A comprehensive review of vulnerabilities and AI-enabled defense against DDoS attacks for securing cloud services
The advent of cloud computing has made a global impact by providing on-demand services,
elasticity, scalability, and flexibility, hence delivering cost-effective resources to end users in …
elasticity, scalability, and flexibility, hence delivering cost-effective resources to end users in …
Application layer denial-of-service attacks and defense mechanisms: a survey
N Tripathi, N Hubballi - ACM Computing Surveys (CSUR), 2021 - dl.acm.org
Application layer Denial-of-Service (DoS) attacks are generated by exploiting vulnerabilities
of the protocol implementation or its design. Unlike volumetric DoS attacks, these are …
of the protocol implementation or its design. Unlike volumetric DoS attacks, these are …
Detection of reduction-of-quality DDoS attacks using Fuzzy Logic and machine learning algorithms
Abstract Distributed Denial of Service (DDoS) attacks are still among the most dangerous
attacks on the Internet. With the advance of methods for detecting and mitigating these …
attacks on the Internet. With the advance of methods for detecting and mitigating these …
Detection system of HTTP DDoS attacks in a cloud environment based on information theoretic entropy and random forest
M Idhammad, K Afdel, M Belouch - Security and …, 2018 - Wiley Online Library
Cloud Computing services are often delivered through HTTP protocol. This facilitates access
to services and reduces costs for both providers and end‐users. However, this increases the …
to services and reduces costs for both providers and end‐users. However, this increases the …
SlowITe, a novel denial of service attack affecting MQTT
I Vaccari, M Aiello, E Cambiaso - Sensors, 2020 - mdpi.com
Security of the Internet of Things is a crucial topic, due to the criticality of the networks and
the sensitivity of exchanged data. In this paper, we target the Message Queue Telemetry …
the sensitivity of exchanged data. In this paper, we target the Message Queue Telemetry …
Distributed real-time SlowDoS attacks detection over encrypted traffic using Artificial Intelligence
N Garcia, T Alcaniz, A González-Vidal… - Journal of Network and …, 2021 - Elsevier
SlowDoS attacks exploit slow transmissions on application-level protocols like HTTP to carry
out denial of service against web-servers. These attacks are difficult to be detected with …
out denial of service against web-servers. These attacks are difficult to be detected with …
Slow rate denial of service attacks against HTTP/2 and detection
N Tripathi, N Hubballi - Computers & security, 2018 - Elsevier
HTTP/2 is a newly standardized protocol designed to efficiently utilize the TCP's
transmission rate and has other advantages compared to HTTP/1.1. However its threat …
transmission rate and has other advantages compared to HTTP/1.1. However its threat …
Increasing web service availability by detecting application-layer DDoS attacks in encrypted traffic
M Zolotukhin, T Hämäläinen… - 2016 23rd …, 2016 - ieeexplore.ieee.org
Nowadays, zero-day Denial-of-Service (DoS) attacks become frighteningly common in high-
speed networks due to constantly increasing number of vulnerabilities. Moreover, these …
speed networks due to constantly increasing number of vulnerabilities. Moreover, these …
How secure are web servers? An empirical study of slow HTTP DoS attacks and detection
Slow HTTP Denial of Service (DoS) is an application layer DoS attack in which large number
of incomplete HTTP requests are sent. If number of such open connections in the server …
of incomplete HTTP requests are sent. If number of such open connections in the server …
Slowtt: A slow denial of service against iot networks
I Vaccari, M Aiello, E Cambiaso - Information, 2020 - mdpi.com
The security of Internet of Things environments is a critical and trending topic, due to the
nature of the networks and the sensitivity of the exchanged information. In this paper, we …
nature of the networks and the sensitivity of the exchanged information. In this paper, we …