The 2014 International Symposium on Networks, Computers and Communications 2014
DOI: 10.1109/sncc.2014.6866508
|View full text |Cite
|
Sign up to set email alerts
|

Distributed Denial of service attacks and its effects on Cloud environment- a survey

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
19
0

Year Published

2016
2016
2020
2020

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 28 publications
(20 citation statements)
references
References 7 publications
0
19
0
Order By: Relevance
“…When publishing, large packets are generated by hackers using a "spoofing" technique. The phony IP address that is attached to these packets becomes the victim, as their IP is flooded with traffic [27].…”
Section: Protocol-based Attacksmentioning
confidence: 99%
“…When publishing, large packets are generated by hackers using a "spoofing" technique. The phony IP address that is attached to these packets becomes the victim, as their IP is flooded with traffic [27].…”
Section: Protocol-based Attacksmentioning
confidence: 99%
“…Internet Control Message Protocol is one of the popular protocols, which has been utilized in various DoS attacks . Some of the ICMP‐based flooding attacks are as follows: ICMP ping flood attack Ping of death attack Smurf attack ICMP spoofing attack …”
Section: Denial‐of‐service On the Cloud Networking Infrastructurementioning
confidence: 99%
“…Internet Control Message Protocol is one of the popular protocols, which has been utilized in various DoS attacks [99,100]. Some of the ICMP-based flooding attacks are as follows:…”
Section: Internet Control Message Protocol-based Denial-of-service Atmentioning
confidence: 99%
“…These services can be accessible over a cloud management interface layer, which provides access over Representational State Transfer (REST)/Simple Object Access Protocol (SOAP) Application Programming Interfaces (APIs) or a management console website (Andrey Petukhov 2008;Doroodchi et al 2009;Gruschka and Iacono 2009;Antunes and Vieira 2011;Mainka et al 2012;Falkenberg et al 2013;Blome et al 2013;Zhou and Evans 2014;Prabadevi and Jeyanthi 2014;Kupser et al 2015;Subashini and Kavitha 2011;Masood and Java 2015;Fett et al 2015). Therefore, in addition to the existing security issues for traditional setting such as access control, secure communication, data confidentiality, integrity, availability, and privacy cloud systems bring new cloud specific security challenges (Ardagna et al 2015).…”
Section: Roadmapmentioning
confidence: 99%