CBF: A Packet Filtering Method for DDoS Attack Defense in Cloud Environment

@article{Chen2011CBFAP,
  title={CBF: A Packet Filtering Method for DDoS Attack Defense in Cloud Environment},
  author={Qi Chen and Wenmin Lin and Wan-Chun Dou and Shui Yu},
  journal={2011 IEEE Ninth International Conference on Dependable, Autonomic and Secure Computing},
  year={2011},
  pages={427-434}
}
Distributed Denial-of-Service attack (DDoS) is a major threat for cloud environment. Traditional defending approaches cannot be easily applied in cloud security due to their relatively low efficiency, large storage, to name a few. In view of this challenge, a Confidence-Based Filtering method, named CBF, is investigated for cloud computing environment, in this paper. Concretely speaking, the method is deployed by two periods, i.e., non-attack period and attack period. More specially, legitimate… CONTINUE READING
Highly Cited
This paper has 213 citations. REVIEW CITATIONS

Citations

Publications citing this paper.
Showing 1-10 of 35 extracted citations

Optimal specifications for a protective framework against HTTP-based DoS and DDoS attacks

2014 International Symposium on Biometrics and Security Technologies (ISBAST) • 2014
View 4 Excerpts
Highly Influenced

Detection and Mitigation of DDoS in SDN

2018 Eleventh International Conference on Contemporary Computing (IC3) • 2018

Distributed Denial of Service Attack Prevention at Source Machines

2018 IEEE 16th Intl Conf on Dependable, Autonomic and Secure Computing, 16th Intl Conf on Pervasive Intelligence and Computing, 4th Intl Conf on Big Data Intelligence and Computing and Cyber Science and Technology Congress(DASC/PiCom/DataCom/CyberSciTech) • 2018
View 2 Excerpts

Detection techniques of DDoS attacks: A survey

2017 4th IEEE Uttar Pradesh Section International Conference on Electrical, Computer and Electronics (UPCON) • 2017
View 1 Excerpt

Enhancing secure cloud computing environment by Detecting DDoS attack using fuzzy logic

2017 3rd International Conference on Electrical Information and Communication Technology (EICT) • 2017
View 1 Excerpt

213 Citations

050100'13'15'17'19
Citations per Year
Semantic Scholar estimates that this publication has 213 citations based on the available data.

See our FAQ for additional information.

References

Publications referenced by this paper.
Showing 1-10 of 20 references

Low-Rate DDoS Attacks Detection and Traceback by Using New Information Metrics

IEEE Transactions on Information Forensics and Security • 2011
View 1 Excerpt

Traceback of DDoS Attacks Using Entropy Variations

IEEE Transactions on Parallel and Distributed Systems • 2011
View 1 Excerpt

A view of cloud computing

Commun. ACM • 2010
View 2 Excerpts

DDoS Defense Deployment with Network Egress and Ingress Filtering

2010 IEEE International Conference on Communications • 2010
View 1 Excerpt

Real-Time Detection of Stealthy DDoS Attacks Using Time-Series Decomposition

2010 IEEE International Conference on Communications • 2010
View 1 Excerpt

CCOA: Cloud Computing Open Architecture

2009 IEEE International Conference on Web Services • 2009
View 1 Excerpt

Similar Papers

Loading similar papers…