References
Ali, M., Khan, S.U., & Vasilakos, A.V. (2015). Security in cloud computing: Opportunities and challenges. Inform. Sci. 305, 357β383. http://dx.doi.org/10.1016/j.ins.2015.01.025. Bamasag, O., Alsaeedi, A., Munshi, A., Alghazzawi, D., Alshehri, S., and Jamjoom, A. (2022). Real-time ddos flood attack monitoring and detection (RT-AMD) model for cloud computing. PeerJ Comput. Sci. 7, e814. http://dx.doi.org/10.7717/peerj-cs.814. Behal, S. and Kumar, K. (2017). Detection of DDoS attacks and flash events using novel information theory metrics, Computer Networks, 116(4), 96β110. Cheng, J., Yin, J., Wu, C., Zhang, B. and Liu, Y. (2009). DDoS attack detection method based on linear prediction model, Emerging Intelligent Computing Technology and Applications,1004β1013, Springer, Berlin Heidelberg. Deshmukh RV, Devadkar K. Understanding DDoS attack & its effect in cloud environment. Procedia Comput Sci 2015;49:202β10. doi: 10.1016/j.procs. 2015.04.245 . Gu, Q. and Liu, P. (n.d.), Denial of Service Attacks, Accessed: 12-Jan-2025 https://s2.ist.psu.edu/paper/ddos-chap-gu-june-07.pdf Jacques, S. and Christe, B. (2020), Information technology, In Introduction to Clinical Engineering, Academic Press, 109-126, https://doi.org/10.1016/B978-0-12-818103- 4.00005-3. Lundqvist, A. and landsberg, J. (n.d.). DoS Mitigation using Proof of Work. Accessed: 12-Jan- 2025 https://www.csc.kth.se/utbildning/kth/kurser/DD143X/dkand12/Group5Mikael/final/ Jonatan_Landsberg_and_Anton_Lundqvist.pdf Ouhssini, M., Afdel, K., Agherrabi, E., Akouhar, M., and Abarda, A. (2024). DeepDefend: A comprehensive framework for DDoS attack detection and prevention in cloud computing, Journal of King Saud University - Computer and Information Sciences, 36. Poonam Gupta, P. & Om Prabha, M.I. (2022). IoT in healthcare ecosystem, In Advances in Biomedical Information, Applications of Computational Intelligence in Multi- Disciplinary Research, Academic Press, 187-204, https://doi.org/10.1016/B978-0-12- 823978-0.00003-4. Jazi, H.H., Gonzalez, H., Stakhanova, N. and Ghorbani, A.A. (2017) Detecting http-based application layer DoS attacks on web servers in the presence of sampling, Computer Networks, 121, (7) 25β36. Sachdeva, M., Kumar, K. and Singh, G. (2016) A comprehensive approach to discriminate DDoS attacks from flash eventsβ, Journal of Information Security and Applications, 26 (2), 8β22. Sharma, A., Pujari, A.K. and Paliwal, K.K. (2007). Intrusion detection using text processing techniques with a kernel based similarity measure, Computers & Security, 26(7β 8),488β495. Shidaganti, G.I., Inamdar, A. S., Rai, S.V., & Rajeev, A.M. (2020). SCEF: A model for prevention of ddos attacks from the cloud. Int. J. Cloud Appl. Comput. 10 (3), 67β81. http://dx.doi.org/10.4018/IJCAC.2020070104. Shiravi, A., Shiravi, H., Tavallaee, M., & Ghorbani, A.A. (2012). Toward developing a systematic approach to generate benchmark datasets for intrusion detection, Computers & Security, 31(3), 357-374, https://doi.org/10.1016/j.cose.2011.12.012. Susnjara, S. and Smalley, I. (n.d.). What is cloud computing? Accessed: 10-Jan-2025 https://www.ibm.com/think/topics/cloud- computing#:~:text=Cloud%20computing%20is%20the%20on,pay%2Dper%2Duse% 20pricing. Yan, Q., Yu, F. R., Gong, Q., & Li, J. (2015). Software-defined networking (SDN) and distributed denial of service (ddos) attacks in cloud computing environments: A survey, some research issues, and challenges. IEEE Comm. Surv. Tutor. http://dx.doi.org/10.1109/COMST.2015.2487361. Zargar, S.T., Joshi, J. and Tipper, D. (2013).A survey of defense mechanisms against distributed denial of service (DDoS) flooding attacks, IEEE Communications Surveys & Tutorials,15(4), 2046β2069.