DDoS Attacks in Service Clouds

  title={DDoS Attacks in Service Clouds},
  author={Sarra M. Alqahtani and R. Gamble},
  journal={2015 48th Hawaii International Conference on System Sciences},
The scalability and dynamic configuration of service clouds can be susceptible to Distributed Denial of Service (DDoS) attacks. [...] Key Method The detection approach is composed of four levels such that each level detects symptoms of DDoS attacks from its local data. The detection results of all levels are corroborated to confirm the victim and attacking services. We evaluate our proposed solution by using a random dataset. The results indicate that it is a promising solution to mitigate the DDoS attack in…Expand
Service resizing for quick DDoS mitigation in cloud computing environment
DDoS victim service containment to minimize the internal collateral damages in cloud computing
Slow flooding attack detection in cloud using change point detection approach
DDoS attacks in cloud computing: Issues, taxonomy, and future directions


CBF: A Packet Filtering Method for DDoS Attack Defense in Cloud Environment
Countering DDoS and XDoS Attacks against Web Services
  • Xinfeng Ye
  • Computer Science
  • 2008 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing
  • 2008
Embedding a Distributed Auditing Mechanism in the Service Cloud
A Service Architecture for Countering Distributed Denial of Service Attacks
  • Fareed Zaffar, G. Kedem
  • Computer Science
  • 21st International Conference on Advanced Information Networking and Applications Workshops (AINAW'07)
  • 2007
EDoS-Shield - A Two-Steps Mitigation Technique against EDoS Attacks in Cloud Computing
Validating Denial of Service Vulnerabilities in Web Services
The Accountability Problem of Flooding Attacks in Service-Oriented Architectures
Parametric Differences between a Real-world Distributed Denial-of-Service Attack and a Flash Event
Intrusion Tolerant Approach for Denial of Service Attacks to Web Services
  • M. Ficco, M. Rak
  • Computer Science
  • 2011 First International Conference on Data Compression, Communications and Processing
  • 2011
Triangle-Area-Based Multivariate Correlation Analysis for Effective Denial-of-Service Attack Detection