{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,2]],"date-time":"2026-01-02T07:39:14Z","timestamp":1767339554825},"publisher-location":"Cham","reference-count":94,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030222765"},{"type":"electronic","value":"9783030222772"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-22277-2_20","type":"book-chapter","created":{"date-parts":[[2019,12,31]],"date-time":"2019-12-31T12:02:28Z","timestamp":1577793748000},"page":"493-524","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":13,"title":["A Comprehensive Review of Distributed Denial of Service (DDoS) Attacks in Fog Computing Environment"],"prefix":"10.1007","author":[{"given":"Bhumika","family":"Paharia","sequence":"first","affiliation":[]},{"given":"Kriti","family":"Bhushan","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,1,1]]},"reference":[{"key":"20_CR1","unstructured":"What is cloud computing? Definition from WhatIs.com. Retrieved February, 2018, from http:\/\/searchcloudcomputing.techtarget.com\/definition\/cloud-computing"},{"issue":"2","key":"20_CR2","doi-asserted-by":"publisher","first-page":"843","DOI":"10.1109\/SURV.2012.060912.00182","volume":"15","author":"Z Xiao","year":"2013","unstructured":"Xiao, Z., & Yang, X. (2013). Security and privacy in cloud computing. IEEE Communications Surveys & Tutorials, 15(2), 843\u2013859.","journal-title":"IEEE Communications Surveys & Tutorials"},{"issue":"3","key":"20_CR3","doi-asserted-by":"publisher","first-page":"273","DOI":"10.1109\/JLT.2008.2006991","volume":"27","author":"RP Davey","year":"2009","unstructured":"Davey, R. P., Grossman, D., Rasztovitswiech, M., Payne, D. B., Nesset, D., Kelly, A. E., Rafel, A., Appathurai, S., & Yang, S. H. (2009). Long-reach passive optical networks. Journal of Lightwave Technology, 27(3), 273\u2013291.","journal-title":"Journal of Lightwave Technology"},{"issue":"3","key":"20_CR4","doi-asserted-by":"publisher","first-page":"579","DOI":"10.1007\/s12083-016-0476-x","volume":"10","author":"W Zhang","year":"2017","unstructured":"Zhang, W., Lin, B., Yin, Q., & Zhao, T. (2017). Infrastructure deployment and optimization of fog network based on microDC and LRPON integration. Peer-to-Peer Networking and Applications, 10(3), 579\u2013591.","journal-title":"Peer-to-Peer Networking and Applications"},{"issue":"8","key":"20_CR5","doi-asserted-by":"publisher","first-page":"82","DOI":"10.1109\/MCOM.2014.6871674","volume":"52","author":"E Bastug","year":"2014","unstructured":"Bastug, E., Bennis, M., & Debbah, M. (2014). Living on the edge: The role of proactive caching in 5G wireless network. IEEE Communications Magazine, 52(8), 82\u201389.","journal-title":"IEEE Communications Magazine"},{"key":"20_CR6","doi-asserted-by":"crossref","unstructured":"Hassan, M. A., Xiao, M., Wei, Q., & Chen, S. (2015). Help your mobile applications with fog computing. In Proceedings of the IEEE international conference on sensing, communication, and networking \u2013 workshop (pp. 1\u20136). IEEE.","DOI":"10.1109\/SECONW.2015.7328146"},{"key":"20_CR7","unstructured":"What is fog computing? Why it matters in our big data and IoT world? Retrieved February, 2018, from https:\/\/www.forbes.com\/sites\/bernardmarr\/2016\/10\/14\/what-is-fog-computing-and-why-it-matters-in-our-big-data-and-iot-world\/2\/"},{"key":"20_CR8","doi-asserted-by":"publisher","first-page":"1","DOI":"10.15439\/2014F503","volume-title":"Proceedings of the 2014 federated conference on computer science and information systems","author":"I Stojmenovic","year":"2014","unstructured":"Stojmenovic, I., & Wen, S. (2014). The fog computing paradigm: Scenarios and security issues. In Proceedings of the 2014 federated conference on computer science and information systems (Vol. 2, pp. 1\u20138). Marlton, NJ: ACSIS. https:\/\/doi.org\/10.15439\/2014F503 ."},{"key":"20_CR9","unstructured":"Just the facts: Insights of fog for 2018. OpenFog Consortium. Retrieved February, 2018, from https:\/\/www.openfogconsortium.org\/just-the-facts-insights-of-fog-for-2018\/"},{"key":"20_CR10","unstructured":"What is fog computing? (Fog networking or fogging). WhatIs.com. Retrieved February, 2018, from http:\/\/internetofthingsagenda.techtarget.com\/definition\/fog-computing-fogging"},{"key":"20_CR11","doi-asserted-by":"publisher","first-page":"27","DOI":"10.1016\/j.jnca.2017.09.002","volume":"98","author":"P Hua","year":"2017","unstructured":"Hua, P., Dhelima, S., Ninga, H., & Qiu, T. (2017). Survey on fog computing: Architecture, key technologies, applications and open issues. Journal of Network and Computer Applications, 98, 27\u201342.","journal-title":"Journal of Network and Computer Applications"},{"issue":"2","key":"20_CR12","doi-asserted-by":"publisher","first-page":"23","DOI":"10.1049\/iet-net.2015.0034","volume":"5","author":"S Sarkar","year":"2016","unstructured":"Sarkar, S., & Misra, S. (2016). Theoretical modelling of fog computing: A green computing paradigm to support IoT applications. IET Networks, 5(2), 23\u201329.","journal-title":"IET Networks"},{"issue":"06","key":"20_CR13","doi-asserted-by":"publisher","first-page":"335","DOI":"10.15623\/ijret.2015.0406057","volume":"04","author":"P More","year":"2015","unstructured":"More, P. (2015). Review of implementing fog computing. IJRET: International Journal of Research in Engineering and Technology, 04(06), 335\u2013338.","journal-title":"IJRET: International Journal of Research in Engineering and Technology"},{"key":"20_CR14","unstructured":"Oueis, J., Strinati, E.C., Sardellitti, S., & Barbarossa, S.. (2015). Small cell clustering for efficient distributed fog computing: A multi-user case, In Proceedings of the IEEE 82nd vehicular technology conference (VTC Fall) (pp. 1\u20135)."},{"issue":"12","key":"20_CR15","doi-asserted-by":"publisher","first-page":"3702","DOI":"10.1109\/TC.2016.2536019","volume":"65","author":"D Zeng","year":"2016","unstructured":"Zeng, D., Gu, L., Guo, S., Cheng, Z., & Yu, S. (2016). Joint optimization of task scheduling and image placement in fog computing supported software-defined embedded system. IEEE Transactions on Computers, 65(12), 3702\u20133712.","journal-title":"IEEE Transactions on Computers"},{"issue":"2","key":"20_CR16","doi-asserted-by":"publisher","first-page":"56","DOI":"10.1016\/S1005-8885(16)60021-3","volume":"23","author":"K Kang","year":"2016","unstructured":"Kang, K., Wang, C., & Luo, T. (2016). Fog computing for vehicular ad-hoc networks: Paradigms, scenarios, and issues. The Journal of China Universities of Posts and Telecommunications, 23(2), 56\u201396.","journal-title":"The Journal of China Universities of Posts and Telecommunications"},{"issue":"3","key":"20_CR17","doi-asserted-by":"publisher","first-page":"40","DOI":"10.1109\/MPOT.2015.2456213","volume":"35","author":"M Aazam","year":"2016","unstructured":"Aazam, M., & Huh, E. N. (2016). Fog computing: The cloud-IoT\/IoE middleware paradigm. IEEE Potentials, 35(3), 40\u201344.","journal-title":"IEEE Potentials"},{"key":"20_CR18","first-page":"169","volume-title":"Big data and internet of things: A roadmap for smart environments. Studies in computational intelligence","author":"F Bonomi","year":"2014","unstructured":"Bonomi, F., Milito, R., Natarajan, P., & Zhu, J. (2014). Fog computing: A platform for internet of things and analytics. In N. Bessis & C. Dobre (Eds.), Big data and internet of things: A roadmap for smart environments. Studies in computational intelligence (Vol. 546, pp. 169\u2013186). Cham: Springer."},{"key":"20_CR19","first-page":"169","volume-title":"Fog computing: A platform for internet of things and analytics, in big data and internet of things: A roadmap for smart environments","author":"R Milito","year":"2014","unstructured":"Milito, R., Natarajan, P., & Zhu, J. (2014). Fog computing: A platform for internet of things and analytics, in big data and internet of things: A roadmap for smart environments (pp. 169\u2013186). Cham: Springer."},{"issue":"4","key":"20_CR20","doi-asserted-by":"publisher","first-page":"1910","DOI":"10.1109\/TII.2016.2607178","volume":"13","author":"P Hu","year":"2017","unstructured":"Hu, P., Ning, H., Qiu, T., Zhang, Y., & Luo, X. (2017). Fog computing-based face identification and resolution scheme in internet of things. IEEE Transactions on Industrial Informatics, 13(4), 1910\u20131920.","journal-title":"IEEE Transactions on Industrial Informatics"},{"issue":"5","key":"20_CR21","doi-asserted-by":"publisher","first-page":"3685","DOI":"10.1109\/TVT.2015.2445833","volume":"65","author":"Y Zhang","year":"2016","unstructured":"Zhang, Y., Niyato, D., Wang, P., & Dong, I. K. (2016). Optimal energy management policy of mobile energy gateway. IEEE Transactions on Vehicular Technology, 65(5), 3685\u20133699.","journal-title":"IEEE Transactions on Vehicular Technology"},{"issue":"5","key":"20_CR22","doi-asserted-by":"publisher","first-page":"1728","DOI":"10.1109\/JSAC.2016.2545559","volume":"34","author":"F Jalali","year":"2016","unstructured":"Jalali, F., Hinton, K., Ayre, R., & Alpcan, T. (2016). Fog computing may help to save energy in cloud computing. IEEE Journal on Selected Areas in Communications, 34(5), 1728\u20131739.","journal-title":"IEEE Journal on Selected Areas in Communications"},{"issue":"1","key":"20_CR23","doi-asserted-by":"publisher","first-page":"253","DOI":"10.1007\/s11277-012-0692-5","volume":"70","author":"AR Natal","year":"2013","unstructured":"Natal, A. R., Jakab, L., Portols, M., Ermagan, V., Natarajan, P., Maino, F., Meyer, D., & Aparicio, A. C. (2013). LISP-MN: Mobile networking through LISP. Wireless Personal Communications, 70(1), 253\u2013266.","journal-title":"Wireless Personal Communications"},{"issue":"5","key":"20_CR24","first-page":"1004","volume":"5","author":"A Natraj","year":"2016","unstructured":"Natraj, A. (2016). Fog computing focusing on users at the edge of internet of things. International Journal of Engineering Research, 5(5), 1004\u20131008.","journal-title":"International Journal of Engineering Research"},{"key":"20_CR25","doi-asserted-by":"crossref","unstructured":"Varshney, P., & Simmhan, Y. (2017). Demystifying fog computing: Characterizing architectures, applications and abstractions. In 2017 IEEE 1st International Conference on Fog and Edge Computing (ICFEC). IEEE.","DOI":"10.1109\/ICFEC.2017.20"},{"key":"20_CR26","unstructured":"Luan, T. H., Gao, L., Li, Z., Xiang, Y., Wei, G., & Sun, L. (2016). Fog computing: focusing on mobile users at the edge. arXiv:1502.01815v3."},{"issue":"4","key":"20_CR27","doi-asserted-by":"publisher","first-page":"2271","DOI":"10.1007\/s11235-011-9532-2","volume":"52","author":"MS Hossain","year":"2013","unstructured":"Hossain, M. S., & Atiquzzaman, M. (2013). Cost analysis of mobility protocols. Telecommunication Systems, 52(4), 2271\u20132285.","journal-title":"Telecommunication Systems"},{"key":"20_CR28","first-page":"1614","volume-title":"Proceedings of the IEEE military communications conference","author":"W Gao","year":"2014","unstructured":"Gao, W. (2014). Opportunistic peer-to-peer mobile cloud computing at the tactical edge. In Proceedings of the IEEE military communications conference (pp. 1614\u20131620). Piscataway: IEEE."},{"issue":"4","key":"20_CR29","first-page":"974","volume":"24","author":"X Chen","year":"2015","unstructured":"Chen, X., Jiao, L., Li, W., & Fu, X. (2015). Efficient multi-user computation offloading for mobile-edge cloud computing. IEEE\/ACM Transactions on Networking, 24(4), 974\u2013983.","journal-title":"IEEE\/ACM Transactions on Networking"},{"issue":"7","key":"20_CR30","doi-asserted-by":"publisher","first-page":"1361","DOI":"10.1109\/JSAC.2014.2332077","volume":"32","author":"C Wei","year":"2014","unstructured":"Wei, C., Fadlullah, Z., Kato, N., & Stojmenovic, I. (2014). On optimally reducing power loss in micro-grids with power storage devices. IEEE Journal of Selected Areas in Communications, 32(7), 1361\u20131370.","journal-title":"IEEE Journal of Selected Areas in Communications"},{"key":"20_CR31","doi-asserted-by":"publisher","first-page":"13","DOI":"10.1145\/2342509.2342513","volume-title":"Proceedings of the first edition of the MCC workshop on mobile cloud computing, ser. MCC\u201912","author":"F Bonomi","year":"2012","unstructured":"Bonomi, F., Milito, R., Zhu, J., & Addepalli, S. (2012). Fog computing and its role in the internet of things. In Proceedings of the first edition of the MCC workshop on mobile cloud computing, ser. MCC\u201912 (pp. 13\u201316). New York: ACM."},{"key":"20_CR32","unstructured":"Research report on %year market sizing of Fog by OpenFog Consortium. Retrieved February, 2018, from https:\/\/www.openfogconsortium.org\/wp-content\/uploads\/451-Research-report-on-5-year-Market-Sizing-of-Fog-Oct-2017.pdf"},{"issue":"15","key":"20_CR33","doi-asserted-by":"publisher","first-page":"2787","DOI":"10.1016\/j.comnet.2010.05.010","volume":"54","author":"L Atzori","year":"2010","unstructured":"Atzori, L., Iera, A., & Morabito, G. (2010). The internet of things: A survey. Computer Networks, 54(15), 2787\u20132805.","journal-title":"Computer Networks"},{"issue":"3","key":"20_CR34","doi-asserted-by":"publisher","first-page":"195","DOI":"10.1007\/s11235-014-9867-6","volume":"58","author":"H Ning","year":"2015","unstructured":"Ning, H., Fu, Y., Hu, S., & Liu, H. (2015). Tree-code modeling and addressing for non-id physical objects in the internet of things. Telecommunication Systems, 58(3), 195\u2013204.","journal-title":"Telecommunication Systems"},{"issue":"3","key":"20_CR35","doi-asserted-by":"publisher","first-page":"1759","DOI":"10.1109\/TNET.2015.2432804","volume":"24","author":"K Liu","year":"2016","unstructured":"Liu, K., Ng, J., Lee, V., Son, S., & Stojmenovic, I. (2016). Cooperative data dissemination in hybrid vehicular networks: VANET as a software defined network. IEEE\/ACM Transactions on Networking, 24(3), 1759\u20131773.","journal-title":"IEEE\/ACM Transactions on Networking"},{"issue":"9","key":"20_CR36","doi-asserted-by":"publisher","first-page":"16","DOI":"10.1145\/2500468.2500473","volume":"56","author":"K Kirkpatrick","year":"2013","unstructured":"Kirkpatrick, K. (2013). Software-defined networking. Communications of the ACM, 56(9), 16\u201319.","journal-title":"Communications of the ACM"},{"issue":"2","key":"20_CR37","doi-asserted-by":"publisher","first-page":"114","DOI":"10.1109\/MCOM.2013.6461195","volume":"51","author":"H Kim","year":"2013","unstructured":"Kim, H., & Feamster, N. (2013). Improving network management with software defined networking. IEEE Communications Magazine, 51(2), 114\u2013119.","journal-title":"IEEE Communications Magazine"},{"issue":"1","key":"20_CR38","first-page":"10","volume":"103","author":"D Kreutz","year":"2014","unstructured":"Kreutz, D., Ramos, F. M. V., Esteves Verissimo, P., Esteve Rothenberg, C., Azodolmolky, S., & Uhlig, S. (2014). Software-defined networking: A comprehensive survey. Proceedings of the IEEE, 103(1), 10\u201313.","journal-title":"Proceedings of the IEEE"},{"issue":"3","key":"20_CR39","doi-asserted-by":"publisher","first-page":"1617","DOI":"10.1109\/SURV.2014.012214.00180","volume":"16","author":"A Nunes","year":"2014","unstructured":"Nunes, A., Mendonca, M., Nguyen, X. N., & Obraczka, K. (2014). A survey of software defined networking: Past, present, and future of programmable networks. IEEE Communications Surveys and Tutorials, 16(3), 1617\u20131634.","journal-title":"IEEE Communications Surveys and Tutorials"},{"issue":"5","key":"20_CR40","doi-asserted-by":"publisher","first-page":"1985","DOI":"10.1007\/s12652-018-0800-9","volume":"10","author":"K Bhushan","year":"2018","unstructured":"Bhushan, K., & Gupta, B. B. (2018). Distributed denial of service (DDoS) attack mitigation in software defined network (SDN)-based cloud computing environment. Journal of Ambient Intelligence and Humanized Computing, 10(5), 1985\u20131997.","journal-title":"Journal of Ambient Intelligence and Humanized Computing"},{"key":"20_CR41","doi-asserted-by":"publisher","first-page":"680","DOI":"10.1016\/j.future.2016.11.009","volume":"78","author":"R Roman","year":"2018","unstructured":"Roman, R., Lopez, J., & Mambo, M. (2018). Mobile edge computing, Fog et al.: A survey and analysis of security threats and challenges. Future Generation Computer Systems, 78, 680\u2013698.","journal-title":"Future Generation Computer Systems"},{"issue":"2","key":"20_CR42","doi-asserted-by":"publisher","first-page":"81","DOI":"10.1504\/IJBDI.2017.083116","volume":"4","author":"K Bhushan","year":"2017","unstructured":"Bhushan, K., & Gupta, B. B. (2017). Security challenges in cloud computing: State-of-art. International Journal of Big Data Intelligence, 4(2), 81\u2013107.","journal-title":"International Journal of Big Data Intelligence"},{"key":"20_CR43","doi-asserted-by":"crossref","first-page":"531","DOI":"10.1145\/2554850.2554982","volume-title":"Proceedings of the 29th annual ACM symposium on applied computing (SAC\u201914)","author":"P Barbosa","year":"2014","unstructured":"Barbosa, P., Brito, A., Almeida, H., & Claub, S. (2014). Lightweight privacy for smart metering data by adding noise. In Proceedings of the 29th annual ACM symposium on applied computing (SAC\u201914) (pp. 531\u2013538). New York: ACM."},{"key":"20_CR44","doi-asserted-by":"crossref","first-page":"178","DOI":"10.1007\/978-3-642-10772-6_14","volume-title":"Proceedings 5th international conference information systems security (ICISS 2009)","author":"L Martignoni","year":"2009","unstructured":"Martignoni, L., Paleari, R., & Bruschi, D. (2009). A framework for behavior-based malware analysis in the cloud. In Proceedings 5th international conference information systems security (ICISS 2009) (pp. 178\u2013192). New York: Springer."},{"key":"20_CR45","doi-asserted-by":"publisher","first-page":"761","DOI":"10.1016\/j.future.2017.08.043","volume":"82","author":"AA Diro","year":"2018","unstructured":"Diro, A. A., & Chilamkurti, N. (2018). Distributed attack detection scheme using deep learning approach for internet of things. Future Generation Computer Systems, 82, 761\u2013768.","journal-title":"Future Generation Computer Systems"},{"issue":"6","key":"20_CR46","doi-asserted-by":"publisher","first-page":"854","DOI":"10.1109\/JIOT.2016.2584538","volume":"3","author":"M Chiang","year":"2016","unstructured":"Chiang, M., Fellow, I. E. E. E., & Zhang, T. (2016). Fog and IoT: An overview of research opportunities. IEEE Internet of Things Journal, 3(6), 854\u2013864.","journal-title":"IEEE Internet of Things Journal"},{"key":"20_CR47","doi-asserted-by":"publisher","first-page":"947","DOI":"10.1016\/j.procs.2018.05.110","volume":"132","author":"K Bhushan","year":"2018","unstructured":"Bhushan, K., & Gupta, B. B. (2018). Hypothesis test for low-rate DDoS attack detection in cloud computing environment. Procedia Computer Science, 132, 947\u2013955.","journal-title":"Procedia Computer Science"},{"issue":"13","key":"20_CR48","doi-asserted-by":"publisher","first-page":"119","DOI":"10.1016\/j.comcom.2014.02.006","volume":"50","author":"W Liu","year":"2014","unstructured":"Liu, W., Nishio, T., Shinkuma, R., & Takahashi, T. (2014). Adaptive resource discovery in mobile cloud computing. Computer Communications, 50(13), 119\u2013129.","journal-title":"Computer Communications"},{"issue":"5","key":"20_CR49","doi-asserted-by":"publisher","first-page":"1143","DOI":"10.1109\/JIOT.2017.2659783","volume":"4","author":"P Hu","year":"2017","unstructured":"Hu, P., Ning, H., Qiu, T., Song, H., Wang, Y., & Yao, X. (2017). Security and privacy preservation scheme of face identification and resolution framework using fog computing in internet of things. IEEE Internet of Things Journal, 4(5), 1143\u20131155.","journal-title":"IEEE Internet of Things Journal"},{"key":"20_CR50","first-page":"1","volume-title":"2018 9th international conference on computing, communication and networking technologies (ICCCNT)","author":"B Paharia","year":"2018","unstructured":"Paharia, B., & Bhushan, K. (2018). Fog computing as a defensive approach against distributed denial of service (DDoS): A proposed architecture. In 2018 9th international conference on computing, communication and networking technologies (ICCCNT) (pp. 1\u20137). Piscataway: IEEE."},{"key":"20_CR51","doi-asserted-by":"crossref","unstructured":"Lee, K., Kim, D., Ha, D., & Rajput, U. (2015). On security and privacy issues of fog computing supported internet of things environment. In Proceedings of the international conference on the network of the future (pp. 1\u20133). IEEE","DOI":"10.1109\/NOF.2015.7333287"},{"key":"20_CR52","doi-asserted-by":"crossref","unstructured":"Lee, K., Kimy, D., Ha, D., Rajput, U., & Oh, H. (2015). On security and privacy issues of fog computing supported internet of things environment. In Proc. 6th international conference on the network of the future (NOF), Montreal, QC, Canada (pp. 1\u20133).","DOI":"10.1109\/NOF.2015.7333287"},{"issue":"6","key":"20_CR53","doi-asserted-by":"publisher","first-page":"568","DOI":"10.1109\/TDSC.2013.2297110","volume":"11","author":"X Huang","year":"2014","unstructured":"Huang, X., Xiang, Y., Bertino, E., Zhou, J., & Xu, L. (2014). Robust multi-factor authentication for fragile communications. IEEE Transactions on Dependable and Secure Computing, 11(6), 568\u2013581.","journal-title":"IEEE Transactions on Dependable and Secure Computing"},{"key":"20_CR54","doi-asserted-by":"crossref","unstructured":"Yi, S., Qin, Z., & Li, Q. Security and privacy issues of fog computing: A survey. In K. Xu & H. Zhu (Eds.), Wireless algorithms, systems, and applications. WASA 2015 (Lecture notes in computer science) (Vol. 9204). Cham: Springer.","DOI":"10.1007\/978-3-319-21837-3_67"},{"key":"20_CR55","first-page":"16","volume-title":"Proceedings of the IEEE 15th international conference on information reuse and integration, IRI","author":"C Dsouza","year":"2014","unstructured":"Dsouza, C., Ahn, G.-J., & Taguinod, M. (2014). Policy-driven security management for fog computing: Preliminary framework and a case study. In Proceedings of the IEEE 15th international conference on information reuse and integration, IRI (pp. 16\u201323). Piscataway: IEEE."},{"issue":"16","key":"20_CR56","doi-asserted-by":"publisher","first-page":"3049","DOI":"10.1002\/sec.1224","volume":"9","author":"K Gai","year":"2016","unstructured":"Gai, K., Qiu, M., Tao, L., & Zhu, Y. (2016). Intrusion detection techniques for mobile cloud computing in heterogeneous 5G. Security and Communication Networks, 9(16), 3049\u20133058.","journal-title":"Security and Communication Networks"},{"key":"20_CR57","unstructured":"Falliere, N., Murchu, L. O., & Chien, E. (2011). W32.stuxnet Dossier. Symantec Security Response, Ver. 1.4. Mountain View, CA: Symantec."},{"key":"20_CR58","volume-title":"Proceedings of the 15th conference on USENIX security symposium (USENIX-SS\u201906)","author":"S Berger","year":"2006","unstructured":"Berger, S., C\u00e1ceres, R., Goldman, K. A., Perez, R., Sailer, R., & van Doorn, L. (2006). vTPM: Virtualizing the trusted platform module. In Proceedings of the 15th conference on USENIX security symposium (USENIX-SS\u201906) (Vol. 15, Article No. 21). Berkeley: USENIX Association."},{"key":"20_CR59","first-page":"53","volume-title":"Proceedings of the 39th IEEE annual computer software and applications conference, COMPSAC","author":"Y Wang","year":"2015","unstructured":"Wang, Y., Uehara, T., & Sasaki, R. (2015). Fog computing: Issues and challenges in security and forensics. In Proceedings of the 39th IEEE annual computer software and applications conference, COMPSAC (Vol. 3, pp. 53\u201359)."},{"key":"20_CR60","volume-title":"Countdown to zero day: Stuxnet and the launch of the world\u2019s first digital weapon","author":"K Zetter","year":"2014","unstructured":"Zetter, K. (2014). Countdown to zero day: Stuxnet and the launch of the world\u2019s first digital weapon. New York: Crown."},{"key":"20_CR61","unstructured":"Stuxnet. Retrieved January, 2017, from https:\/\/en.wikipedia.org\/wiki\/Stuxnet"},{"key":"20_CR62","doi-asserted-by":"publisher","DOI":"10.1002\/9781118452189","volume-title":"Vehicle safety communications: Protocols, security, and privacy","author":"L Delgrossi","year":"2012","unstructured":"Delgrossi, L., & Zhang, T. (2012). Vehicle safety communications: Protocols, security, and privacy. Hoboken: Wiley."},{"issue":"1","key":"20_CR63","doi-asserted-by":"publisher","first-page":"10","DOI":"10.1109\/JIOT.2014.2302386","volume":"1","author":"T Zhang","year":"2014","unstructured":"Zhang, T., Antunes, H., & Aggarwal, S. (2014). Defending connected vehicles against malware: Challenges and a solution framework. IEEE Internet of Things Journal, 1(1), 10\u201321.","journal-title":"IEEE Internet of Things Journal"},{"key":"20_CR64","doi-asserted-by":"crossref","unstructured":"Zhang, T., Antunes, H., & Aggarwal, S. (2014). Securing connected vehicles end to end. In Proc. SAE World Congr. Exhibit., Detroit, MI, USA, Apr. 2014.","DOI":"10.4271\/2014-01-0300"},{"issue":"6","key":"20_CR65","first-page":"1089","volume":"18","author":"MH Ibrahim","year":"2016","unstructured":"Ibrahim, M. H. (2016). Octopus: An edge-fog mutual authentication scheme. International Journal of Network Security, 18(6), 1089\u20131101.","journal-title":"International Journal of Network Security"},{"key":"20_CR66","doi-asserted-by":"publisher","first-page":"98","DOI":"10.1016\/j.jnca.2016.08.016","volume":"74","author":"S Iqbal","year":"2016","unstructured":"Iqbal, S., Kiah, M. L. M., Dhaghighi, B., Hussain, M., Khan, S., Khan, M. K., & Choo, K.-K. R. (2016). On cloud security attacks: A taxonomy and intrusion detection and prevention as a service. Journal of Network and Computer Applications, 74, 98\u2013120.","journal-title":"Journal of Network and Computer Applications"},{"key":"20_CR67","doi-asserted-by":"publisher","first-page":"169","DOI":"10.1007\/978-1-4614-3296-8_7","volume-title":"High performance cloud auditing and applications","author":"W Luo","year":"2014","unstructured":"Luo, W., Xu, L., Zhan, Z., Zheng, Q., & Xu, S. (2014). Federated cloud security architecture for secure and agile clouds. In K. J. Han, B.-Y. Choi, & S. Song (Eds.), High performance cloud auditing and applications (pp. 169\u2013188). New York: Springer."},{"key":"20_CR68","doi-asserted-by":"publisher","first-page":"237","DOI":"10.1007\/978-3-319-10530-7_10","volume-title":"Cloud computing: Challenges, limitations and R&D solutions","author":"F Lombardi","year":"2014","unstructured":"Lombardi, F., & Di Pietro, R. (2014). Virtualization and cloud security: Benefits, caveats, and future developments. In Cloud computing: Challenges, limitations and R&D solutions (pp. 237\u2013255). Cham: Springer."},{"key":"20_CR69","doi-asserted-by":"crossref","first-page":"1105","DOI":"10.1145\/2660267.2660359","volume-title":"Proceedings of the 2014 ACM SIGSAC conference on computer and communications security (CCS\u201914)","author":"M Zhang","year":"2014","unstructured":"Zhang, M., Duan, Y., Yun, H., & Zhao, Z. (2014). Semantics-aware android malware classification using weighted contextual API dependency graphs. In Proceedings of the 2014 ACM SIGSAC conference on computer and communications security (CCS\u201914) (pp. 1105\u20131116). New York: ACM."},{"key":"20_CR70","doi-asserted-by":"crossref","unstructured":"Simou, S., Kalloniatis, C., Kavakli, E., & Gritzalis, S. Cloud forensics solutions: A review. In L. Iliadis, M. Papazoglou, & K. Pohl (Eds.), Advanced information systems engineering workshops. CAiSE 2014. Lecture notes in business information processing (Vol. 178). Cham: Springer.","DOI":"10.1007\/978-3-319-07869-4_28"},{"issue":"14","key":"20_CR71","first-page":"800","volume":"10","author":"K Kent","year":"2006","unstructured":"Kent, K., Chevalier, S., Grance, T., & Dang, H. (2006). Guide to integrating forensic techniques into incident response. NIST Special Publication, 10(14), 800\u2013886.","journal-title":"NIST Special Publication"},{"key":"20_CR72","first-page":"534","volume-title":"2017 2nd IEEE international conference on recent trends in electronics, information & communication technology (RTEICT)","author":"D Chaudhary","year":"2017","unstructured":"Chaudhary, D., & Bhushan, K. (2017). DDoS attack defense framework for cloud using fog computing. In 2017 2nd IEEE international conference on recent trends in electronics, information & communication technology (RTEICT) (pp. 534\u2013538). Piscataway: IEEE."},{"issue":"4","key":"20_CR73","doi-asserted-by":"publisher","first-page":"4267","DOI":"10.1007\/s11042-017-5522-z","volume":"78","author":"K Bhushan","year":"2017","unstructured":"Bhushan, K., & Gupta, B. B. (2017). Network flow analysis for detection and mitigation of fraudulent resource consumption (FRC) attacks in multimedia cloud computing. Multimedia Tools and Applications, 78(4), 4267\u20134298.","journal-title":"Multimedia Tools and Applications"},{"key":"20_CR74","first-page":"1","volume-title":"2018 9th international conference on computing, communication and networking technologies (ICCCNT)","author":"B Paharia","year":"2018","unstructured":"Paharia, B., & Bhushan, K. (2018). DDoS detection and mitigation in cloud via FogFiter: A defence mechanism. In 2018 9th international conference on computing, communication and networking technologies (ICCCNT) (pp. 1\u20137). Piscataway: IEEE."},{"key":"20_CR75","doi-asserted-by":"publisher","first-page":"872","DOI":"10.1109\/SPIN.2018.8474062","volume-title":"2018 5th international conference on signal processing and integrated networks (SPIN)","author":"K Bhushan","year":"2018","unstructured":"Bhushan, K., & Gupta, B. B. (2018). Detecting DDoS attack using software defined network (SDN) in cloud computing environment. In 2018 5th international conference on signal processing and integrated networks (SPIN) (pp. 872\u2013877). Piscataway: IEEE."},{"key":"20_CR76","doi-asserted-by":"publisher","first-page":"302","DOI":"10.4018\/978-1-5225-8407-0.ch015","volume-title":"Handbook of research on cloud computing and big data applications in IoT","author":"B Paharia","year":"2019","unstructured":"Paharia, B., & Bhushan, K. (2019). Fog computing: concepts, applications, and countermeasures against security attacks. In Handbook of research on cloud computing and big data applications in IoT (pp. 302\u2013329). Hershey: IGI Global."},{"key":"20_CR77","doi-asserted-by":"publisher","first-page":"582","DOI":"10.1016\/j.future.2017.03.030","volume":"81","author":"P Hu","year":"2018","unstructured":"Hu, P., Ning, H., Qiu, T., Xu, Y., Luo, X., & Sangaiah, A. K. (2018). A unified face identification and resolution scheme using cloud computing in internet of things. Future Generation Computing Systems, 81, 582\u2013592.","journal-title":"Future Generation Computing Systems"},{"key":"20_CR78","first-page":"1","volume":"400","author":"K-KR Choo","year":"2016","unstructured":"Choo, K.-K. R. (2016). Cloud computing: Challenges and future directions. Trends and Issues in Crime and Criminal Justice, 400, 1\u20136.","journal-title":"Trends and Issues in Crime and Criminal Justice"},{"issue":"1","key":"20_CR79","doi-asserted-by":"publisher","first-page":"62","DOI":"10.1109\/MSP.2013.161","volume":"12","author":"S Landau","year":"2014","unstructured":"Landau, S. (2014). Highlights from making sense of Snowden, part II: What\u2019s significant in the NSA revelations. IEEE Security and Privacy, 12(1), 62\u201364.","journal-title":"IEEE Security and Privacy"},{"issue":"1","key":"20_CR80","doi-asserted-by":"publisher","first-page":"14","DOI":"10.1109\/MCC.2015.2","volume":"2","author":"NV Juliadotter","year":"2015","unstructured":"Juliadotter, N. V., & Choo, K.-K. R. (2015). Cloud attack and risk assessment taxonomy. IEEE Cloud Computing, 2(1), 14\u201320.","journal-title":"IEEE Cloud Computing"},{"key":"20_CR81","unstructured":"Bureau of Transportation Statistics, U.S. Department of Transportation, Washington, DC, USA [Online]. Retrieved March, 2017, from http:\/\/www.rita.dot.gov\/bts\/sites\/rita.dot.gov.bts\/files\/publications\/national_transportation_statistics\/html\/table_01_26.html_mfd"},{"issue":"2","key":"20_CR82","doi-asserted-by":"publisher","first-page":"32","DOI":"10.1109\/MNET.2015.7064900","volume":"29","author":"M Chen","year":"2015","unstructured":"Chen, M., Zhang, Y., Li, Y., & Mao, S. (2015). EMC: Emotion-aware mobile cloud computing in 5G. IEEE Network, 29(2), 32\u201338.","journal-title":"IEEE Network"},{"key":"20_CR83","first-page":"21","volume-title":"Proceedings of the IEEE international conference on cloud networking","author":"D Amendola","year":"2016","unstructured":"Amendola, D., Cordeschi, N., & Baccarelli, E. (2016). Bandwidth management VMs live migration in wireless fog computing for 5G networks. In Proceedings of the IEEE international conference on cloud networking (pp. 21\u201326). New York: IEEE."},{"issue":"4","key":"20_CR84","doi-asserted-by":"publisher","first-page":"46","DOI":"10.1109\/MNET.2016.7513863","volume":"30","author":"M Peng","year":"2015","unstructured":"Peng, M., Yan, S., Zhang, K., & Wang, C. (2015). Fog-computing-based radio access networks: Issues and challenges. IEEE Network, 30(4), 46\u201353.","journal-title":"IEEE Network"},{"issue":"5","key":"20_CR85","doi-asserted-by":"publisher","first-page":"287","DOI":"10.1109\/TDSC.2013.12","volume":"10","author":"C Papagianni","year":"2013","unstructured":"Papagianni, C., Leivadeas, A., & Papavassiliou, S. (2013). A cloud-oriented content delivery network paradigm: Modeling and assessment. IEEE Transactions on Dependable and Secure Computing, 10(5), 287\u2013300.","journal-title":"IEEE Transactions on Dependable and Secure Computing"},{"key":"20_CR86","doi-asserted-by":"publisher","first-page":"147","DOI":"10.1016\/j.jnca.2016.01.001","volume":"67","author":"O Osanaiye","year":"2016","unstructured":"Osanaiye, O., Choo, K.-K. R., & Dlodlo, M. (2016). Distributed denial of service (DDoS) resilience in cloud: Review and conceptual cloud DDoS mitigation framework. Journal of Network and Computer Applications, 67, 147\u2013165.","journal-title":"Journal of Network and Computer Applications"},{"issue":"3","key":"20_CR87","doi-asserted-by":"publisher","first-page":"61","DOI":"10.4018\/IJESMA.2018070104","volume":"10","author":"D Chaudhary","year":"2018","unstructured":"Chaudhary, D., Bhushan, K., & Gupta, B. B. (2018). Survey on DDoS attacks and defense mechanisms in cloud and fog computing. International Journal of E-Services and Mobile Applications (IJESMA), 10(3), 61\u201383.","journal-title":"International Journal of E-Services and Mobile Applications (IJESMA)"},{"key":"20_CR88","first-page":"308","volume-title":"2017 International conference on smart technologies for smart nation (SmartTechCon)","author":"D Chaudhary","year":"2017","unstructured":"Chaudhary, D., & Bhushan, K. (2017). DDoS attack mitigation and resource provisioning in cloud using fog computing. In 2017 International conference on smart technologies for smart nation (SmartTechCon) (pp. 308\u2013313). Piscataway: IEEE."},{"issue":"4","key":"20_CR89","doi-asserted-by":"publisher","first-page":"4609","DOI":"10.1007\/s11042-017-4742-6","volume":"77","author":"K Bhushan","year":"2018","unstructured":"Bhushan, K., & Gupta, B. B. (2018). A novel approach to defend multimedia flash crowd in cloud environment. Multimedia Tools and Applications, 77(4), 4609\u20134639.","journal-title":"Multimedia Tools and Applications"},{"issue":"2","key":"20_CR90","doi-asserted-by":"publisher","first-page":"69","DOI":"10.1145\/1355734.1355746","volume":"38","author":"N McKeown","year":"2008","unstructured":"McKeown, N., Anderson, T., Balakrishnan, H., Parulkar, G., et al. (2008). OpenFlow: Enabling innovation in campus networks. ACM SIGCOMM CCR, 38(2), 69\u201374.","journal-title":"ACM SIGCOMM CCR"},{"key":"20_CR91","unstructured":"Mininet. An instant virtual network on your laptop (or other PC). Retrieved March, 2017, from mininet.org"},{"key":"20_CR92","volume-title":"Proceedings of 6th international conference ACM Co-NEXT","author":"AGV Sekar","year":"2010","unstructured":"Sekar, A. G. V., Krishnaswamy, R., & Reiter, M. K. (2010). Network-wide deployment of intrusion detection and prevention systems. In Proceedings of 6th international conference ACM Co-NEXT. New York: ACM."},{"key":"20_CR93","doi-asserted-by":"crossref","unstructured":"Klaedtke, F., Karame, G. O., Bifulco, R., & Cui, H. (2015). Towards an access control scheme for accessing flows in SDN. In 2015 1st IEEE Conference on Network Softwarization (NetSoft) (pp. 1\u20136). IEEE.","DOI":"10.1109\/NETSOFT.2015.7116185"},{"key":"20_CR94","volume-title":"Separating authentication, access and accounting: A case study with openWiFi. Technical report","author":"KK Yap","year":"2011","unstructured":"Yap, K. K., et al. (2011). Separating authentication, access and accounting: A case study with openWiFi. Technical report. Menlo Park: Open Networking Foundation."}],"container-title":["Handbook of Computer Networks and Cyber Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-22277-2_20","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,9,24]],"date-time":"2023-09-24T14:18:38Z","timestamp":1695565118000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-22277-2_20"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9783030222765","9783030222772"],"references-count":94,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-22277-2_20","relation":{},"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"1 January 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}