Hedjaz Sabrine, Abderrahmane Baadache, F. Semchedine
{"title":"Comparative Study of Security Methods against DDOS Attacks in Cloud Computing Environment","authors":"Hedjaz Sabrine, Abderrahmane Baadache, F. Semchedine","doi":"10.1109/ISNCC.2019.8909110","DOIUrl":null,"url":null,"abstract":"Cloud computing has become the future of companies and organizations due to their features that enable to reduce operating costs and increase the effectiveness of systems. However, this evolution made the cloud computing system highly vulnerable to several security threats. Distributed Denial of Service (DDoS) attacks are dangerous attacks that can consume the cloud resources (e.g., Bandwidth, Memory, CPU, etc.), and break down the availability of service to clients. In this paper, we focus on these attacks and we provide a comparative study of recent security mechanisms that are proposed in the literature.","PeriodicalId":187178,"journal":{"name":"2019 International Symposium on Networks, Computers and Communications (ISNCC)","volume":"44 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2019-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2019 International Symposium on Networks, Computers and Communications (ISNCC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ISNCC.2019.8909110","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 2
Abstract
Cloud computing has become the future of companies and organizations due to their features that enable to reduce operating costs and increase the effectiveness of systems. However, this evolution made the cloud computing system highly vulnerable to several security threats. Distributed Denial of Service (DDoS) attacks are dangerous attacks that can consume the cloud resources (e.g., Bandwidth, Memory, CPU, etc.), and break down the availability of service to clients. In this paper, we focus on these attacks and we provide a comparative study of recent security mechanisms that are proposed in the literature.