Security Scheme for Protecting Cloud Computing Services Against Bursty DDoS Attacks
In cloud computing, data and applications are maintained on remote servers and accessed via the Internet. Virtualised resources such as dynamic servers are operated through the Internet, which increases the economic benefits accrued to customers from software. Cloud computing reduces customer concer...
| Main Authors: | Mazlina, Abdul Majid, Naser, Aws, Mohamad Fadli, Zolkipli, Khan, Nusrat Ullah |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
The International Association for Information, Culture, Human and Industry Technology (AICIT)
2015
|
| Subjects: | |
| Online Access: | http://umpir.ump.edu.my/id/eprint/7335/ http://umpir.ump.edu.my/id/eprint/7335/1/fskkp-2014-mazlina-Security_Scheme_for_Protecting.pdf |
Similar Items
Methods for Preventing DDoS Attacks in Cloud Computing
by: Jaber, Aws Naser, et al.
Published: (2017)
by: Jaber, Aws Naser, et al.
Published: (2017)
Security Everywhere Cloud: An Intensive Review of DoS and DDoS Attacks in Cloud Computing
by: Mazlina, Abdul Majid, et al.
Published: (2014)
by: Mazlina, Abdul Majid, et al.
Published: (2014)
Host Based Intrusion Detection and Prevention Model Against DDoS Attack in Cloud Computing
by: Jaber, Aws Naser, et al.
Published: (2018)
by: Jaber, Aws Naser, et al.
Published: (2018)
Hypervisor IDPS: DDoS Prevention Tool for Cloud Computing
by: Mohamad Fadli, Zolkipli, et al.
Published: (2017)
by: Mohamad Fadli, Zolkipli, et al.
Published: (2017)
Security Everywhere Cloud: An Intensive Review of DoS and DDoS Attacks in Cloud Computing
by: Jaber, Aws Naser, et al.
Published: (2015)
by: Jaber, Aws Naser, et al.
Published: (2015)
Machine learning and deep learning approaches for detecting DDoS attacks in cloud environments
by: Khan, Muhammad Asif, et al.
Published: (2025)
by: Khan, Muhammad Asif, et al.
Published: (2025)
Filtration Model For DDoS Attack Detection in Real-Time
by: Ahmed, Abdulghani Ali
Published: (2015)
by: Ahmed, Abdulghani Ali
Published: (2015)
A Study in Data Security in Cloud Computing
by: Mazlina, Abdul Majid, et al.
Published: (2014)
by: Mazlina, Abdul Majid, et al.
Published: (2014)
An efficient DDoS attack detection framework for vehicular communication / Raenu Kolandaisamy
by: Raenu , Kolandaisamy
Published: (2020)
by: Raenu , Kolandaisamy
Published: (2020)
IDS for Improving DDoS attack recognition based on attack profiles and network traffic features
by: Sallam, Amer A., et al.
Published: (2020)
by: Sallam, Amer A., et al.
Published: (2020)
Early detection and mitigation of DDoS attacks in software defined networks
by: Al-Saadi, Mustafa Yahya Zakariya
Published: (2018)
by: Al-Saadi, Mustafa Yahya Zakariya
Published: (2018)
Evaluation of boruta algorithm in DDoS detection
by: Noor Farhana, Mohd Zuki, et al.
Published: (2023)
by: Noor Farhana, Mohd Zuki, et al.
Published: (2023)
AI-based techniques for DDoS Attack Detection in WSN: a
systematic literature review
by: Mohammed, Al-Naeem, et al.
Published: (2020)
by: Mohammed, Al-Naeem, et al.
Published: (2020)
Detection of distributed denial-of-service (DDoS) attack with hyperparameter tuning based on machine learning approach
by: Wan Nurulsafawati, Wan Manan, et al.
Published: (2023)
by: Wan Nurulsafawati, Wan Manan, et al.
Published: (2023)
Chaos Theory Based Detection against Network Mimicking DDoS Attacks
by: Chonka, A., et al.
Published: (2009)
by: Chonka, A., et al.
Published: (2009)
An evaluation on KNN-SVM algorithm for detection and prediction of DDoS attack
by: Yusof, Ahmad Riza’ain, et al.
Published: (2016)
by: Yusof, Ahmad Riza’ain, et al.
Published: (2016)
Systematic literature review and taxonomy for DDoS attack detection and prediction
by: Yusof, Ahmad Riza’ain, et al.
Published: (2019)
by: Yusof, Ahmad Riza’ain, et al.
Published: (2019)
Wireshark window authentication based packet captureing scheme to pervent DDoS related security issues in cloud network nodes
by: Waqar, Ali, et al.
Published: (2015)
by: Waqar, Ali, et al.
Published: (2015)
Secure AdHoc on demand distance vector routing protocol using media access control and symmetric encryption against black hole and DDoS attacks in manet
by: Khan, Samia
Published: (2018)
by: Khan, Samia
Published: (2018)
Performance analysis based on DDoS attack at MAC layer in WLAN / Zati Bayani Harun
by: Harun, Zati Bayani
Published: (2019)
by: Harun, Zati Bayani
Published: (2019)
Study of Security Layers Under Attack on Different Layers of Cloud Computing
by: Fakhreldin, Mohammed Adam Ibrahim, et al.
Published: (2014)
by: Fakhreldin, Mohammed Adam Ibrahim, et al.
Published: (2014)
Trusting Cloud Computing for Personal Files
by: Mazlina, Abdul Majid, et al.
Published: (2014)
by: Mazlina, Abdul Majid, et al.
Published: (2014)
An intrusion detection system for DDoS flooding attacks on IPv6 networks using deep learning techniques
by: Ahmed Marwan, Idrees Aleesa
Published: (2021)
by: Ahmed Marwan, Idrees Aleesa
Published: (2021)
An intelligent DDoS attack detection tree-based model using Gini index feature selection method
by: Bouke, Mohamed Aly, et al.
Published: (2023)
by: Bouke, Mohamed Aly, et al.
Published: (2023)
A Conceptual Model Using The Elliptic Curve Diffie–Hellman With An Artificial Neural Network Over Cloud Computing
by: Jaber, Aws Naser, et al.
Published: (2016)
by: Jaber, Aws Naser, et al.
Published: (2016)
Investigation Model for Ddos Attack Detection in Real-Time
by: Ahmed, Abdulghani Ali
Published: (2015)
by: Ahmed, Abdulghani Ali
Published: (2015)
A Study On AI-Driven Solutions for Cloud Security Platform
by: Menaga, Segar, et al.
Published: (2024)
by: Menaga, Segar, et al.
Published: (2024)
Present Status and Challenges in Cloud Monitoring Framework: A Survey
by: Jaber, Aws Naser, et al.
Published: (2016)
by: Jaber, Aws Naser, et al.
Published: (2016)
Data Security Issues In Cloud Computing: Review
by: Ahmed, Hussam Alddin Shihab, et al.
Published: (2016)
by: Ahmed, Hussam Alddin Shihab, et al.
Published: (2016)
Use of Cryptography in Cloud Computing
by: Jaber, Aws Naser, et al.
Published: (2013)
by: Jaber, Aws Naser, et al.
Published: (2013)
An improved DDoS detection using hybrid N-Gram heuristic technique
by: Maslan, Andi, et al.
Published: (2017)
by: Maslan, Andi, et al.
Published: (2017)
Flow-Representation Approach For ICMPV6-Based Ddos Attacks Detection
by: Elejla, Omar E. O.
Published: (2018)
by: Elejla, Omar E. O.
Published: (2018)
Response Option for Attacks Detected by Intrusion Detection System
by: Shahid, Anwar, et al.
Published: (2015)
by: Shahid, Anwar, et al.
Published: (2015)
Efficient Machine Learning Model for DDoS Detection System Based on Dimensionality Reduction
by: Dheyab, Saad Ahmed, et al.
Published: (2022)
by: Dheyab, Saad Ahmed, et al.
Published: (2022)
Efficient Machine Learning Model for DDoS Detection
System Based on Dimensionality Reduction
by: Dheyab, Saad Ahmed, et al.
Published: (2023)
by: Dheyab, Saad Ahmed, et al.
Published: (2023)
Efficient Machine Learning Model for DDoS Detection System Based on Dimensionality Reduction
by: Dheyab, Saad Ahmed, et al.
Published: (2022)
by: Dheyab, Saad Ahmed, et al.
Published: (2022)
Efficient Machine Learning Model for DDoS Detection System Based on Dimensionality Reduction
by: Ahmed Dheyab, Saad, et al.
Published: (2022)
by: Ahmed Dheyab, Saad, et al.
Published: (2022)
Efficient Machine Learning Model for DDoS Detection System Based on Dimensionality Reduction
by: Dheyab, Saad Ahmed, et al.
Published: (2022)
by: Dheyab, Saad Ahmed, et al.
Published: (2022)
Detection Of Distributed Denial-Of-Service (Ddos) Attack With Hyperparameter Tuning Based On Machine Learning Approach
by: Choo, Yong Han
Published: (2023)
by: Choo, Yong Han
Published: (2023)
DDoS detection using active and idle features of revised CICFlowMeter and statistical approaches
by: Ali, Basheer Husham, et al.
Published: (2022)
by: Ali, Basheer Husham, et al.
Published: (2022)
Similar Items
-
Methods for Preventing DDoS Attacks in Cloud Computing
by: Jaber, Aws Naser, et al.
Published: (2017) -
Security Everywhere Cloud: An Intensive Review of DoS and DDoS Attacks in Cloud Computing
by: Mazlina, Abdul Majid, et al.
Published: (2014) -
Host Based Intrusion Detection and Prevention Model Against DDoS Attack in Cloud Computing
by: Jaber, Aws Naser, et al.
Published: (2018) -
Hypervisor IDPS: DDoS Prevention Tool for Cloud Computing
by: Mohamad Fadli, Zolkipli, et al.
Published: (2017) -
Security Everywhere Cloud: An Intensive Review of DoS and DDoS Attacks in Cloud Computing
by: Jaber, Aws Naser, et al.
Published: (2015)