An anomaly-based framework for mitigating effects of DDoS attacks using a third party auditor in cloud computing environments
Published 2020 View Full Article
- Home
- Publications
- Publication Search
- Publication Details
Title
An anomaly-based framework for mitigating effects of DDoS attacks using a third party auditor in cloud computing environments
Authors
Keywords
-
Journal
Cluster Computing-The Journal of Networks Software Tools and Applications
Volume -, Issue -, Pages -
Publisher
Springer Science and Business Media LLC
Online
2020-01-02
DOI
10.1007/s10586-019-03031-y
References
Ask authors/readers for more resources
Related references
Note: Only part of the references are listed.- Detection of DoS attacks in cloud networks using intelligent rule based classification system
- (2018) Rakesh Rajendran et al. Cluster Computing-The Journal of Networks Software Tools and Applications
- Anomaly network traffic detection algorithm based on information entropy measurement under the cloud computing environment
- (2018) Chen Yang Cluster Computing-The Journal of Networks Software Tools and Applications
- Introducing Fraudulent Energy Consumption in Cloud Infrastructures: A New Generation of Denial-of-Service Attacks
- (2017) Massimo Ficco et al. IEEE Systems Journal
- Optimal Load Distribution for the Detection of VM-based DDoS Attacks in the Cloud
- (2017) Omar Abdel Wahab et al. IEEE Transactions on Services Computing
- Ensemble-based multi-filter feature selection method for DDoS detection in cloud computing
- (2016) Opeyemi Osanaiye et al. EURASIP Journal on Wireless Communications and Networking
- Distributed denial of service (DDoS) resilience in cloud: Review and conceptual cloud DDoS mitigation framework
- (2016) Opeyemi Osanaiye et al. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS
- Taxonomy of DoS and DDoS attacks and desirable defense mechanism in a Cloud computing environment
- (2016) B. B. Gupta et al. NEURAL COMPUTING & APPLICATIONS
- DDoS attack protection in the era of cloud computing and Software-Defined Networking
- (2015) Bing Wang et al. Computer Networks
- New facets of mobile botnet: architecture and evaluation
- (2015) Marios Anagnostopoulos et al. International Journal of Information Security
- Security and Privacy in Cloud Computing: Vision, Trends, and Challenges
- (2015) Zahir Tari et al. IEEE Cloud Computing
- Detecting DDoS Attacks in Cloud Computing Environment
- (2014) Alina Madalina Lonea et al. International Journal of Computers Communications & Control
- Can We Beat DDoS Attacks in Clouds?
- (2013) Shui Yu et al. IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS
- Security issues in cloud environments: a survey
- (2013) Diogo A. B. Fernandes et al. International Journal of Information Security
- A confidence-based filtering method for DDoS attack defense in cloud environment
- (2012) Wanchun Dou et al. Future Generation Computer Systems-The International Journal of eScience
- Privacy-Preserving Public Auditing for Secure Cloud Storage
- (2011) Cong Wang et al. IEEE TRANSACTIONS ON COMPUTERS
- Cloud security defence to protect cloud computing against HTTP-DoS and XML-DoS attacks
- (2010) Ashley Chonka et al. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS
- CloudSim: a toolkit for modeling and simulation of cloud computing environments and evaluation of resource provisioning algorithms
- (2010) Rodrigo N. Calheiros et al. SOFTWARE-PRACTICE & EXPERIENCE
Find Funding. Review Successful Grants.
Explore over 25,000 new funding opportunities and over 6,000,000 successful grants.
ExploreAsk a Question. Answer a Question.
Quickly pose questions to the entire community. Debate answers and get clarity on the most important issues facing researchers.
Get Started