Mitigation of Cloud-Internal Denial of Service Attacks. / Alarifi, Suaad; Wolthusen, Stephen D.

Proceedings of the 2014 IEEE 8th International Symposium on Service Oriented System Engineering (SOSE 2014). IEEE Computer Society Press, 2014. p. 478.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Published

Standard

Mitigation of Cloud-Internal Denial of Service Attacks. / Alarifi, Suaad; Wolthusen, Stephen D.

Proceedings of the 2014 IEEE 8th International Symposium on Service Oriented System Engineering (SOSE 2014). IEEE Computer Society Press, 2014. p. 478.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Harvard

Alarifi, S & Wolthusen, SD 2014, Mitigation of Cloud-Internal Denial of Service Attacks. in Proceedings of the 2014 IEEE 8th International Symposium on Service Oriented System Engineering (SOSE 2014). IEEE Computer Society Press, pp. 478. https://doi.org/10.1109/SOSE.2014.71

APA

Alarifi, S., & Wolthusen, S. D. (2014). Mitigation of Cloud-Internal Denial of Service Attacks. In Proceedings of the 2014 IEEE 8th International Symposium on Service Oriented System Engineering (SOSE 2014) (pp. 478). IEEE Computer Society Press. https://doi.org/10.1109/SOSE.2014.71

Vancouver

Alarifi S, Wolthusen SD. Mitigation of Cloud-Internal Denial of Service Attacks. In Proceedings of the 2014 IEEE 8th International Symposium on Service Oriented System Engineering (SOSE 2014). IEEE Computer Society Press. 2014. p. 478 https://doi.org/10.1109/SOSE.2014.71

Author

Alarifi, Suaad ; Wolthusen, Stephen D. / Mitigation of Cloud-Internal Denial of Service Attacks. Proceedings of the 2014 IEEE 8th International Symposium on Service Oriented System Engineering (SOSE 2014). IEEE Computer Society Press, 2014. pp. 478

BibTeX

@inproceedings{e72bb63ea50e4f8c9061a38a22be611f,
title = "Mitigation of Cloud-Internal Denial of Service Attacks",
abstract = "Cloud computing security is one of the main concerns preventing the adoption of the cloud by many organisations. This paper introduces mitigation strategies to defend the cloud specific CIDoS class of attacks (Cloud-Internal Denial of Service), presented in [1]. The mitigation approaches are based on techniques used in signals processing field. The main strategy to detect the attack is the calculation of correlations measurement and distances between attackers workload patters, we use DCT (Discrete Cosine Transform) to accomplish this task. This paper also suggests some prevention and response strategies.",
author = "Suaad Alarifi and Wolthusen, {Stephen D.}",
year = "2014",
doi = "10.1109/SOSE.2014.71",
language = "English",
pages = "478",
booktitle = "Proceedings of the 2014 IEEE 8th International Symposium on Service Oriented System Engineering (SOSE 2014)",
publisher = "IEEE Computer Society Press",

}

RIS

TY - GEN

T1 - Mitigation of Cloud-Internal Denial of Service Attacks

AU - Alarifi, Suaad

AU - Wolthusen, Stephen D.

PY - 2014

Y1 - 2014

N2 - Cloud computing security is one of the main concerns preventing the adoption of the cloud by many organisations. This paper introduces mitigation strategies to defend the cloud specific CIDoS class of attacks (Cloud-Internal Denial of Service), presented in [1]. The mitigation approaches are based on techniques used in signals processing field. The main strategy to detect the attack is the calculation of correlations measurement and distances between attackers workload patters, we use DCT (Discrete Cosine Transform) to accomplish this task. This paper also suggests some prevention and response strategies.

AB - Cloud computing security is one of the main concerns preventing the adoption of the cloud by many organisations. This paper introduces mitigation strategies to defend the cloud specific CIDoS class of attacks (Cloud-Internal Denial of Service), presented in [1]. The mitigation approaches are based on techniques used in signals processing field. The main strategy to detect the attack is the calculation of correlations measurement and distances between attackers workload patters, we use DCT (Discrete Cosine Transform) to accomplish this task. This paper also suggests some prevention and response strategies.

U2 - 10.1109/SOSE.2014.71

DO - 10.1109/SOSE.2014.71

M3 - Conference contribution

SP - 478

BT - Proceedings of the 2014 IEEE 8th International Symposium on Service Oriented System Engineering (SOSE 2014)

PB - IEEE Computer Society Press

ER -