Distributed denial of service (DDoS) resilience in cloud: Review and conceptual cloud DDoS mitigation framework
O Osanaiye, KKR Choo, M Dlodlo - Journal of Network and Computer …, 2016 - Elsevier
Despite the increasing popularity of cloud services, ensuring the security and availability of
data, resources and services remains an ongoing research challenge. Distributed denial of …
data, resources and services remains an ongoing research challenge. Distributed denial of …
Botnet in DDoS attacks: trends and challenges
N Hoque, DK Bhattacharyya… - … Surveys & Tutorials, 2015 - ieeexplore.ieee.org
Threats of distributed denial of service (DDoS) attacks have been increasing day-by-day due
to rapid development of computer networks and associated infrastructure, and millions of …
to rapid development of computer networks and associated infrastructure, and millions of …
Security threats, defense mechanisms, challenges, and future directions in cloud computing
S El Kafhali, I El Mir, M Hanini - Archives of Computational Methods in …, 2022 - Springer
Several new technologies such as the smart cities, the Internet of Things (IoT), and 5G
Internet need services offered by cloud computing for processing and storing more …
Internet need services offered by cloud computing for processing and storing more …
An empirical evaluation of information metrics for low-rate and high-rate DDoS attack detection
Abstract Distributed Denial of Service (DDoS) attacks represent a major threat to
uninterrupted and efficient Internet service. In this paper, we empirically evaluate several …
uninterrupted and efficient Internet service. In this paper, we empirically evaluate several …
PCCN: parallel cross convolutional neural network for abnormal network traffic flows detection in multi-class imbalanced network traffic flows
Network attack behavior detection using deep learning is an important research topic in the
field of network security. Currently, there are still many challenges in detecting multi-class …
field of network security. Currently, there are still many challenges in detecting multi-class …
Application layer denial-of-service attacks and defense mechanisms: a survey
N Tripathi, N Hubballi - ACM Computing Surveys (CSUR), 2021 - dl.acm.org
Application layer Denial-of-Service (DoS) attacks are generated by exploiting vulnerabilities
of the protocol implementation or its design. Unlike volumetric DoS attacks, these are …
of the protocol implementation or its design. Unlike volumetric DoS attacks, these are …
SkyShield: A sketch-based defense system against application layer DDoS attacks
Application layer distributed denial of service (DDoS) attacks have become a severe threat
to the security of web servers. These attacks evade most intrusion prevention systems by …
to the security of web servers. These attacks evade most intrusion prevention systems by …
Deep learning method for denial of service attack detection based on restricted boltzmann machine
Y Imamverdiyev, F Abdullayeva - Big data, 2018 - liebertpub.com
In this article, the application of the deep learning method based on Gaussian–Bernoulli
type restricted Boltzmann machine (RBM) to the detection of denial of service (DoS) attacks …
type restricted Boltzmann machine (RBM) to the detection of denial of service (DoS) attacks …
Detection techniques of distributed denial of service attacks on software-defined networking controller–a review
The wide proliferation of telecommunication technologies in the last decade gives rise to the
number of more sophisticated security threats. Software-Defined Networking (SDN) is a new …
number of more sophisticated security threats. Software-Defined Networking (SDN) is a new …
Prevention of hello flood attack in IoT using combination of deep learning with improved rider optimization algorithm
TAS Srinivas, SS Manivannan - Computer Communications, 2020 - Elsevier
IoT are prone to vulnerabilities as a result of a lack of centralized management, dynamic
topologies, and predefined boundary. There are diverse attacks that affect the performance …
topologies, and predefined boundary. There are diverse attacks that affect the performance …