Distributed denial of service (DDoS) resilience in cloud: Review and conceptual cloud DDoS mitigation framework

O Osanaiye, KKR Choo, M Dlodlo - Journal of Network and Computer …, 2016 - Elsevier
Despite the increasing popularity of cloud services, ensuring the security and availability of
data, resources and services remains an ongoing research challenge. Distributed denial of …

Botnet in DDoS attacks: trends and challenges

N Hoque, DK Bhattacharyya… - … Surveys & Tutorials, 2015 - ieeexplore.ieee.org
Threats of distributed denial of service (DDoS) attacks have been increasing day-by-day due
to rapid development of computer networks and associated infrastructure, and millions of …

Security threats, defense mechanisms, challenges, and future directions in cloud computing

S El Kafhali, I El Mir, M Hanini - Archives of Computational Methods in …, 2022 - Springer
Several new technologies such as the smart cities, the Internet of Things (IoT), and 5G
Internet need services offered by cloud computing for processing and storing more …

An empirical evaluation of information metrics for low-rate and high-rate DDoS attack detection

MH Bhuyan, DK Bhattacharyya, JK Kalita - Pattern Recognition Letters, 2015 - Elsevier
Abstract Distributed Denial of Service (DDoS) attacks represent a major threat to
uninterrupted and efficient Internet service. In this paper, we empirically evaluate several …

PCCN: parallel cross convolutional neural network for abnormal network traffic flows detection in multi-class imbalanced network traffic flows

Y Zhang, X Chen, D Guo, M Song, Y Teng… - IEEE Access, 2019 - ieeexplore.ieee.org
Network attack behavior detection using deep learning is an important research topic in the
field of network security. Currently, there are still many challenges in detecting multi-class …

Application layer denial-of-service attacks and defense mechanisms: a survey

N Tripathi, N Hubballi - ACM Computing Surveys (CSUR), 2021 - dl.acm.org
Application layer Denial-of-Service (DoS) attacks are generated by exploiting vulnerabilities
of the protocol implementation or its design. Unlike volumetric DoS attacks, these are …

SkyShield: A sketch-based defense system against application layer DDoS attacks

C Wang, TTN Miu, X Luo, J Wang - IEEE Transactions on …, 2017 - ieeexplore.ieee.org
Application layer distributed denial of service (DDoS) attacks have become a severe threat
to the security of web servers. These attacks evade most intrusion prevention systems by …

Deep learning method for denial of service attack detection based on restricted boltzmann machine

Y Imamverdiyev, F Abdullayeva - Big data, 2018 - liebertpub.com
In this article, the application of the deep learning method based on Gaussian–Bernoulli
type restricted Boltzmann machine (RBM) to the detection of denial of service (DoS) attacks …

Detection techniques of distributed denial of service attacks on software-defined networking controller–a review

MA Aladaileh, M Anbar, IH Hasbullah, YW Chong… - IEEE …, 2020 - ieeexplore.ieee.org
The wide proliferation of telecommunication technologies in the last decade gives rise to the
number of more sophisticated security threats. Software-Defined Networking (SDN) is a new …

Prevention of hello flood attack in IoT using combination of deep learning with improved rider optimization algorithm

TAS Srinivas, SS Manivannan - Computer Communications, 2020 - Elsevier
IoT are prone to vulnerabilities as a result of a lack of centralized management, dynamic
topologies, and predefined boundary. There are diverse attacks that affect the performance …