2018
DOI: 10.1007/s11768-018-8002-8
|View full text |Cite
|
Sign up to set email alerts
|

Secure design for cloud control system against distributed denial of service attack

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
19
0

Year Published

2019
2019
2021
2021

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 35 publications
(19 citation statements)
references
References 14 publications
0
19
0
Order By: Relevance
“…In particular, the authors of [ 63 , 98 ] discussed threshold-based attack detection mechanisms, and the analysis of transmission failure patterns to distinguish strategic attacks and non-malicious failures was explored by Cetinkaya et al [ 26 ]. In addition, Ali et al [ 99 ] recently considered methods from information technologies for detecting and mitigating distributed DoS attacks against networked control systems.…”
Section: An Overview Of Attack-resilient Control and Communicationmentioning
confidence: 99%
“…In particular, the authors of [ 63 , 98 ] discussed threshold-based attack detection mechanisms, and the analysis of transmission failure patterns to distinguish strategic attacks and non-malicious failures was explored by Cetinkaya et al [ 26 ]. In addition, Ali et al [ 99 ] recently considered methods from information technologies for detecting and mitigating distributed DoS attacks against networked control systems.…”
Section: An Overview Of Attack-resilient Control and Communicationmentioning
confidence: 99%
“…For most of the web applications (e.g. online auctions and online retail sales), security of the network is a major factor in the internet services [1]. Intrusion detection system (IDS) was noted as an effective method to detect DDoS attack and ensures the functional cloud services [6].…”
Section: Introductionmentioning
confidence: 99%
“…Intrusion detection system (IDS) was noted as an effective method to detect DDoS attack and ensures the functional cloud services [6]. IDS detects the computer attacks by investigating the records, which are collected from the internet [1].…”
Section: Introductionmentioning
confidence: 99%
See 2 more Smart Citations