2020
DOI: 10.1109/tpds.2019.2942591
|View full text |Cite
|
Sign up to set email alerts
|

Exploring New Opportunities to Defeat Low-Rate DDoS Attack in Container-Based Cloud Environment

Abstract: DDoS attacks are rampant in cloud environments and continually evolve into more sophisticated and intelligent modalities, such as low-rate DDoS attacks. But meanwhile, the cloud environment is also developing in constant. Now container technology and microservice architecture are widely applied in cloud environment and compose container-based cloud environment. Comparing with traditional cloud environments, the container-based cloud environment is more lightweight in virtualization and more flexible in scaling… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
15
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
6
4

Relationship

0
10

Authors

Journals

citations
Cited by 43 publications
(17 citation statements)
references
References 42 publications
(58 reference statements)
0
15
0
Order By: Relevance
“…(NFVs), in order to provide more robust and flexible ways of controlling resources for services. Li et al [35] provided a model and mitigation technique to detect and block low-rate attacks on container-based cloud services. They proposed the isolation into two parts of instances, where one part controls requests from a whitelist (legitimate traffic) and the other serves unknown requests (both malicious and benign requests).…”
Section: Related Workmentioning
confidence: 99%
“…(NFVs), in order to provide more robust and flexible ways of controlling resources for services. Li et al [35] provided a model and mitigation technique to detect and block low-rate attacks on container-based cloud services. They proposed the isolation into two parts of instances, where one part controls requests from a whitelist (legitimate traffic) and the other serves unknown requests (both malicious and benign requests).…”
Section: Related Workmentioning
confidence: 99%
“…The average rate of LDDoS attack data flow is low and very similar to normal traffic, which can be completely hidden in normal background traffic and is not easily noticed. Because LDDoS attacks are more efficient and more harmful, it is difficult to be discovered by traditional DDoS/LDDoS attack defense systems, resulting in a rapid decline in network quality [14]. Currently, many networks do not have effective mechanisms to deal with threats from LDDoS attacks.…”
Section: Related Workmentioning
confidence: 99%
“…Siracusano et al presented a methodology for the detection of LDDoS attacks based on characteristics of malicious TCP flows [13]. Li et al considered the LDDoS attacks in the container-based cloud environment [14]. Sahoo et al presented a DDoS attack detection method in software-defined networking (SDN)based data centre networks using information distance metrics [15].…”
Section: Related Workmentioning
confidence: 99%