2014
DOI: 10.1504/ijcc.2014.066790
|View full text |Cite
|
Sign up to set email alerts
|

FAPA: flooding attack protection architecture in a cloud system

Abstract: The rate of acceptance of clouds each year is making cloud computing the leading IT computational technology. While cloud computing can be productive and economical, it is still vulnerable to different types of external threats, one of which is a Denial of Service (DoS) attack. DoS attacks have long been an open security problem of the internet. Most proposed solutions to address DoS attacks require upgrades in routers, modification in the BGP (Border Gateway Protocol), usage of additional control bits in the … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
2
0

Year Published

2017
2017
2023
2023

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(3 citation statements)
references
References 54 publications
0
2
0
Order By: Relevance
“…By monitoring every user's cloud access and maintaining current access patterns, the upgraded decoy technology generates individual user profiles. A misinformation assault is launched when anomalous activity take place, like targeted data searches or unauthorized access [16].…”
Section: Litrature Reviewmentioning
confidence: 99%
“…By monitoring every user's cloud access and maintaining current access patterns, the upgraded decoy technology generates individual user profiles. A misinformation assault is launched when anomalous activity take place, like targeted data searches or unauthorized access [16].…”
Section: Litrature Reviewmentioning
confidence: 99%
“…According to a report from Cloud Security Alliances, the top thirteen threats for cloud in 2016 are as following [5] Many intruders are willing to take benefit of the human elements in the system, because they are generally the weakest link. Emails and their attachments via emails can cause the deception.…”
Section: Recent Attacks On Cloudmentioning
confidence: 99%
“…The strength of the password is measured, whether It is an encrypted password or graphically encrypted password or single one [5].…”
Section: Rota=ebit/total Net Asset Where Ebit=net Income+ Interest Ementioning
confidence: 99%