Learn More
Cloud computing is gaining ground and becoming one of the fast growing segments of the IT industry. However, if its numerous advantages are mainly used to support a legitimate activity, it is now exploited for a use it was not meant for: malicious users leverage its power and fast provisioning to turn it into an attack support. Botnets supporting DDoS(More)
Since the last years, cloud computing is playing an important role in providing high quality of IT services. However, beyond a legitimate usage, the numerous advantages it presents are now exploited by attackers, and botnets supporting DDoS attacks are among the greatest beneficiaries of this malicious use. In this paper, we present an original approach(More)
Today, beyond a legitimate usage, the numerous advantages of cloud computing are exploited by attackers, and Botnets supporting DDoS attacks are among the greatest beneficiaries of this malicious use. Such a phenomena is a major issue since it strongly increases the power of distributed massive attacks while involving the responsibility of cloud service(More)
Recently, cloud computing has conquered IT markets and majority of institutions use its services at different scales. As any IT technology, cloud computing suffers from security issues and numerous studies were - and in progress - given in order to overcome them. However, most of the latter focus on data, users and infrastructure security from external(More)
Collaborative Intelligent Transportation Systems are almost part of our everyday life. A C-ITS environment can provide numerous services that soon will become essential to roads' users. The latter resides in improvement of road safety, entertainment, and commercial services. However to provide such services, the C-ITS environment needs an advertisement and(More)
  • 1