Cloud security defence to protect cloud computing against HTTP-DoS and XML-DoS attacks

A Chonka, Y Xiang, W Zhou, A Bonti - Journal of Network and Computer …, 2011 - Elsevier
Cloud computing is still in its infancy in regards to its software as services (SAS), web
services, utility computing and platform as services (PAS). All of these have remained …

REATO: REActing TO Denial of Service attacks in the Internet of Things

S Sicari, A Rizzardi, D Miorandi, A Coen-Porisini - Computer Networks, 2018 - Elsevier
Abstract Denial of Service (DoS) attack represents until now a relevant problem in Internet-
based contexts. In fact, it is both difficult to recognize and to counteract. Along with the …

Defense of DDoS attack for cloud computing

L Yang, T Zhang, J Song, JS Wang… - 2012 IEEE international …, 2012 - ieeexplore.ieee.org
Though cloud computing is targeted to provide better utilization of resources using
virtualization techniques and to take up much of the work load from the client, it is fraught …

Literature survey-IDS for DDoS attacks

NM Prajapati, A Mishra… - 2014 Conference on IT in …, 2014 - ieeexplore.ieee.org
In this paper, we present an overview of existing intrusion detection techniques for DDoS
attacks. All these algorithms are described more or less on their own. Intrusion detection …

[PDF][PDF] Critical review of economical denial of sustainability (EDoS) mitigation techniques

PS Bawa, S Manickam - Journal of Computer Science, 2015 - researchgate.net
Many organizations and service providers have started shifting from traditional server-cluster
infrastructure to cloud-based infrastructure. The threat of Distributed Denial of Service …

Thwarting DDoS attacks in grid using information divergence

P Varalakshmi, ST Selvi - Future Generation Computer Systems, 2013 - Elsevier
The Grid is an emerging resource intensive environment that aims at utilizing resources
efficiently and effectively. Distributed Denial-of-Service (DDoS) attacks on the Grid can have …

Countering DDoS and XDoS attacks against web services

X Ye - 2008 IEEE/IFIP International Conference on Embedded …, 2008 - ieeexplore.ieee.org
Cyber-criminals use distributed denial-of-service attacks (DDoS) and XML denial-of-service
attacks (XDoS) to extort money from online service providers. This kind of attacks is normally …

Procedure for detection of and response to distributed denial of service cyber attacks on complex enterprise systems

PC Hershey, CB Silio - 2012 IEEE International Systems …, 2012 - ieeexplore.ieee.org
The increasing frequency, rising costs, and growing sophistication of cyber attacks on DoD,
agency and commercial enterprise systems are dramatically reducing the quality of end-user …

[PDF][PDF] Protecting web services from DDoS attacks by SOTA

A Chonka, W Zhou, Y Xiang - 2008 - dro.deakin.edu.au
In the area of SOA and Web Service Security, many well defined security dimensions have
been established. However, current Web Security Systems (WS-Security for example) are …

[PDF][PDF] Improving Situational Awareness of Critical Infrastructure with Common Cyber Picture

J Timonen - CRITICAL INFRASTRUCTURE PROTECTION … - doria.fi
Cyber operations are developing rapidly among the armies. The need of consistent and
comprehensive Common Operational Picture (COP) is a fundamental need in performing …