A comprehensive review of vulnerabilities and AI-enabled defense against DDoS attacks for securing cloud services
The advent of cloud computing has made a global impact by providing on-demand services,
elasticity, scalability, and flexibility, hence delivering cost-effective resources to end users in …
elasticity, scalability, and flexibility, hence delivering cost-effective resources to end users in …
A survey and taxonomy of DoS attacks in cloud computing
M Masdari, M Jalali - Security and Communication Networks, 2016 - Wiley Online Library
Abstract Denial‐of‐service (DoS) attacks are one of the major security challenges in the
emerging cloud computing models. Currently, numerous types of DoS attacks are conducted …
emerging cloud computing models. Currently, numerous types of DoS attacks are conducted …
A survey of denial-of-service and distributed denial of service attacks and defenses in cloud computing
A Bonguet, M Bellaiche - Future Internet, 2017 - mdpi.com
Cloud Computing is a computing model that allows ubiquitous, convenient and on-demand
access to a shared pool of highly configurable resources (eg, networks, servers, storage …
access to a shared pool of highly configurable resources (eg, networks, servers, storage …
Web services attacks and security-a systematic literature review
VR Mouli, KP Jevitha - Procedia Computer Science, 2016 - Elsevier
Web Services allow applications to communicate with each other independent of platform
and/or language. They are prone to attacks in the form of Denial-Of-Service, XML, XPath …
and/or language. They are prone to attacks in the form of Denial-Of-Service, XML, XPath …
Application-layer denial of service attacks: taxonomy and survey
The recent escalation of application-layer denial of service (DoS) attacks has attracted a
significant interest of the security research community. Since application-layer DoS attacks …
significant interest of the security research community. Since application-layer DoS attacks …
Known xml vulnerabilities are still a threat to popular parsers and open source systems
The Extensible Markup Language (XML) is extensively used in software systems and
services. Various XML-based attacks, which may result in sensitive information leakage or …
services. Various XML-based attacks, which may result in sensitive information leakage or …
DDoS attacks in service clouds
S Alqahtani, RF Gamble - 2015 48th Hawaii International …, 2015 - ieeexplore.ieee.org
The scalability and dynamic configuration of service clouds can be susceptible to Distributed
Denial of Service (DDoS) attacks. The attack on web services causes a performance …
Denial of Service (DDoS) attacks. The attack on web services causes a performance …
A search-based testing approach for XML injection vulnerabilities in web applications
In most cases, web applications communicate with web services (SOAP and RESTful). The
former act as a front-end to the latter, which contain the business logic. A hacker might not …
former act as a front-end to the latter, which contain the business logic. A hacker might not …
Defending web services against denial of service attacks using client puzzles
The interoperable and loosely-coupled web services architecture, while beneficial, can be
resource-intensive, and is thus susceptible to denial of service (DoS) attacks in which an …
resource-intensive, and is thus susceptible to denial of service (DoS) attacks in which an …
Discovering fuzzy association rule patterns and increasing sensitivity analysis of XML-related attacks
Most active research in Host and Network-based Intrusion Detection (ID) and Intrusion
Prevention (IP) systems are only able to detect and prevent attacks of the computer systems …
Prevention (IP) systems are only able to detect and prevent attacks of the computer systems …