2022
DOI: 10.1016/j.comcom.2021.11.008
|View full text |Cite
|
Sign up to set email alerts
|

Mitigating TCP SYN flooding based EDOS attack in cloud computing environment using binomial distribution in SDN

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
5
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 15 publications
(9 citation statements)
references
References 36 publications
0
5
0
Order By: Relevance
“…• EDOS-TSM: Shah et al 83 introduces EDoS-TCP SYN mitigation model (EDOS-TSM), an SDN-based statistical anomaly detection methodology for quick and effective TCP SYN flooding attack mitigation. To identify source-based and spoofing-based attacks, EDOS-TSM employs binomial probability, TTL field values from IP packet headers, and multiple TCP SYN requests.…”
Section: Levelmentioning
confidence: 99%
See 1 more Smart Citation
“…• EDOS-TSM: Shah et al 83 introduces EDoS-TCP SYN mitigation model (EDOS-TSM), an SDN-based statistical anomaly detection methodology for quick and effective TCP SYN flooding attack mitigation. To identify source-based and spoofing-based attacks, EDOS-TSM employs binomial probability, TTL field values from IP packet headers, and multiple TCP SYN requests.…”
Section: Levelmentioning
confidence: 99%
“…The proposed approach implements a gated recurrent unit which helps in reducing the vanishing gradient problem and can also capture complex temporal dependence relations. To reduce the error rate, a self‐adjusting threshold is also introduced, whereas the present solutions generally utilize a fixed threshold to analyze the anomalies, which somehow results in increased error rates. EDOS‐TSM : Shah et al 83 introduces EDoS‐TCP SYN mitigation model (EDOS‐TSM), an SDN‐based statistical anomaly detection methodology for quick and effective TCP SYN flooding attack mitigation. To identify source‐based and spoofing‐based attacks, EDOS‐TSM employs binomial probability, TTL field values from IP packet headers, and multiple TCP SYN requests.…”
Section: Defense Mechanism For Indirect Attackmentioning
confidence: 99%
“…SDN classifies and separates incoming traffic and blocks them before the attack on the target VM (Virtual Machines). In order to overcome TCP SYN flooding attacks from spoofed IPs, the EDOS-TSM Model (EDOS-TCP SYN mitigation model) comes into effect [7].…”
Section: Literature Reviewmentioning
confidence: 99%
“…A quick way to temporarily resolve this issue is by turning off the ICMP request on the server. But most companies use an auto-scaling technique, which enlarges their resources according to the traffic and the downside of this process is EDOS (Economic denial of sustainability), resulting in clients paying charges for the resources they haven't used [7] Cloud computing provides the services managed by on-premises through cloud technology and they are very much vulnerable to malicious virus attacks DDoS attacks are some of the common attacks faced in the field of cloud technology [8]. DDoS attacks bring forth a huge amount of loss to the attacked company or the service.…”
Section: Figure 21 Algorithms Used In Detection Systemmentioning
confidence: 99%
“…SDN consists of a central controller with global visibility of the network state, and the communication between the controller and the switches is usually handled using the open and standard protocol OpenFlow [ 6 ], which allows the controller to update the flow rules in any switch directly once there is a demand. This simplified network architecture makes network control more flexible and enables SDN to be widely used in cloud data center network [ 7 , 8 ], wireless LANs [ 9 , 10 ], and cloud computing [ 11 , 12 ]. However, the centralized topology of SDN is vulnerable to DDoS attacks.…”
Section: Introductionmentioning
confidence: 99%