4.6 Review

Distributed Denial of Service Attacks against Cloud Computing Environment: Survey, Issues, Challenges and Coherent Taxonomy

相关参考文献

注意:仅列出部分参考文献,下载原文获取全部文献信息。
Article Chemistry, Multidisciplinary

Renyi Joint Entropy-Based Dynamic Threshold Approach to Detect DDoS Attacks against SDN Controller with Various Traffic Rates

Mohammad Adnan Aladaileh et al.

Summary: The increasing incidence of DDoS attacks has made protecting SDN controllers crucial. The proposed detection approach efficiently identifies low- and high-rate DDoS attacks with a high detection rate and low false positive rate, outperforming existing approaches.

APPLIED SCIENCES-BASEL (2022)

Article Computer Science, Artificial Intelligence

Intrusion detection system based on hybridizing a modified binary grey wolf optimization and particle swarm optimization

Qusay M. Alzubi et al.

Summary: The proposed hybrid optimization approach outperforms existing solutions in terms of detection accuracy, detection rate, false alarm rate reduction, feature reduction, and processing time.

EXPERT SYSTEMS WITH APPLICATIONS (2022)

Article Computer Science, Information Systems

An OpenStack based cloud testbed framework for evaluating HTTP flooding attacks

A. Dhanapal et al.

Summary: The complexity of cloud infrastructure and the unique characteristics of cloud computing make detecting DDoS attacks challenging. This study proposes a cloud testbed framework implemented in the OpenStack environment for evaluating solutions against HTTP flooding DDoS attacks, using real-time data from the FIFA World Cup 1998.

WIRELESS NETWORKS (2021)

Article Computer Science, Artificial Intelligence

Hybrid rule-based botnet detection approach using machine learning for analysing DNS traffic

Saif Al-Mashhadi et al.

Summary: This study examines the abnormality of DNS traffic during the botnet lifecycle to extract significant enriched features, which are further analyzed using two machine learning algorithms. The output of two algorithms proposes a novel hybrid rule detection model approach. The experimental results show that the proposed approach has a 99.96% accuracy and a 1.6% false-positive rate, outperforming other state-of-the-art DNS-based botnet detection approaches.

PEERJ COMPUTER SCIENCE (2021)

Article Computer Science, Artificial Intelligence

An efficient metaheuristic algorithm based feature selection and recurrent neural network for DoS attack detection in cloud computing environment

Reddy SaiSindhuTheja et al.

Summary: This paper proposes an efficient DoS attack detection system using the Oppositional Crow Search Algorithm, which outperforms other conventional methods in terms of Precision, Recall, F-Measure, and Accuracy by significant margins. The experimental results demonstrate the effectiveness of the proposed technique in separating standard data and removing compromised data.

APPLIED SOFT COMPUTING (2021)

Article Computer Science, Hardware & Architecture

Have it Your Way: Generating Customized Log Datasets With a Model-Driven Simulation Testbed

Max Landauer et al.

Summary: This article proposes generating testbeds for IDS evaluation using strategies from model-driven engineering, which improves the configurability and flexibility of the testbeds and allows for the reuse of components across multiple scenarios.

IEEE TRANSACTIONS ON RELIABILITY (2021)

Article Computer Science, Information Systems

Mathematical Approach as Qualitative Metrics of Distributed Denial of Service Attack Detection Mechanisms

Ayman Ghaben et al.

Summary: The study analyzed existing DDoS attack detection mechanisms and found issues such as insufficient use of mathematical functions and inaccurate calculation of quantitative metrics. By proposing new qualitative metrics and measuring the relationship between quantitative and qualitative metrics, the study revealed the authenticity of detection accuracy and the manipulation of reported accuracy.

IEEE ACCESS (2021)

Article Computer Science, Artificial Intelligence

Detection of HTTP flooding attacks in cloud using fuzzy bat clustering

T. Raja Sree et al.

NEURAL COMPUTING & APPLICATIONS (2020)

Proceedings Paper Computer Science, Artificial Intelligence

New Architecture Design of Cloud Computing Using Software Defined Networking and Network Function Virtualization Technology

Abdullah Ahmed Bahashwan et al.

EMERGING TRENDS IN INTELLIGENT COMPUTING AND INFORMATICS: DATA SCIENCE, INTELLIGENT INFORMATION SYSTEMS AND SMART COMPUTING (2020)

Proceedings Paper Computer Science, Artificial Intelligence

Distributed Denial of Service (DDoS) Attacks Detection System for OpenStack-based Private Cloud

Karan B. Virupakshar et al.

INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND DATA SCIENCE (2020)

Review Computer Science, Information Systems

Detection Techniques of Distributed Denial of Service Attacks on Software-Defined Networking Controller-A Review

Mohammad A. Aladaileh et al.

IEEE ACCESS (2020)

Article Computer Science, Theory & Methods

Software-defined Networking-based DDoS Defense Mechanisms

Rochak Swami et al.

ACM COMPUTING SURVEYS (2019)

Article Computer Science, Theory & Methods

Intelligent defense using pretense against targeted attacks in cloud platforms

Roshan Lal Neupane et al.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2019)

Proceedings Paper Computer Science, Interdisciplinary Applications

Hybridizing Entropy Based Mechanism with Adaptive Threshold Algorithm to Detect RA Flooding Attack in IPv6 Networks

Syafiq Bin Ibrahim Shah et al.

COMPUTATIONAL SCIENCE AND TECHNOLOGY (2019)

Proceedings Paper Computer Science, Artificial Intelligence

Detection Techniques for DDoS Attacks in Cloud Environment: Review Paper

Sultan T. Alanazi et al.

INTELLIGENT AND INTERACTIVE COMPUTING (2019)

Article Computer Science, Interdisciplinary Applications

Performance Analysis of an Effective Approach to Protect Cloud Systems Against Application Layer Based Attacks

Hosam F. El-Sofany et al.

INTERNATIONAL JOURNAL OF ONLINE AND BIOMEDICAL ENGINEERING (2019)

Proceedings Paper Computer Science, Artificial Intelligence

A Review on Detection Approaches for Distributed Denial of Service Attacks

Rutika S. Chaudhari et al.

PROCEEDINGS OF THE 2019 INTERNATIONAL CONFERENCE ON INTELLIGENT SUSTAINABLE SYSTEMS (ICISS 2019) (2019)

Article Computer Science, Hardware & Architecture

Access control for cyber-physical systems interconnected to the cloud

Javier Lopez et al.

COMPUTER NETWORKS (2018)

Article Computer Science, Information Systems

Detection System of HTTP DDoS Attacks in a Cloud Environment Based on Information Theoretic Entropy and Random Forest

Mohamed Idhammad et al.

SECURITY AND COMMUNICATION NETWORKS (2018)

Article Computer Science, Information Systems

An SVM-based framework for detecting DoS attacks in virtualized clouds under changing environment

Adel Abusitta et al.

JOURNAL OF CLOUD COMPUTING-ADVANCES SYSTEMS AND APPLICATIONS (2018)

Review Computer Science, Artificial Intelligence

Taxonomy of DoS and DDoS attacks and desirable defense mechanism in a Cloud computing environment

B. B. Gupta et al.

NEURAL COMPUTING & APPLICATIONS (2017)

Article Computer Science, Artificial Intelligence

A protocol-free detection against cloud oriented reflection DoS attacks

Le Xiao et al.

SOFT COMPUTING (2017)

Article Computer Science, Information Systems

Introducing Fraudulent Energy Consumption in Cloud Infrastructures: A New Generation of Denial-of-Service Attacks

Massimo Ficco et al.

IEEE SYSTEMS JOURNAL (2017)

Proceedings Paper Computer Science, Information Systems

A Lightweight Approach to Detect the Low/High Rate IP Spoofed Cloud DDoS Attacks

Neha Agrawal et al.

2017 IEEE 7TH INTERNATIONAL SYMPOSIUM ON CLOUD AND SERVICE COMPUTING (SC2 2017) (2017)

Proceedings Paper Computer Science, Theory & Methods

Broad and Load-Aware Anycast Mapping with Verfploeter

Wouter B. de Vries et al.

PROCEEDINGS OF THE 2017 INTERNET MEASUREMENT CONFERENCE (IMC'17) (2017)

Proceedings Paper Computer Science, Theory & Methods

DDOS Attack Detection System based on Analysis of Users' Behaviors for Application Layer

Bi Meng et al.

2017 IEEE INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE AND ENGINEERING (CSE) AND IEEE/IFIP INTERNATIONAL CONFERENCE ON EMBEDDED AND UBIQUITOUS COMPUTING (EUC), VOL 1 (2017)

Article Computer Science, Hardware & Architecture

Controlled access to cloud resources for mitigating Economic Denial of Sustainability (EDoS) attacks

Zubair A. Baig et al.

COMPUTER NETWORKS (2016)

Article Physics, Multidisciplinary

Entropy-Based Application Layer DDoS Attack Detection Using Artificial Neural Networks

Khundrakpam Johnson Singh et al.

ENTROPY (2016)

Review Computer Science, Hardware & Architecture

Distributed denial of service (DDoS) resilience in cloud: Review and conceptual cloud DDoS mitigation framework

Opeyemi Osanaiye et al.

JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2016)

Article Computer Science, Artificial Intelligence

A Cloud Computing Based Network Monitoring and Threat Detection System for Critical Infrastructures

Zhijiang Chen et al.

BIG DATA RESEARCH (2016)

Article Computer Science, Hardware & Architecture

DDoS attack protection in the era of cloud computing and Software-Defined Networking

Bing Wang et al.

COMPUTER NETWORKS (2015)

Article Computer Science, Information Systems

Security in cloud computing: Opportunities and challenges

Mazhar Ali et al.

INFORMATION SCIENCES (2015)

Review Computer Science, Hardware & Architecture

Taxonomy of Distributed Denial of Service mitigation approaches for cloud computing

Alireza Shameli-Sendi et al.

JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2015)

Proceedings Paper Automation & Control Systems

Detection of DoS/DDoS attack against HTTP Servers using Naive Bayesian

Vijay Katkar et al.

1ST INTERNATIONAL CONFERENCE ON COMPUTING COMMUNICATION CONTROL AND AUTOMATION ICCUBEA 2015 (2015)

Proceedings Paper Computer Science, Information Systems

Simulation-Based Study of Distributed Denial of Service Attacks Prevention in the Cloud

Wael Alosaimi et al.

2015 9TH INTERNATIONAL CONFERENCE ON NEXT GENERATION MOBILE APPLICATIONS, SERVICES AND TECHNOLOGIES (NGMAST 2015) (2015)

Proceedings Paper Computer Science, Information Systems

Analysis of DDoS Attacks and an Introduction of a Hybrid Statistical Model to Detect DDoS Attacks on Cloud Computing Environment

Anteneh Girma et al.

2015 12TH INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY - NEW GENERATIONS (2015)

Proceedings Paper Computer Science, Information Systems

DDoS Attacks in Service Clouds

Sarra Alqahtani et al.

2015 48TH HAWAII INTERNATIONAL CONFERENCE ON SYSTEM SCIENCES (HICSS) (2015)

Proceedings Paper Computer Science, Artificial Intelligence

Signature Based Semantic Intrusion Detection System on Cloud

S. Sangeetha et al.

INFORMATION SYSTEMS DESIGN AND INTELLIGENT APPLICATIONS, VOL 1 (2015)

Article Computer Science, Information Systems

A framework for generating realistic traffic for Distributed Denial-of-Service attacks and Flash Events

Sajal Bhatia et al.

COMPUTERS & SECURITY (2014)

Article Computer Science, Theory & Methods

DDoS defense system for web services in a cloud environment

Thomas Vissers et al.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2014)

Article Computer Science, Artificial Intelligence

A method of DDoS attack detection using HTTP packet pattern and rule engine in cloud computing environment

Junho Choi et al.

SOFT COMPUTING (2014)

Proceedings Paper Computer Science, Artificial Intelligence

An Intelligent Intrusion Prevention System for Cloud Computing (SIPSCC)

Saeed M. Alqahtani et al.

2014 INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE AND COMPUTATIONAL INTELLIGENCE (CSCI), VOL 2 (2014)

Article Computer Science, Theory & Methods

Low-Rate DDoS Attacks Detection and Traceback by Using New Information Metrics

Yang Xiang et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2011)

Article Computer Science, Hardware & Architecture

A workload characterization study of the 1998 World Cup Web site

M Arlitt et al.

IEEE NETWORK (2000)