Cloud security defence to protect cloud computing against HTTP-DoS and XML-DoS attacks
Cloud computing is still in its infancy in regards to its software as services (SAS), web
services, utility computing and platform as services (PAS). All of these have remained …
services, utility computing and platform as services (PAS). All of these have remained …
REATO: REActing TO Denial of Service attacks in the Internet of Things
Abstract Denial of Service (DoS) attack represents until now a relevant problem in Internet-
based contexts. In fact, it is both difficult to recognize and to counteract. Along with the …
based contexts. In fact, it is both difficult to recognize and to counteract. Along with the …
Defense of DDoS attack for cloud computing
L Yang, T Zhang, J Song, JS Wang… - 2012 IEEE international …, 2012 - ieeexplore.ieee.org
Though cloud computing is targeted to provide better utilization of resources using
virtualization techniques and to take up much of the work load from the client, it is fraught …
virtualization techniques and to take up much of the work load from the client, it is fraught …
Literature survey-IDS for DDoS attacks
NM Prajapati, A Mishra… - 2014 Conference on IT in …, 2014 - ieeexplore.ieee.org
In this paper, we present an overview of existing intrusion detection techniques for DDoS
attacks. All these algorithms are described more or less on their own. Intrusion detection …
attacks. All these algorithms are described more or less on their own. Intrusion detection …
[PDF][PDF] Critical review of economical denial of sustainability (EDoS) mitigation techniques
PS Bawa, S Manickam - Journal of Computer Science, 2015 - researchgate.net
Many organizations and service providers have started shifting from traditional server-cluster
infrastructure to cloud-based infrastructure. The threat of Distributed Denial of Service …
infrastructure to cloud-based infrastructure. The threat of Distributed Denial of Service …
Thwarting DDoS attacks in grid using information divergence
P Varalakshmi, ST Selvi - Future Generation Computer Systems, 2013 - Elsevier
The Grid is an emerging resource intensive environment that aims at utilizing resources
efficiently and effectively. Distributed Denial-of-Service (DDoS) attacks on the Grid can have …
efficiently and effectively. Distributed Denial-of-Service (DDoS) attacks on the Grid can have …
Countering DDoS and XDoS attacks against web services
X Ye - 2008 IEEE/IFIP International Conference on Embedded …, 2008 - ieeexplore.ieee.org
Cyber-criminals use distributed denial-of-service attacks (DDoS) and XML denial-of-service
attacks (XDoS) to extort money from online service providers. This kind of attacks is normally …
attacks (XDoS) to extort money from online service providers. This kind of attacks is normally …
Procedure for detection of and response to distributed denial of service cyber attacks on complex enterprise systems
PC Hershey, CB Silio - 2012 IEEE International Systems …, 2012 - ieeexplore.ieee.org
The increasing frequency, rising costs, and growing sophistication of cyber attacks on DoD,
agency and commercial enterprise systems are dramatically reducing the quality of end-user …
agency and commercial enterprise systems are dramatically reducing the quality of end-user …
[PDF][PDF] Protecting web services from DDoS attacks by SOTA
In the area of SOA and Web Service Security, many well defined security dimensions have
been established. However, current Web Security Systems (WS-Security for example) are …
been established. However, current Web Security Systems (WS-Security for example) are …
[PDF][PDF] Improving Situational Awareness of Critical Infrastructure with Common Cyber Picture
J Timonen - CRITICAL INFRASTRUCTURE PROTECTION … - doria.fi
Cyber operations are developing rapidly among the armies. The need of consistent and
comprehensive Common Operational Picture (COP) is a fundamental need in performing …
comprehensive Common Operational Picture (COP) is a fundamental need in performing …