2006 IEEE International Conference on Web Services (ICWS'06) 2006
DOI: 10.1109/icws.2006.102
|View full text |Cite
|
Sign up to set email alerts
|

Preventing Service Oriented Denial of Service (PreSODoS): A Proposed Approach

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
14
0

Year Published

2010
2010
2020
2020

Publication Types

Select...
4
4
1

Relationship

0
9

Authors

Journals

citations
Cited by 28 publications
(14 citation statements)
references
References 0 publications
0
14
0
Order By: Relevance
“…In this paper, the proposed approach provides a new cybersecurity approach for protecting cloud services against all DDoS attacks such as volumebased, protocol-based, and application layer-based DDoS attacks. The proposed approach considered as a more general model comparing with other approaches mentioned above such as the cloud defender system presented in [11][12][13][14], which focuses on the application-layer attacks to detect and prevent HTTP or XML-based DDoS attacks, as well as the system presented in [31,32] which focuses on the detection and prevention of DDoS attacks in SIPbased Voice over IP networks.…”
Section: Related Workmentioning
confidence: 99%
“…In this paper, the proposed approach provides a new cybersecurity approach for protecting cloud services against all DDoS attacks such as volumebased, protocol-based, and application layer-based DDoS attacks. The proposed approach considered as a more general model comparing with other approaches mentioned above such as the cloud defender system presented in [11][12][13][14], which focuses on the application-layer attacks to detect and prevent HTTP or XML-based DDoS attacks, as well as the system presented in [31,32] which focuses on the detection and prevention of DDoS attacks in SIPbased Voice over IP networks.…”
Section: Related Workmentioning
confidence: 99%
“…This type of attack exploits vulnerable points within the standard components supporting the technology. There are several initiatives within this field: [7,[11][12][13][14][15][16][17][18]. However, the main common disadvantage that each of these approaches has is their low capacity to adapt themselves to changes in the patterns.…”
Section: Introductionmentioning
confidence: 99%
“…Padmanabhun et al [31] give an overview of the underlying issues behind XML and how this can lead to a DoS. They explain how SOAP allows to send and receive XML messages regardless of the underlying implementation of the application or the transport protocol (HTTP, SMTP, etc.…”
Section: Xml-dos and Http-dosmentioning
confidence: 99%