covariance matrix. Similar research work in statistical based cloud IDS are the work of Gupta and Kumar [22] and Shamsomoali and Zareapoor [23].…”
Section: Statistical-based Techniquementioning
confidence: 99%
“…Because a standalone IDS monitors a network or host independently its capability to detect coordinated attacks is limited. In the cloud a number of research work is conducted on standalone IDS [9,15,20,21,22,23,28,29,30].…”
Section: Standalonementioning
confidence: 99%
“…This approach assumes that a node will have the available bandwidth to send an alert when it is under attack. In [52], a simple IDPS that uses a statistical method to create and apply a covariance matrix of network behaviour is proposed. Current network behaviour is compared to the created model, while the TTL of packets is used to identify the source of the attack.…”
Section: Systems For Defending Against Ddos In the Cloudmentioning
confidence: 99%
“…In [16], a method that depends on covariance-matrix was used to detect DoS attacks. This method was proven to be highly effective in detecting DoS attacks that are based on flooding.…”
Section: Denial-of-servicementioning
confidence: 99%