Defense mechanisms against DDoS attacks in a cloud computing environment: State-of-the-art and research challenges

N Agrawal, S Tapaswi - IEEE Communications Surveys & …, 2019 - ieeexplore.ieee.org
The salient features of cloud computing (such as on-demand self-service, resource pooling,
broad network access, rapid elasticity, and measured service) are being exploited by …

Distributed denial of service (DDoS) resilience in cloud: Review and conceptual cloud DDoS mitigation framework

O Osanaiye, KKR Choo, M Dlodlo - Journal of Network and Computer …, 2016 - Elsevier
Despite the increasing popularity of cloud services, ensuring the security and availability of
data, resources and services remains an ongoing research challenge. Distributed denial of …

Machine learning for cloud security: a systematic review

AB Nassif, MA Talib, Q Nasir, H Albadani… - IEEE …, 2021 - ieeexplore.ieee.org
The popularity and usage of Cloud computing is increasing rapidly. Several companies are
investing in this field either for their own use or to provide it as a service for others. One of …

DDoS attacks in cloud computing: Issues, taxonomy, and future directions

G Somani, MS Gaur, D Sanghi, M Conti… - Computer …, 2017 - Elsevier
Security issues related to the cloud computing are relevant to various stakeholders for an
informed cloud adoption decision. Apart from data breaches, the cyber security research …

Comprehensive review of artificial intelligence and statistical approaches in distributed denial of service attack and defense methods

BA Khalaf, SA Mostafa, A Mustapha… - IEEE …, 2019 - ieeexplore.ieee.org
Until now, an effective defense method against Distributed Denial of Service (DDoS) attacks
is yet to be offered by security systems. Incidents of serious damage due to DDoS attacks …

[HTML][HTML] Comprehensive review on intelligent security defences in cloud: Taxonomy, security issues, ML/DL techniques, challenges and future trends

MM Belal, DM Sundaram - Journal of King Saud University-Computer and …, 2022 - Elsevier
Nowadays, machine learning and deep learning algorithms are used in recent studies as
active security techniques instead of traditional ones to secure the cloud environment based …

Virtualization layer security challenges and intrusion detection/prevention systems in cloud computing: a comprehensive review

CN Modi, K Acha - the Journal of Supercomputing, 2017 - Springer
Virtualization plays a vital role in the construction of cloud computing. However, various
vulnerabilities are existing in current virtualization implementations, and thus there are …

MLP-GA based algorithm to detect application layer DDoS attack

KJ Singh, T De - Journal of information security and applications, 2017 - Elsevier
Abstract Distributed Denial of Service (DDoS) attack is transforming into a weapon by the
attackers, politicians, and cyber terrorists, etc. Today there is a quick ascent in the …

Mitigating TCP SYN flooding based EDOS attack in cloud computing environment using binomial distribution in SDN

SQA Shah, FZ Khan, M Ahmad - Computer Communications, 2022 - Elsevier
Cloud Computing provides an auto-scaling feature for dynamic resource utilization to cope
with their customers' requirements and charge as 'pay-per-use'. Attackers get the benefit of …

Cyber-storms come from clouds: Security of cloud computing in the IoT era

M De Donno, A Giaretta, N Dragoni, A Bucchiarone… - Future Internet, 2019 - mdpi.com
The Internet of Things (IoT) is rapidly changing our society to a world where every “thing” is
connected to the Internet, making computing pervasive like never before. This tsunami of …