2013
DOI: 10.1504/ijcnds.2013.056223
|View full text |Cite
|
Sign up to set email alerts
|

Detection of distributed denial of service attacks in cloud computing by identifying spoofed IP

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2016
2016
2022
2022

Publication Types

Select...
4
1
1

Relationship

0
6

Authors

Journals

citations
Cited by 15 publications
(4 citation statements)
references
References 15 publications
0
4
0
Order By: Relevance
“…To analyze the performance, input files of varied sizes are employed.The system's performance is evaluated using three metrics: attack detection time, Rate of Reporting. The above system is contrasted with the AntiDDoS framework [10] and the Scale in-out model [17]. The experiment was carried out by varying the number of DDoS attacks recorded on the deployed cloud server.…”
Section: B Results Analysismentioning
confidence: 99%
See 1 more Smart Citation
“…To analyze the performance, input files of varied sizes are employed.The system's performance is evaluated using three metrics: attack detection time, Rate of Reporting. The above system is contrasted with the AntiDDoS framework [10] and the Scale in-out model [17]. The experiment was carried out by varying the number of DDoS attacks recorded on the deployed cloud server.…”
Section: B Results Analysismentioning
confidence: 99%
“…Barde et al, [17] A "deception detection" approach were proposed for detecting high-rate DDoS attack traffic in the cloud computing domain.…”
Section: Related Workmentioning
confidence: 99%
“…Application response time: Response time refers to the fact that the defense system can save the bandwidth and resources of the cloud system from congestion and unavailability as a result of attacks [115], [124]. Preetha et al [125] use this metric to determine the performance of their defense technique given three kinds of application: FTP, email, and HTTP.…”
Section: ) Attack Mitigationmentioning
confidence: 99%
“…Cloud resource consumption: Authors use this metric in defense and non-defense scenarios as a way of demonstrating how the defense system alleviates the impact that DDoS attacks have on cloud service performance. It is typically expressed through CPU consumption [126] or network bandwidth utilization [123], [124] and [127]. It can be evaluated while the type of attack is made to vary [128].…”
Section: ) Attack Mitigationmentioning
confidence: 99%