A proactive defense method for the stealthy EDoS attacks in a cloud environment

[1]  Rajkumar Buyya,et al.  Next generation cloud computing: New trends and research directions , 2017, Future Gener. Comput. Syst..

[2]  Yu Chen,et al.  An optimized reconfigurable power spectral density converter for real-time shrew DDoS attacks detection , 2013, Comput. Electr. Eng..

[3]  Song Guo,et al.  Can We Beat DDoS Attacks in Clouds? , 2014, IEEE Transactions on Parallel and Distributed Systems.

[4]  Paramvir Singh,et al.  Application layer HTTP-GET flood DDoS attacks: Research landscape and challenges , 2017, Comput. Secur..

[5]  Mauro Iacono,et al.  Evaluating the impact of eDoS attacks to cloud facilities , 2016, EAI Endorsed Trans. Security Safety.

[6]  Wanlei Zhou,et al.  Low-Rate DDoS Attacks Detection and Traceback by Using New Information Metrics , 2011, IEEE Transactions on Information Forensics and Security.

[7]  Kim-Kwang Raymond Choo,et al.  Distributed denial of service (DDoS) resilience in cloud: Review and conceptual cloud DDoS mitigation framework , 2016, J. Netw. Comput. Appl..

[8]  Neha Agrawal,et al.  Defense Mechanisms Against DDoS Attacks in a Cloud Computing Environment: State-of-the-Art and Research Challenges , 2019, IEEE Communications Surveys & Tutorials.

[9]  Manoj Singh Gaur,et al.  Service resizing for quick DDoS mitigation in cloud computing environment , 2017, Ann. des Télécommunications.

[10]  Zubair A. Baig,et al.  Controlled access to cloud resources for mitigating Economic Denial of Sustainability (EDoS) attacks , 2016, Comput. Networks.

[11]  Khalid Al-Begain,et al.  Denial of Service Attacks Mitigation in the Cloud , 2015, 2015 9th International Conference on Next Generation Mobile Applications, Services and Technologies.

[12]  Gabriel Maciá-Fernández,et al.  Mathematical Model for Low-Rate DoS Attacks Against Application Servers , 2009, IEEE Transactions on Information Forensics and Security.

[13]  F. Al-Haidari,et al.  Evaluation of the Impact of EDoS Attacks Against Cloud Computing Services , 2015 .

[14]  Khaled Salah,et al.  EDoS-Shield - A Two-Steps Mitigation Technique against EDoS Attacks in Cloud Computing , 2011, 2011 Fourth IEEE International Conference on Utility and Cloud Computing.

[15]  Bruno Volckaert,et al.  Orchestrator conversation: Distributed management of cloud applications , 2018, Int. J. Netw. Manag..

[16]  KumarKrishan,et al.  Application layer HTTP-GET flood DDoS attacks , 2017 .

[17]  Zahid Anwar,et al.  EDoS Armor: A cost effective economic denial of sustainability attack mitigation framework for e-commerce applications in cloud environments , 2013, INMIC.

[18]  Blesson Varghese,et al.  A survey and taxonomy of resource optimisation for executing bag-of-task applications on public clouds , 2017, Future Gener. Comput. Syst..

[19]  Jie Xu,et al.  On a Mathematical Model for Low-Rate Shrew DDoS , 2014, IEEE Transactions on Information Forensics and Security.

[20]  Massimo Ficco,et al.  Could emerging fraudulent energy consumption attacks make the cloud infrastructure costs unsustainable? , 2019, Inf. Sci..

[21]  Muttukrishnan Rajarajan,et al.  DDoS victim service containment to minimize the internal collateral damages in cloud computing , 2017, Comput. Electr. Eng..

[22]  Neminath Hubballi,et al.  Slow rate denial of service attacks against HTTP/2 and detection , 2018, Comput. Secur..

[23]  Shashikala Tapaswi,et al.  Defense schemes for variants of distributed denial-of-service (DDoS) attacks in cloud computing: A survey , 2017, Inf. Secur. J. A Glob. Perspect..

[24]  F. Al-Haidari,et al.  Performance Modeling and Analysis of the EDoS-Shield Mitigation , 2017 .

[25]  Khaled Salah,et al.  An Experimental Evaluation of the EDoS-Shield Mitigation Technique for Securing the Cloud , 2016 .

[26]  Manoj Singh Gaur,et al.  DDoS/EDoS attack in cloud: affecting everyone out there! , 2015, SIN.

[27]  Khaled Salah,et al.  Enhanced EDoS-Shield for Mitigating EDoS Attacks Originating from Spoofed IP Addresses , 2012, 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications.

[28]  Minhaj Ahmad Khan,et al.  A survey of security issues for cloud computing , 2016, J. Netw. Comput. Appl..

[29]  ChooKim-Kwang Raymond,et al.  Distributed denial of service (DDoS) resilience in cloud , 2016 .

[30]  Raouf Boutaba,et al.  Performance Modeling and Analysis of Network Firewalls , 2012, IEEE Transactions on Network and Service Management.

[31]  Muttukrishnan Rajarajan,et al.  Combating DDoS Attacks in the Cloud: Requirements, Trends, and Future Directions , 2017, IEEE Cloud Computing.

[32]  M. Engin Tozal,et al.  Record route IP traceback: Combating DoS attacks and the variants , 2018, Comput. Secur..

[33]  Khaled Salah,et al.  Impact of CPU Utilization Thresholds and Scaling Size on Autoscaling Cloud Resources , 2013, 2013 IEEE 5th International Conference on Cloud Computing Technology and Science.

[34]  BuyyaRajkumar,et al.  Next generation cloud computing , 2018 .

[35]  Mohamed Cheriet,et al.  Taxonomy of Distributed Denial of Service mitigation approaches for cloud computing , 2015, J. Netw. Comput. Appl..

[36]  Shashikala Tapaswi,et al.  Low rate cloud DDoS attack defense method based on power spectral density analysis , 2018, Inf. Process. Lett..

[37]  Massimiliano Rak,et al.  Stealthy Denial of Service Strategy in Cloud Computing , 2015, IEEE Transactions on Cloud Computing.