Submit Search
Upload
IRJET-A Survey on Stealthy Denial of Service Strategy in Cloud Computing
•
0 likes
•
43 views
IRJET Journal
Follow
https://www.irjet.net/archives/V4/i1/IRJET-V4I113.pdf
Read less
Read more
Engineering
Report
Share
Report
Share
1 of 5
Download now
Download to read offline
Recommended
AAA
AAA
Bose Chandra
DDoS Mitigation Guide |DDoS Protection Cyber Security | MazeBolt
DDoS Mitigation Guide |DDoS Protection Cyber Security | MazeBolt
MazeBolt Technologies
DDOS Attacks-A Stealthy Way of Implementation and Detection
DDOS Attacks-A Stealthy Way of Implementation and Detection
IJRES Journal
DDoS Defenses | DDoS Protection and Mitigation | MazeBolt
DDoS Defenses | DDoS Protection and Mitigation | MazeBolt
MazeBolt Technologies
Common Types of DDoS Attacks | MazeBolt Technologies
Common Types of DDoS Attacks | MazeBolt Technologies
MazeBolt Technologies
Mod05lec21(sla tutorial)
Mod05lec21(sla tutorial)
Ankit Gupta
IRJET- Trust Value Calculation for Cloud Resources
IRJET- Trust Value Calculation for Cloud Resources
IRJET Journal
MMB Cloud-Tree: Verifiable Cloud Service Selection
MMB Cloud-Tree: Verifiable Cloud Service Selection
IJAEMSJORNAL
Recommended
AAA
AAA
Bose Chandra
DDoS Mitigation Guide |DDoS Protection Cyber Security | MazeBolt
DDoS Mitigation Guide |DDoS Protection Cyber Security | MazeBolt
MazeBolt Technologies
DDOS Attacks-A Stealthy Way of Implementation and Detection
DDOS Attacks-A Stealthy Way of Implementation and Detection
IJRES Journal
DDoS Defenses | DDoS Protection and Mitigation | MazeBolt
DDoS Defenses | DDoS Protection and Mitigation | MazeBolt
MazeBolt Technologies
Common Types of DDoS Attacks | MazeBolt Technologies
Common Types of DDoS Attacks | MazeBolt Technologies
MazeBolt Technologies
Mod05lec21(sla tutorial)
Mod05lec21(sla tutorial)
Ankit Gupta
IRJET- Trust Value Calculation for Cloud Resources
IRJET- Trust Value Calculation for Cloud Resources
IRJET Journal
MMB Cloud-Tree: Verifiable Cloud Service Selection
MMB Cloud-Tree: Verifiable Cloud Service Selection
IJAEMSJORNAL
Linked List Implementation of Discount Pricing in Cloud
Linked List Implementation of Discount Pricing in Cloud
paperpublications3
Cost of DDoS Attacks | DDoS Attacks Cost | MazeBolt Technologies
Cost of DDoS Attacks | DDoS Attacks Cost | MazeBolt Technologies
MazeBolt Technologies
MS Cloud Design Patterns Infographic 2015
MS Cloud Design Patterns Infographic 2015
James Tramel
Handling of Incident, Challenges, Risks, Vulnerability and Implementing Detec...
Handling of Incident, Challenges, Risks, Vulnerability and Implementing Detec...
sadique_ghitm
IRJET- SAAS Attacks Defense Mechanisms and Digital Forensic
IRJET- SAAS Attacks Defense Mechanisms and Digital Forensic
IRJET Journal
Survey on reliable sla based monitoring for billing scheme in cloud computing
Survey on reliable sla based monitoring for billing scheme in cloud computing
eSAT Journals
Week 3 lecture material cc
Week 3 lecture material cc
Ankit Gupta
The role of DDoS Providers
The role of DDoS Providers
Neil Hinton
Cloud Security (Domain1- 5)
Cloud Security (Domain1- 5)
Maganathin Veeraragaloo
Cloud monitoring overview
Cloud monitoring overview
Dr. Ramkumar Lakshminarayanan
Gary Homeland Security Presentation 102114
Gary Homeland Security Presentation 102114
Gary Dischner
IRJET- An Adaptive Scheduling based VM with Random Key Authentication on Clou...
IRJET- An Adaptive Scheduling based VM with Random Key Authentication on Clou...
IRJET Journal
A survey on various resource allocation policies in cloud computing environment
A survey on various resource allocation policies in cloud computing environment
eSAT Publishing House
SaaS as a Security Hazard - Google Apps Security Example
SaaS as a Security Hazard - Google Apps Security Example
Newvewm
Sla in cloud
Sla in cloud
Pankesh Patel
Cloud security (domain6 10)
Cloud security (domain6 10)
Maganathin Veeraragaloo
IRJET- Assessment of Environmental Impacts during Operational Phase of a T...
IRJET- Assessment of Environmental Impacts during Operational Phase of a T...
IRJET Journal
IRJET-CFD Analysis of conceptual Aircraft body
IRJET-CFD Analysis of conceptual Aircraft body
IRJET Journal
IRJET-A Review on Two Stroke Single Cylinder Compressed Air Engine
IRJET-A Review on Two Stroke Single Cylinder Compressed Air Engine
IRJET Journal
IRJET-A Survey On Opportunistic Piggyback Marking For IP Trace Back
IRJET-A Survey On Opportunistic Piggyback Marking For IP Trace Back
IRJET Journal
IRJET-Solar Power Generation with Capacitor Based Seven Level Inverter System
IRJET-Solar Power Generation with Capacitor Based Seven Level Inverter System
IRJET Journal
IRJET-Power Flow & Voltage Stability Analysis using MATLAB
IRJET-Power Flow & Voltage Stability Analysis using MATLAB
IRJET Journal
More Related Content
What's hot
Linked List Implementation of Discount Pricing in Cloud
Linked List Implementation of Discount Pricing in Cloud
paperpublications3
Cost of DDoS Attacks | DDoS Attacks Cost | MazeBolt Technologies
Cost of DDoS Attacks | DDoS Attacks Cost | MazeBolt Technologies
MazeBolt Technologies
MS Cloud Design Patterns Infographic 2015
MS Cloud Design Patterns Infographic 2015
James Tramel
Handling of Incident, Challenges, Risks, Vulnerability and Implementing Detec...
Handling of Incident, Challenges, Risks, Vulnerability and Implementing Detec...
sadique_ghitm
IRJET- SAAS Attacks Defense Mechanisms and Digital Forensic
IRJET- SAAS Attacks Defense Mechanisms and Digital Forensic
IRJET Journal
Survey on reliable sla based monitoring for billing scheme in cloud computing
Survey on reliable sla based monitoring for billing scheme in cloud computing
eSAT Journals
Week 3 lecture material cc
Week 3 lecture material cc
Ankit Gupta
The role of DDoS Providers
The role of DDoS Providers
Neil Hinton
Cloud Security (Domain1- 5)
Cloud Security (Domain1- 5)
Maganathin Veeraragaloo
Cloud monitoring overview
Cloud monitoring overview
Dr. Ramkumar Lakshminarayanan
Gary Homeland Security Presentation 102114
Gary Homeland Security Presentation 102114
Gary Dischner
IRJET- An Adaptive Scheduling based VM with Random Key Authentication on Clou...
IRJET- An Adaptive Scheduling based VM with Random Key Authentication on Clou...
IRJET Journal
A survey on various resource allocation policies in cloud computing environment
A survey on various resource allocation policies in cloud computing environment
eSAT Publishing House
SaaS as a Security Hazard - Google Apps Security Example
SaaS as a Security Hazard - Google Apps Security Example
Newvewm
Sla in cloud
Sla in cloud
Pankesh Patel
Cloud security (domain6 10)
Cloud security (domain6 10)
Maganathin Veeraragaloo
What's hot
(16)
Linked List Implementation of Discount Pricing in Cloud
Linked List Implementation of Discount Pricing in Cloud
Cost of DDoS Attacks | DDoS Attacks Cost | MazeBolt Technologies
Cost of DDoS Attacks | DDoS Attacks Cost | MazeBolt Technologies
MS Cloud Design Patterns Infographic 2015
MS Cloud Design Patterns Infographic 2015
Handling of Incident, Challenges, Risks, Vulnerability and Implementing Detec...
Handling of Incident, Challenges, Risks, Vulnerability and Implementing Detec...
IRJET- SAAS Attacks Defense Mechanisms and Digital Forensic
IRJET- SAAS Attacks Defense Mechanisms and Digital Forensic
Survey on reliable sla based monitoring for billing scheme in cloud computing
Survey on reliable sla based monitoring for billing scheme in cloud computing
Week 3 lecture material cc
Week 3 lecture material cc
The role of DDoS Providers
The role of DDoS Providers
Cloud Security (Domain1- 5)
Cloud Security (Domain1- 5)
Cloud monitoring overview
Cloud monitoring overview
Gary Homeland Security Presentation 102114
Gary Homeland Security Presentation 102114
IRJET- An Adaptive Scheduling based VM with Random Key Authentication on Clou...
IRJET- An Adaptive Scheduling based VM with Random Key Authentication on Clou...
A survey on various resource allocation policies in cloud computing environment
A survey on various resource allocation policies in cloud computing environment
SaaS as a Security Hazard - Google Apps Security Example
SaaS as a Security Hazard - Google Apps Security Example
Sla in cloud
Sla in cloud
Cloud security (domain6 10)
Cloud security (domain6 10)
Viewers also liked
IRJET- Assessment of Environmental Impacts during Operational Phase of a T...
IRJET- Assessment of Environmental Impacts during Operational Phase of a T...
IRJET Journal
IRJET-CFD Analysis of conceptual Aircraft body
IRJET-CFD Analysis of conceptual Aircraft body
IRJET Journal
IRJET-A Review on Two Stroke Single Cylinder Compressed Air Engine
IRJET-A Review on Two Stroke Single Cylinder Compressed Air Engine
IRJET Journal
IRJET-A Survey On Opportunistic Piggyback Marking For IP Trace Back
IRJET-A Survey On Opportunistic Piggyback Marking For IP Trace Back
IRJET Journal
IRJET-Solar Power Generation with Capacitor Based Seven Level Inverter System
IRJET-Solar Power Generation with Capacitor Based Seven Level Inverter System
IRJET Journal
IRJET-Power Flow & Voltage Stability Analysis using MATLAB
IRJET-Power Flow & Voltage Stability Analysis using MATLAB
IRJET Journal
IRJET-Review Paper On Usage Of Ferrocement Panels In Lightweight Sandwich Con...
IRJET-Review Paper On Usage Of Ferrocement Panels In Lightweight Sandwich Con...
IRJET Journal
IRJET- A Design Implementation of Single Stage Amplifiers using HEMT Tec...
IRJET- A Design Implementation of Single Stage Amplifiers using HEMT Tec...
IRJET Journal
IRJET-Securing Mobile Technology Of Gsm Using A5/1 Algorithm
IRJET-Securing Mobile Technology Of Gsm Using A5/1 Algorithm
IRJET Journal
IRJET-A Blind Watermarking Algorithm
IRJET-A Blind Watermarking Algorithm
IRJET Journal
IRJET-Accessing Information about Programs and Services through a Voice Site ...
IRJET-Accessing Information about Programs and Services through a Voice Site ...
IRJET Journal
IRJET-Design of Pile Foundation for site in Sangli district of Maharashtra: C...
IRJET-Design of Pile Foundation for site in Sangli district of Maharashtra: C...
IRJET Journal
IRJET- Missing Value Evaluation in SQL Queries: A Survey
IRJET- Missing Value Evaluation in SQL Queries: A Survey
IRJET Journal
IRJET-Survival and Growth Rate of Clarias gariepinus Larvae Fed with Artemia ...
IRJET-Survival and Growth Rate of Clarias gariepinus Larvae Fed with Artemia ...
IRJET Journal
IRJET-Evaluation of the Back Propagation Neural Network for Gravity Mapping
IRJET-Evaluation of the Back Propagation Neural Network for Gravity Mapping
IRJET Journal
IRJET-ASIC Implementation for SOBEL Accelerator
IRJET-ASIC Implementation for SOBEL Accelerator
IRJET Journal
IRJET-Second Throat Diffuser System at Different Back Pressure for High Altit...
IRJET-Second Throat Diffuser System at Different Back Pressure for High Altit...
IRJET Journal
IRJET- Simulation based design and analysis of combined effect of various ...
IRJET- Simulation based design and analysis of combined effect of various ...
IRJET Journal
IRJET-Reversible Image Watermarking Based on Histogram Shifting Technique
IRJET-Reversible Image Watermarking Based on Histogram Shifting Technique
IRJET Journal
IRJET- Document Layout analysis using Inverse Support Vector Machine (I-SV...
IRJET- Document Layout analysis using Inverse Support Vector Machine (I-SV...
IRJET Journal
Viewers also liked
(20)
IRJET- Assessment of Environmental Impacts during Operational Phase of a T...
IRJET- Assessment of Environmental Impacts during Operational Phase of a T...
IRJET-CFD Analysis of conceptual Aircraft body
IRJET-CFD Analysis of conceptual Aircraft body
IRJET-A Review on Two Stroke Single Cylinder Compressed Air Engine
IRJET-A Review on Two Stroke Single Cylinder Compressed Air Engine
IRJET-A Survey On Opportunistic Piggyback Marking For IP Trace Back
IRJET-A Survey On Opportunistic Piggyback Marking For IP Trace Back
IRJET-Solar Power Generation with Capacitor Based Seven Level Inverter System
IRJET-Solar Power Generation with Capacitor Based Seven Level Inverter System
IRJET-Power Flow & Voltage Stability Analysis using MATLAB
IRJET-Power Flow & Voltage Stability Analysis using MATLAB
IRJET-Review Paper On Usage Of Ferrocement Panels In Lightweight Sandwich Con...
IRJET-Review Paper On Usage Of Ferrocement Panels In Lightweight Sandwich Con...
IRJET- A Design Implementation of Single Stage Amplifiers using HEMT Tec...
IRJET- A Design Implementation of Single Stage Amplifiers using HEMT Tec...
IRJET-Securing Mobile Technology Of Gsm Using A5/1 Algorithm
IRJET-Securing Mobile Technology Of Gsm Using A5/1 Algorithm
IRJET-A Blind Watermarking Algorithm
IRJET-A Blind Watermarking Algorithm
IRJET-Accessing Information about Programs and Services through a Voice Site ...
IRJET-Accessing Information about Programs and Services through a Voice Site ...
IRJET-Design of Pile Foundation for site in Sangli district of Maharashtra: C...
IRJET-Design of Pile Foundation for site in Sangli district of Maharashtra: C...
IRJET- Missing Value Evaluation in SQL Queries: A Survey
IRJET- Missing Value Evaluation in SQL Queries: A Survey
IRJET-Survival and Growth Rate of Clarias gariepinus Larvae Fed with Artemia ...
IRJET-Survival and Growth Rate of Clarias gariepinus Larvae Fed with Artemia ...
IRJET-Evaluation of the Back Propagation Neural Network for Gravity Mapping
IRJET-Evaluation of the Back Propagation Neural Network for Gravity Mapping
IRJET-ASIC Implementation for SOBEL Accelerator
IRJET-ASIC Implementation for SOBEL Accelerator
IRJET-Second Throat Diffuser System at Different Back Pressure for High Altit...
IRJET-Second Throat Diffuser System at Different Back Pressure for High Altit...
IRJET- Simulation based design and analysis of combined effect of various ...
IRJET- Simulation based design and analysis of combined effect of various ...
IRJET-Reversible Image Watermarking Based on Histogram Shifting Technique
IRJET-Reversible Image Watermarking Based on Histogram Shifting Technique
IRJET- Document Layout analysis using Inverse Support Vector Machine (I-SV...
IRJET- Document Layout analysis using Inverse Support Vector Machine (I-SV...
Similar to IRJET-A Survey on Stealthy Denial of Service Strategy in Cloud Computing
IMPROVING DDOS DETECTION IN IOT DEVICES
IMPROVING DDOS DETECTION IN IOT DEVICES
IRJET Journal
Stealthy Denial of Service Strategy in Cloud Computing
Stealthy Denial of Service Strategy in Cloud Computing
1crore projects
Stealthy denial of service strategy in cloud computing
Stealthy denial of service strategy in cloud computing
syeda yasmeen
A DENIAL OF SERVICE STRATEGY TO ORCHESTRATE STEALTHY ATTACK PATTERNS IN CLOUD...
A DENIAL OF SERVICE STRATEGY TO ORCHESTRATE STEALTHY ATTACK PATTERNS IN CLOUD...
IAEME Publication
Algorithm for Scheduling of Dependent Task in Cloud
Algorithm for Scheduling of Dependent Task in Cloud
IRJET Journal
PROPOSED ONTOLOGY FRAMEWORK FOR DYNAMIC RESOURCE PROVISIONING ON PUBLIC CLOUD
PROPOSED ONTOLOGY FRAMEWORK FOR DYNAMIC RESOURCE PROVISIONING ON PUBLIC CLOUD
IAEME Publication
Design & Development of a Trustworthy and Secure Billing System for Cloud Com...
Design & Development of a Trustworthy and Secure Billing System for Cloud Com...
iosrjce
A017620123
A017620123
IOSR Journals
IRJET- Developing an Algorithm to Detect Malware in Cloud
IRJET- Developing an Algorithm to Detect Malware in Cloud
IRJET Journal
Trust Assessment Policy Manager in Cloud Computing – Cloud Service Provider’s...
Trust Assessment Policy Manager in Cloud Computing – Cloud Service Provider’s...
idescitation
20150113
20150113
Kaustubh Memane
A Study On Service Level Agreement Management Techniques In Cloud
A Study On Service Level Agreement Management Techniques In Cloud
Tracy Drey
SecSecuring Software as a Service Model of Cloud Computing: Issues and Solutions
SecSecuring Software as a Service Model of Cloud Computing: Issues and Solutions
ijccsa
Cybersecurity Threat Detection of Anomaly Based DDoS Attack Using Machine Lea...
Cybersecurity Threat Detection of Anomaly Based DDoS Attack Using Machine Lea...
IRJET Journal
SaaS Application Scalability: Best Practices from Architecture to Cloud Infra...
SaaS Application Scalability: Best Practices from Architecture to Cloud Infra...
riyak40
Cloud strategy briefing 101
Cloud strategy briefing 101
Predrag Mitrovic
IRJET- A Survey on SaaS-Attacks and Digital Forensic
IRJET- A Survey on SaaS-Attacks and Digital Forensic
IRJET Journal
A survey on various resource allocation policies in cloud computing environment
A survey on various resource allocation policies in cloud computing environment
eSAT Journals
Cloud Armor: An Overview of Trusty Supporting Reputation based Management for...
Cloud Armor: An Overview of Trusty Supporting Reputation based Management for...
IRJET Journal
Evaluation of a Framework for Integrated Web Services
Evaluation of a Framework for Integrated Web Services
IRJET Journal
Similar to IRJET-A Survey on Stealthy Denial of Service Strategy in Cloud Computing
(20)
IMPROVING DDOS DETECTION IN IOT DEVICES
IMPROVING DDOS DETECTION IN IOT DEVICES
Stealthy Denial of Service Strategy in Cloud Computing
Stealthy Denial of Service Strategy in Cloud Computing
Stealthy denial of service strategy in cloud computing
Stealthy denial of service strategy in cloud computing
A DENIAL OF SERVICE STRATEGY TO ORCHESTRATE STEALTHY ATTACK PATTERNS IN CLOUD...
A DENIAL OF SERVICE STRATEGY TO ORCHESTRATE STEALTHY ATTACK PATTERNS IN CLOUD...
Algorithm for Scheduling of Dependent Task in Cloud
Algorithm for Scheduling of Dependent Task in Cloud
PROPOSED ONTOLOGY FRAMEWORK FOR DYNAMIC RESOURCE PROVISIONING ON PUBLIC CLOUD
PROPOSED ONTOLOGY FRAMEWORK FOR DYNAMIC RESOURCE PROVISIONING ON PUBLIC CLOUD
Design & Development of a Trustworthy and Secure Billing System for Cloud Com...
Design & Development of a Trustworthy and Secure Billing System for Cloud Com...
A017620123
A017620123
IRJET- Developing an Algorithm to Detect Malware in Cloud
IRJET- Developing an Algorithm to Detect Malware in Cloud
Trust Assessment Policy Manager in Cloud Computing – Cloud Service Provider’s...
Trust Assessment Policy Manager in Cloud Computing – Cloud Service Provider’s...
20150113
20150113
A Study On Service Level Agreement Management Techniques In Cloud
A Study On Service Level Agreement Management Techniques In Cloud
SecSecuring Software as a Service Model of Cloud Computing: Issues and Solutions
SecSecuring Software as a Service Model of Cloud Computing: Issues and Solutions
Cybersecurity Threat Detection of Anomaly Based DDoS Attack Using Machine Lea...
Cybersecurity Threat Detection of Anomaly Based DDoS Attack Using Machine Lea...
SaaS Application Scalability: Best Practices from Architecture to Cloud Infra...
SaaS Application Scalability: Best Practices from Architecture to Cloud Infra...
Cloud strategy briefing 101
Cloud strategy briefing 101
IRJET- A Survey on SaaS-Attacks and Digital Forensic
IRJET- A Survey on SaaS-Attacks and Digital Forensic
A survey on various resource allocation policies in cloud computing environment
A survey on various resource allocation policies in cloud computing environment
Cloud Armor: An Overview of Trusty Supporting Reputation based Management for...
Cloud Armor: An Overview of Trusty Supporting Reputation based Management for...
Evaluation of a Framework for Integrated Web Services
Evaluation of a Framework for Integrated Web Services
More from IRJET Journal
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
IRJET Journal
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
IRJET Journal
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
IRJET Journal
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
IRJET Journal
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
IRJET Journal
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
IRJET Journal
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
IRJET Journal
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
IRJET Journal
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
IRJET Journal
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
IRJET Journal
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
IRJET Journal
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
IRJET Journal
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
IRJET Journal
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
IRJET Journal
React based fullstack edtech web application
React based fullstack edtech web application
IRJET Journal
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
IRJET Journal
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
IRJET Journal
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
IRJET Journal
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
IRJET Journal
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
IRJET Journal
More from IRJET Journal
(20)
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
React based fullstack edtech web application
React based fullstack edtech web application
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Recently uploaded
UNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular Conduits
rknatarajan
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
ranjana rawat
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Suman Mia
Extrusion Processes and Their Limitations
Extrusion Processes and Their Limitations
120cr0395
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writing
rakeshbaidya232001
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Call Girls in Nagpur High Profile
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptx
upamatechverse
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur High Profile
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Call Girls in Nagpur High Profile
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
KurinjimalarL3
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls in Nagpur High Profile
result management system report for college project
result management system report for college project
Tonystark477637
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
RajkumarAkumalla
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
ranjana rawat
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
slot gacor bisa pakai pulsa
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Christo Ananth
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptx
upamatechverse
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
ssuser5c9d4b1
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
SIVASHANKAR N
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
ranjana rawat
Recently uploaded
(20)
UNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular Conduits
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Extrusion Processes and Their Limitations
Extrusion Processes and Their Limitations
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writing
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptx
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
result management system report for college project
result management system report for college project
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptx
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
IRJET-A Survey on Stealthy Denial of Service Strategy in Cloud Computing
1.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 01 | Jan -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 81 A Survey on Stealthy Denial of Service Strategy in Cloud Computing MISS. DIPALEE BALU RAUT1, PROF. MR. SAYYAD G. G2. 1 PG Scholar, Departement of Computer Engineering Dattakala Faculty of Engineering, Pune Maharashtra, India 2 Proffessor, Departement of Computer Engineering Dattakala Faculty of Engineering, Pune Maharashtra, India ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract - The successof thecloudcomputingparadigm is due to its on-demand, self-service, and pay-by-use nature. According to this paradigm, the effects of Denial of Service (DoS) attacks involve not only the quality of the delivered service, but also the service maintenance costs in terms of resource consumption. Specifically, thelonger the detection delay is, the higher the costs to be incurred. Therefore, a particular attention has to be paid for stealthy DoS attacks. They aim at minimizing their visibility, and at the same time, they can be as harmful as the brute-force attacks. They are sophisticated attacks tailored to leverage the worst-case performance of the target system through specific periodic, pulsing,andlow- rate traffic patterns. In this paper, we propose a strategy to orchestrate stealthy attack patterns, which exhibit a slowly-increasing-intensity trend designed to inflict the maximum financial cost to the cloud customer, while respecting the job size and the service arrival rate imposed by the detection mechanisms. We describe both how to apply the proposed strategy, and its effects on the target system deployed in the cloud. Key Words: Cloud computing, sophisticated attacks strategy, low-rate attacks, intrusion detection. 1.INTRODUCTION Cloud providers offer services to rent computation and storage capacity, in a way as transparent as possible, giving the impression of “unlimited resource availability‟. Such resources are not free. Therefore, cloud providers allow customers to obtain and configure suitably the system capacity, as well as to quickly renegotiate such capacity as their requirements change, in order that the customers can pay only for resources that they actually use. Several cloud providers offer the „loadbalancing‟serviceforautomatically distributing theincomingapplicationservicerequestsacross multiple instances, as well as the „auto scaling‟ service for enabling consumers to closely follow the demand curve for their applications. In order to minimize the customer costs, the auto scaling ensures that the number of the application instances increases seamlessly during the demand spikes and decreases automatically during the demand lulls. For example, by using Amazon EC2 cloud services, the consumers can set a condition to add new computational instances when the average CPU utilization exceeds a fixed threshold. Moreover, they can configure a cool-down period in order to allow the application workloadtostabilize before the auto scaling adds or removes the instances. In the following, we will show how this feature can be maliciously exploited by a stealthy attack, which may slowly exhaustthe resources provided by the cloud provider for ensuring the SLA, and enhance the costs incurred by the cloud customer. 2. LITERATURE SURVEY We present in this paper the novel concept of a policy orchestration service, which is designedtofacilitatesecurity and privacy governanceintheenterprise, particularlyfor the case where various services are provided to the enterprise through external suppliers in the cloud. The orchestration service mediates between the enterprises’ internal decision
2.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 01 | Jan -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 82 support systems (which incorporate core security and privacy recommendations) and the cloud-based service providers, who are assumed to be bound by contractual service level agreements with the enterprise. Thefunctionof the orchestration service, which is intended to be accessed as a trusted service in the cloud, is to ensure that applicable security and privacy recommendations are auctioned by service providers through adequate monitoring and enforcement mechanisms[1]. Cloud computing is a new business model, which represents an opportunity for users, companies, and public organisations to reduce costs and increase efficiency,aswell as an alternative way for providing services and resources. In this pay-by-use model, security plays a key role. Cyber attacks are a serious danger, which can compromise the quality of the service delivered to the customers, as well as the costs of the provided cloud resources and services. In this paper, a hybrid and hierarchical event correlation approach for intrusion detection in cloud computing is presented. It consists of detecting intrusion symptoms by collecting diverse information at several cloud architectural levels, using distributed security probes, as well as performing complex event analysis based on a complex event processing engine. The escalation process from intrusion symptoms to the identified cause and target of the intrusion is driven by a knowledge-base represented by an ontology. A prototype implementation of the proposed intrusion detection solution is also presented[2]. 3. EXISTING SYSTEM Sophisticated DDoS attacks are defined as that category of attacks, which are tailored to hurt a specific weak point in the target system design, in order to conduct denial of service or just to significantly degrade the performance.The term stealthy has been used to identify sophisticatedattacks that are specifically designed to keep the malicious behaviours virtually invisible to the detection mechanisms. These attacks can be significantly hardertodetectcompared with more traditional brute-force and flooding style attacks. The methods of launching sophisticated attacks can be categorized into two classes: job-content-based and jobs arrival pattern-based.Inrecentyears,variantsofDoSattacks that use low-rate traffic have been proposed, including Shrew attacks (LDoS), Reduction of Quality attacks (RoQ), and Low-Rate DoS attacks against application servers (LoRDAS). Disadvantages: 1. Sophisticated DDoS attacks are defined as that category of attacks, which are tailored to hurt a specific weak point in the target system design, in order to conduct denial of service or just to significantly degrade the performance. The term stealthy has been used to identify sophisticated attacks that are specifically designed to keep the malicious behaviors virtually invisible to the detection mechanisms. These attacks can be significantly harder to detect compared with more traditional brute-force and flooding style attacks. 2. The methods of launching sophisticated attackscan be categorized into two classes: job-content-based and jobs arrival pattern-based. 3. In recent years, variants of DoSattacksthatuselow- rate traffic have been proposed, including Shrew attacks (LDoS), Reduction of Quality attacks (RoQ), and Low-Rate DoS attacks against application servers (LoRDAS). 4. PROPOSED SYSTEM This paper presents a sophisticated strategy to orchestrate stealthy attack patterns against applications running in the cloud. Instead of aiming at making the service unavailable, the proposed strategy aims at exploiting thecloudflexibility, forcing the application to consume more resources than needed, affecting the cloud customer more on financial aspects than on the service availability. The attack patternis
3.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 01 | Jan -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 83 orchestrated in order to evade, or however,greatlydelaythe techniques proposed in the literature to detect low-rate attacks. It does not exhibit a periodic waveform typical of low-rate exhausting attacks. In contrast with them, it is an iterative and incremental process. In particular, the attack potency (in terms of service requests rate and concurrent attack sources) is slowly enhanced by a patient attacker, in order to inflict significant financial losses, even if the attack pattern is performed in accordance to the maximum jobsize and arrival rate of the service requests allowed in the system. Using a simplified model empirically designed, we derive an expression for gradually increasing the potency of the attack, as a function of the reached service degradation (without knowing in advance the target system capability). We show that the features offered by the cloud provider, to ensure the SLA negotiated with the customer (including the load balancing and auto-scaling mechanisms), can be maliciously exploited by the proposed stealthyattack,which slowly exhausts the resources provided by the cloud provider, and increases the costs incurred by the customer. The proposed attack strategy, namely Slowly-Increasing- Polymorphic DDoS Attack Strategy (SIPDAS) can be applied to several kind of attacks that leverage known application vulnerabilities, in order to degrade the service provided by the target application server running in the cloud. Fig -1: Block Diagram of Proposed System 5. MODELS A. Server under Attack Model B. Creating Service Degradation C. Minimize Attack Visibility D. XML-Based DoS Attack MODULES DESCSRIPTION A. Server under Attack Model: In order to assess the service degradation attributed to the attack, we define a synthetic representation of the system under attack. We suppose that the system consists of a pool of distributed VMs provided by the cloud provider,onwhich the application instances run. Moreover, we assume that a load balancing mechanism dispatches the user service requests among the instances. The instances can be automatically scaled up or down, by monitoring some parameter suitable to assess the provided QoS (e.g., the computational load, the used memory, and the number of active users). Specifically, we model the systemunderattack with a comprehensive capability, which represents a global amount of work the system is able to perform in order to process the service requests. Such capability is affected by several parameters, such as the number of VMs assigned to the application, the CPU performance, the memory capability, etc. Each service request consumes a certain amount of the capability on the base of the payload of the service request. Thus, the load CN of the system at time t can be modeled by a queuing system with Poisson arrivals, exponentially distributed service times, multiple servers, and n incoming requests in process (system capability). Moreover, the auto scaling feature of the cloud is modeled in a simple way: when new resources (e.g., VMs) are added to the system, the effect is an increase of the system capability. B. Creating Service Degradation: Considering a cloud system with a comprehensivecapability to process service requests, and a queue with size B that represents the bottleneck shared by the customer’s flows
4.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 01 | Jan -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 84 and the DoS flows. Denote C0 as the load at time the onset of an attack period T (assumed to occur at time t0), and CN as the load to process the user requests on the target system during the time window T. To exhaust thetarget resources,a number n of flows have to be orchestrated. C. Minimize Attack Visibility: According to the previous stealthy attack definition,inorder to reduce the attack visibility,Conditionshavetobesatisfied. Therefore, through the analysis of both the target system and the legitimate service requests (e.g., the XML document structure included within the HTTP messages),a patient and intelligent attacker should be able to discover anapplication vulnerability (e.g., a Deeply-Nested XML vulnerability), and identify the set of legitimate service requesttypes,whichcan be used to leverage such vulnerability.Forexample,foran X- DoS attack, the attacker could implement a set of XML messages with different number of nested tags. The threshold NT can be either fixed arbitrarily, or possibly, estimated during a training phase, in which the attacker injects a sequence of messages with nested XML tags growing, in order to identify a possible limitation imposed by a threshold- based XML validation schema. A similar approach can be used to estimate the maximum message rate with which injecting the service requests. D. XML-Based DoS Attack During the experimental campaign, we analyzed the CPU consumption depending on the number of nested XML tags and the frequency with which the malicious messages are injected. In particular, the CPU consumption on the target system to parse messagescontainingXML tagswithdifferent nested depth. [t] The results showed that a message of 500 nested tags is sufficient to produce a peak of CPU load of about 97 percent, whereas with 1,000 tags the CPU is fully committed to process the message for about 3 seconds. Moreover, we performed several attacks.Foreachattack,we injected a homogeneous XDoS flow, i.e., a sequence of messages with a fixed number of nested tags and a fixed message rate. Assuming that 20 seconds are the maximum time observed experimentally to reach a steady state value of CPU under attack (namely CR), and denoting ‘baseline’ as the average CPU load in absence of user load (about 9 percent). The implementation of a SIPDAS-based attack can be done in several ways. In this work, we use the same cloud framework adopted for building up the target server application. ADVANTAGES We show that the proposed slowly-increasing polymorphic behavior induces enough overload on the target system (to cause a significant financial losses), and evades, or however, delays greatly the detection methods. Even if the victim detects the attack, the attack process can be re-initiate by exploiting a different application vulnerability (polymorphism in the form), or a different timing (polymorphism over time), in order to inflict a prolongedconsumptionof resources. 6. CONCLUSION In this paper, we propose a strategy to implement stealthy attack patterns, which exhibit a slowly increasing polymorphic behaviour that can evade, or however, greatly delay the techniques proposed in the literaturetodetectlow rate attacks. Exploiting a vulnerability of the target application, a patient andintelligentattackercanorchestrate sophisticated flows of messages, in distinguishable from legitimate service requests. In particular, the proposed attack pattern, instead of aiming at making the service unavailable, it aims at exploiting the cloud flexibility,forcing the services to scale up and consume more resources than needed, affecting the cloud customer more on financial aspects than on the service availability.
5.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 01 | Jan -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 85 ACKNOWLEDGEMENT I would like to express my gratitude towards my guide and H.O.DofComputerEngineeringDepartmentProf.Sayyad G.G. for their support and guidance in my work. REFERENCES [1] M. C. Mont, K. McCorry, N. Papanikolaou, and S. Pearson, “Security and privacy governance in cloud computing via SLAS and a policy orchestration service,” in Proc. 2nd Int. Conf. Cloud Comput. Serv. Sci., 2012, pp. 670–674. [2] M. Ficco, “Security event correlation approach for cloud computing,” Int. J. High Perform. Comput. Netw., vol. 7, no. 3, pp. 173–185, 2013. [3] Cheng and C. Meinel, “Intrusion Detection in the Cloud,” in Proc. IEEE Int. Conf. Dependable, Autonom. Secure Comput., Dec. 2009, pp. 729–734. [4] C. Metz. (2009, Oct.).DDoS attack rains down on Amazon Cloud[Online].Available:http://www.theregister.co.uk/2009 /10/05/amazon_bitbucket_outage/S [5] K. Lu, D. Wu, J. Fan, S. Todorovic, and A. Nucci, “Robust and efficient detection of DDoS attacks for large-scale internet,” Comput. Netw., vol. 51, no. 18, pp. 5036–5056, 2007. [6] H. Sun, J. C. S. Lui, and D. K. Yau, “Defending against low- rate TCP attacks: Dynamic detectionandprotection,”inProc. 12th IEEE Int. Conf. Netw. Protocol., 2004, pp. 196-205. [7] A. Kuzmanovic and E. W. Knightly, “Low-rate TCP- Targeted denial of service attacks: The shrew vs. the mice and elephants,” in Proc. Int. Conf. Appl., Technol., Archit., Protocols Comput. Commun., 2003, pp. 75–86. [8] X. Xu, X. Guo, and S. Zhu, “A queuing analysis for low-rate DoS attacks against application servers,” in Proc. IEEE Int. Conf. Wireless Commun., Netw. Inf. Security, 2010, pp. 500– 504. [9] L. Wang, Z. Li, Y. Chen, Z. Fu, and X. Li, “Thwarting zero- day polymorphic worms with network-level length-based signature generation,” IEEE/ACM Trans.Netw.,vol.18,no.1, pp. 53–66, Feb. 2010. [10] A. Chonka, Y. Xiang, W. Zhou, and A. Bonti, “Cloud security defense to protect cloud computing against HTTP- DOS and XMLDoS attacks,” J. Netw. Comput.Appl.,vol.34, no. 4, pp. 1097–1107, Jul. 2011.
Download now