2017
DOI: 10.14738/tmlai.54.3220
|View full text |Cite
|
Sign up to set email alerts
|

Mitigating Economic Denial of Sustainability Attacks to Secure Cloud Computing Environments

Abstract: In cloud computing environment where the infrastructure is shared by millions of users, attackers have the opportunity to ensure more damage to the compromised resources. The main aim of such attacks is to saturate and overload the system network through a massive data packets size flooding toward a victim server and to block the service to customers. The Distributed Denialofservice (DDoS) attack is considered one of the largest threats to the Quality of Service (QoS) of cloud services which is used to deny ac… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
2
0

Year Published

2017
2017
2024
2024

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 7 publications
(2 citation statements)
references
References 20 publications
(18 reference statements)
0
2
0
Order By: Relevance
“…Furthermore, the cloud service model's adopters are charged centered on a pay-per-use basis of the cloud's server along with network resources that are extensively identified as utility computing. Most organizations avoid CC because of the security issue, albeit this technology offers disparate services to its users (Aborujilah and Musa 2017;Zekri et al 2017). On account of the intruding behavior of attackers, accessing the internet through the cloud brings about vulnerable attacks on the stored data.…”
Section: Introductionmentioning
confidence: 99%
“…Furthermore, the cloud service model's adopters are charged centered on a pay-per-use basis of the cloud's server along with network resources that are extensively identified as utility computing. Most organizations avoid CC because of the security issue, albeit this technology offers disparate services to its users (Aborujilah and Musa 2017;Zekri et al 2017). On account of the intruding behavior of attackers, accessing the internet through the cloud brings about vulnerable attacks on the stored data.…”
Section: Introductionmentioning
confidence: 99%
“…Over the years, the most widely used methods to detect Intrusion detection with DoS and DDoS attacks are based on machine learning algorithms. One such algorithm where the results were accurate and efficient in detecting the DDoS attack was using Decision Tree C4.5 algorithm [10]. Liao et al [11] proposed a scheme based on SVM to detect the DDoS attacks using detection scheme base algorithm.…”
mentioning
confidence: 99%