Distributed denial of service (DDoS) resilience in cloud: Review and conceptual cloud DDoS mitigation framework
O Osanaiye, KKR Choo, M Dlodlo - Journal of Network and Computer …, 2016 - Elsevier
Despite the increasing popularity of cloud services, ensuring the security and availability of
data, resources and services remains an ongoing research challenge. Distributed denial of …
data, resources and services remains an ongoing research challenge. Distributed denial of …
A survey on distributed denial of service (DDoS) attacks in SDN and cloud computing environments
S Dong, K Abbas, R Jain - IEEE Access, 2019 - ieeexplore.ieee.org
Recently, software defined networks (SDNs) and cloud computing have been widely
adopted by researchers and industry. However, widespread acceptance of these novel …
adopted by researchers and industry. However, widespread acceptance of these novel …
On the security of containers: Threat modeling, attack analysis, and mitigation strategies
Traditionally, applications that are used in large and small enterprises were deployed on
“bare metal” servers installed with operating systems. Recently, the use of multiple virtual …
“bare metal” servers installed with operating systems. Recently, the use of multiple virtual …
An SDN-enabled pseudo-honeypot strategy for distributed denial of service attacks in industrial Internet of Things
Leveraging high-performance software-defined networks (SDNs) to manage industrial
Internet of Things (IIoT) devices has become a promising trend; the SDN is expected to be …
Internet of Things (IIoT) devices has become a promising trend; the SDN is expected to be …
Uncovering collateral damages and advanced defense strategies in cloud environments against DDoS attacks: A comprehensive review
Cloud computing (CC) offers on‐demand computing and resources to users, and
organizations, and is also used in many human‐centric intelligent systems. Attacks in cloud …
organizations, and is also used in many human‐centric intelligent systems. Attacks in cloud …
DDoS attacks in cloud computing: Collateral damage to non-targets
The effects of distributed denial-of-service (DDoS) attacks on cloud computing are not very
similar to those in traditional “fixed” on-premise infrastructure. In the context of DDoS attacks …
similar to those in traditional “fixed” on-premise infrastructure. In the context of DDoS attacks …
Scale inside-out: Rapid mitigation of cloud DDoS attacks
The distributed denial of service (DDoS) attacks in cloud computing requires quick
absorption of attack data. DDoS attack mitigation is usually achieved by dynamically scaling …
absorption of attack data. DDoS attack mitigation is usually achieved by dynamically scaling …
Threat modeling and security analysis of containers: A survey
Traditionally, applications that are used in large and small enterprises were deployed on"
bare metal" servers installed with operating systems. Recently, the use of multiple virtual …
bare metal" servers installed with operating systems. Recently, the use of multiple virtual …
Quick service during DDoS attacks in the container-based cloud environment
Abstract Distributed Denial of Service (DDoS) attacks are one of the biggest internet security
risks. As DDoS attacks directly target the availability of the victim's services, defending …
risks. As DDoS attacks directly target the availability of the victim's services, defending …
Availability attacks on computing systems through alteration of environmental control: smart malware approach
K Chung, ZT Kalbarczyk, RK Iyer - Proceedings of the 10th ACM/IEEE …, 2019 - dl.acm.org
In this paper, we demonstrate the feasibility of smart malware that advances state-of-the-art
attacks by (i) indirectly attacking a computing infrastructure through a cyber-physical system …
attacks by (i) indirectly attacking a computing infrastructure through a cyber-physical system …