2014 Global Information Infrastructure and Networking Symposium (GIIS) 2014
DOI: 10.1109/giis.2014.6934276
|View full text |Cite
|
Sign up to set email alerts
|

Reducing DDoS attacks impact using a hybrid cloud-based firewalling architecture

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
8
0

Year Published

2015
2015
2023
2023

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 16 publications
(8 citation statements)
references
References 11 publications
0
8
0
Order By: Relevance
“…Major theme of the contribution Resource Scaling (M1) [82] Multi-level (VM, service, application and cloud) [78] Dynamic resource scaling for quick detection [72] Resource scaling in federated clouds [47] Scaling to absorb the attack [ [90] Victim cloud-based network service [91] Proof-of-work scheme and ephemeral servers [92] Hybrid (On-premise firewall plus Cloud firewall) [46] Resource caps to limit the attack effects [45] Cloud metric monitoring and alarms Table 7: DDoS Attack Mitigation Techniques in Cloud clude external attacks to internal servers, internal attacks to internal servers and internal attacks to external servers. Authors provided strategies to detect the attack and get recovered using scaling and migrations in a federated cloud environment.…”
Section: Solution Category Contributionmentioning
confidence: 99%
See 2 more Smart Citations
“…Major theme of the contribution Resource Scaling (M1) [82] Multi-level (VM, service, application and cloud) [78] Dynamic resource scaling for quick detection [72] Resource scaling in federated clouds [47] Scaling to absorb the attack [ [90] Victim cloud-based network service [91] Proof-of-work scheme and ephemeral servers [92] Hybrid (On-premise firewall plus Cloud firewall) [46] Resource caps to limit the attack effects [45] Cloud metric monitoring and alarms Table 7: DDoS Attack Mitigation Techniques in Cloud clude external attacks to internal servers, internal attacks to internal servers and internal attacks to external servers. Authors provided strategies to detect the attack and get recovered using scaling and migrations in a federated cloud environment.…”
Section: Solution Category Contributionmentioning
confidence: 99%
“…On the other hand, there are not many specific products available to mitigate DDoS targeting a cloud. Authors in [92] proposed a DDoS mitigation service. This service is intended to help the physical on-premise firewall to do the mitigation quickly.…”
Section: Ddos Mitigation As a Service (Dmaas) (M5)mentioning
confidence: 99%
See 1 more Smart Citation
“…The result shows that the overall performance of this algorithm in detection accuracy and time consumption is superior to existing models. Regarding DDoS attacks, various detection strategies such as detection [36][37][38][39][40][41][42][43][44][45], mitigation [46][47][48][49][50][51][52][53][54] and Defence techniques [55][56][57][58][59][60][61][62][63][64][65][66] proposed for the cloud, and the performance compared. The comparative analysis based on the above said categories are given in Table-5, Table-6, and Table-7.…”
Section: A Survey Of Ddos Attacksmentioning
confidence: 99%
“…Guenane et al [48] present a DDoS mitigation service using an innovative architecture that provides hybrid (Physical and Virtual) cloud-based firewalling services. The physical firewalls represent the physical IT-security infrastructure of the company.…”
Section: Security Architecturementioning
confidence: 99%