{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,3]],"date-time":"2026-03-03T16:25:13Z","timestamp":1772555113156,"version":"3.50.1"},"reference-count":47,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2020,7,22]],"date-time":"2020-07-22T00:00:00Z","timestamp":1595376000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,7,22]],"date-time":"2020-07-22T00:00:00Z","timestamp":1595376000000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Wireless Pers Commun"],"published-print":{"date-parts":[[2020,11]]},"DOI":"10.1007\/s11277-020-07630-6","type":"journal-article","created":{"date-parts":[[2020,7,22]],"date-time":"2020-07-22T11:04:12Z","timestamp":1595415852000},"page":"1335-1361","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":10,"title":["AVDR: A Framework for Migration Policy to Handle DDoS Attacked VM in Cloud"],"prefix":"10.1007","volume":"115","author":[{"given":"Priyanka","family":"Verma","sequence":"first","affiliation":[]},{"given":"Shashikala","family":"Tapaswi","sequence":"additional","affiliation":[]},{"given":"W. Wilfred","family":"Godfrey","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,7,22]]},"reference":[{"key":"7630_CR1","doi-asserted-by":"crossref","first-page":"30","DOI":"10.1016\/j.comcom.2017.03.010","volume":"107","author":"G Somani","year":"2017","unstructured":"Somani, G., Gaur, M. S., Sanghi, D., Conti, M., & Buyya, R. (2017). DDoS attacks in cloud computing: Issues, taxonomy, and future directions. Computer Communications, 107, 30\u201348.","journal-title":"Computer Communications"},{"key":"7630_CR2","unstructured":"Labs, K. (2014). Distributed denial of service (DDOS) attacks, 2014, Global it security risks survey.http:\/\/media.kaspersky.com\/en\/ B2B- International- 2014- Survey- DDoS- Summary- Report.pdf ."},{"key":"7630_CR3","unstructured":"Burt, C. (2014). Large volume DDoS attacks see exceptional growth in first half of 2014: arbor networks."},{"key":"7630_CR4","unstructured":"Nelson, P. (2015). Cybercriminals moving into cloud big time, report says. https:\/\/www.networkworld.com\/article\/2900125\/criminals-moving-into-cloud-big-time-says-report.html."},{"key":"7630_CR5","doi-asserted-by":"crossref","unstructured":"Somani, G., Gaur, M. S., & Sanghi, D. (2015). DDoS\/EDoS attack in cloud: affecting everyone out there!. In Proceedings of the 8th international conference on security of information and networks (pp. 169-176). ACM.","DOI":"10.1145\/2799979.2800005"},{"key":"7630_CR6","doi-asserted-by":"crossref","unstructured":"Alosaimi, W., & Al-Begain, K. (2013). An enhanced economical denial of sustainability mitigation system for the cloud. In Seventh international conference on next generation mobile apps, services and technologies (pp. 19-25). IEEE.","DOI":"10.1109\/NGMAST.2013.13"},{"key":"7630_CR7","unstructured":"Alosaimi, W., & Al-Begain, K. (2013). A new method to mitigate the impacts of the economical denial of sustainability attacks against the cloud. In Proceedings of the 14th annual post graduates symposium on the convergence of telecommunication, networking and broadcasting (PGNet) (pp. 116-121)."},{"issue":"5","key":"7630_CR8","doi-asserted-by":"crossref","first-page":"1620","DOI":"10.1007\/s11227-014-1242-6","volume":"71","author":"F Palmieri","year":"2015","unstructured":"Palmieri, F., Ricciardi, S., Fiore, U., Ficco, M., & Castiglione, A. (2015). Energy-oriented denial of service attacks: An emerging menace for large cloud infrastructures. The Journal of Supercomputing, 71(5), 1620\u20131641.","journal-title":"The Journal of Supercomputing"},{"issue":"1","key":"7630_CR9","doi-asserted-by":"crossref","first-page":"80","DOI":"10.1109\/TCC.2014.2325045","volume":"3","author":"M Ficco","year":"2015","unstructured":"Ficco, M., & Rak, M. (2015). Stealthy denial of service strategy in cloud computing. IEEE Transactions on Cloud Computing, 3(1), 80\u201394.","journal-title":"IEEE Transactions on Cloud Computing"},{"key":"7630_CR10","doi-asserted-by":"crossref","unstructured":"Idziorek, J., Tannian, M., & Jacobson, D. (2012). Attribution of fraudulent resource consumption in the cloud. In 2012 IEEE fifth international conference on cloud computing (pp. 99\u2013106). IEEE.","DOI":"10.1109\/CLOUD.2012.23"},{"key":"7630_CR11","doi-asserted-by":"crossref","first-page":"1487","DOI":"10.1007\/s11277-018-5288-2","volume":"99","author":"AS Shukla","year":"2018","unstructured":"Shukla, A. S., & Maurya, R. (2018). Entropy-based anomaly detection in a network. Wireless Personal Communications, 99, 1487\u20131501.","journal-title":"Wireless Personal Communications"},{"key":"7630_CR12","doi-asserted-by":"crossref","unstructured":"Prasad, K. M., Reddy, A. R. M., & Rao, K. V. (2018). Ensemble classifiers with drift detection (ECDD) in traffic flow streams to detect DDOS attacks. Wireless Personal Communications, 1\u201321.","DOI":"10.1007\/s11277-018-5610-z"},{"issue":"1","key":"7630_CR13","doi-asserted-by":"crossref","first-page":"26","DOI":"10.1109\/TNET.2008.926503","volume":"17","author":"S Ranjan","year":"2009","unstructured":"Ranjan, S., Swaminathan, R., Uysal, M., Nucci, A., & Knightly, E. (2009). DDoS-shield: DDoS-resilient scheduling to counter application layer attacks. IEEE\/ACM Transactions on networking, 17(1), 26\u201339.","journal-title":"IEEE\/ACM Transactions on networking"},{"key":"7630_CR14","doi-asserted-by":"crossref","unstructured":"Sqalli, M. H., Al-Haidari, F., & Salah, K. (2011). Edos-shield-a two-steps mitigation technique against edos attacks in cloud computing. In 2011 Fourth IEEE international conference on utility and cloud computing (pp. 49-56). IEEE.","DOI":"10.1109\/UCC.2011.17"},{"key":"7630_CR15","doi-asserted-by":"crossref","unstructured":"Guenane, F., Nogueira, M., & Pujolle, G. (2014). Reducing DDoS attacks impact using a hybrid cloud-based firewalling architecture. In 2014 global information infrastructure and networking symposium (GIIS) (pp. 1-6). IEEE.","DOI":"10.1109\/GIIS.2014.6934276"},{"issue":"4","key":"7630_CR16","doi-asserted-by":"crossref","first-page":"3205","DOI":"10.1007\/s11277-018-5346-9","volume":"102","author":"R Rajamohamed","year":"2018","unstructured":"Rajamohamed, R., Jose, T. J., Sumithra, S., & Vijaya, J. (2018). Multi model mitigation approach for network threats on cluster based linear chain routing protocol in wireless sensor networks at qos development. Wireless Personal Communications, 102(4), 3205\u20133224.","journal-title":"Wireless Personal Communications"},{"key":"7630_CR17","unstructured":"Latanicki, J., Massonet, P., Naqvi, S., Rochwerger, B., & Villari, M. (2010). Scalable cloud defenses for detection, analysis and mitigation of DDoS attacks. In Future internet assembly (pp. 127-137)."},{"key":"7630_CR18","doi-asserted-by":"crossref","unstructured":"Al-Haidari, F., Sqalli, M. H., & Salah, K. (2012). Enhanced EDoS-shield for mitigating EDoS attacks originating from spoofed IP addresses. In 2012 IEEE 11th international conference on trust, security and privacy in computing and communications (pp. 1167-1174). IEEE.","DOI":"10.1109\/TrustCom.2012.146"},{"key":"7630_CR19","doi-asserted-by":"crossref","unstructured":"Huang, V. S. M., Huang, R., & Chiang, M. (2013). A DDoS mitigation system with multi-stage detection and text-based turing testing in cloud computing. In 2013 27th international conference on advanced information networking and applications workshops (pp. 655-662). IEEE.","DOI":"10.1109\/WAINA.2013.94"},{"key":"7630_CR20","doi-asserted-by":"crossref","unstructured":"Karnwal, T., Sivakumar, T., & Aghila, G. (2012). A comber approach to protect cloud computing against XML DDoS and HTTP DDoS attack. In 2012 IEEE students\u2019 conference on electrical, electronics and computer science (pp. 1-5). IEEE.","DOI":"10.1109\/SCEECS.2012.6184829"},{"key":"7630_CR21","unstructured":"Kumar, M. N., Sujatha, P., Kalva, V., Nagori, R., Katukojwala, A. K., & Kumar, M. (2012). Mitigating economic denial of sustainability (edos) in cloud computing using in-cloud scrubber service. In 2012 Fourth international conference on computational intelligence and communication networks (pp. 535-539). IEEE."},{"key":"7630_CR22","doi-asserted-by":"crossref","unstructured":"Idziorek, J., Tannian, M., & Jacobson, D. (2011). Detecting fraudulent use of cloud resources. In Proceedings of the 3rd ACM workshop on cloud computing security workshop (pp. 61-72). ACM.","DOI":"10.1145\/2046660.2046676"},{"issue":"4","key":"7630_CR23","doi-asserted-by":"crossref","first-page":"2879","DOI":"10.1007\/s11277-016-3753-3","volume":"94","author":"S Gupta","year":"2017","unstructured":"Gupta, S., & Kumar, P. (2017). Profile and back off based distributed NIDS in cloud. Wireless Personal Communications, 94(4), 2879\u20132900.","journal-title":"Wireless Personal Communications"},{"issue":"2","key":"7630_CR24","doi-asserted-by":"crossref","first-page":"39","DOI":"10.1145\/997150.997156","volume":"34","author":"J Mirkovic","year":"2004","unstructured":"Mirkovic, J., & Reiher, P. (2004). A taxonomy of DDoS attack and DDoS defense mechanisms. ACM SIGCOMM Computer Communication Review, 34(2), 39\u201353.","journal-title":"ACM SIGCOMM Computer Communication Review"},{"key":"7630_CR25","doi-asserted-by":"crossref","first-page":"157","DOI":"10.1016\/j.comnet.2016.03.022","volume":"109","author":"G Somani","year":"2016","unstructured":"Somani, G., Gaur, M. S., Sanghi, D., & Conti, M. (2016). DDoS attacks in cloud computing: Collateral damage to non-targets. Computer Networks, 109, 157\u2013171.","journal-title":"Computer Networks"},{"issue":"1","key":"7630_CR26","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1145\/1216370.1216373","volume":"39","author":"T Peng","year":"2007","unstructured":"Peng, T., Leckie, C., & Ramamohanarao, K. (2007). Survey of network-based defense mechanisms countering the DoS and DDoS problems. ACM Computing Surveys (CSUR), 39(1), 3.","journal-title":"ACM Computing Surveys (CSUR)"},{"issue":"5","key":"7630_CR27","doi-asserted-by":"crossref","first-page":"643","DOI":"10.1016\/j.comnet.2003.10.003","volume":"44","author":"C Douligeris","year":"2004","unstructured":"Douligeris, C., & Mitrokotsa, A. (2004). DDoS attacks and defense mechanisms: classification and state-of-the-art. Computer Networks, 44(5), 643\u2013666.","journal-title":"Computer Networks"},{"key":"7630_CR28","doi-asserted-by":"crossref","unstructured":"Palmieri, F., Ricciardi, S., & Fiore, U. (2011). Evaluating network-based DoS attacks under the energy consumption perspective: new security issues in the coming green ICT area. In 2011 international conference on broadband and wireless computing, communication and applications (pp. 374-379). IEEE.","DOI":"10.1109\/BWCCA.2011.66"},{"key":"7630_CR29","doi-asserted-by":"crossref","unstructured":"Shea, R., & Liu, J. (2012). Understanding the impact of denial of service attacks on virtual machines. In Proceedings of the 2012 IEEE 20th international workshop on quality of service (p. 27). IEEE Press.","DOI":"10.1109\/IWQoS.2012.6245975"},{"key":"7630_CR30","doi-asserted-by":"crossref","unstructured":"Zhao, S., Chen, K., & Zheng, W. (2009). Defend against denial of service attack with VMM. In 2009 eighth international conference on grid and cooperative computing (pp. 91-96). IEEE.","DOI":"10.1109\/GCC.2009.14"},{"key":"7630_CR31","doi-asserted-by":"crossref","first-page":"10","DOI":"10.1016\/j.comcom.2014.03.009","volume":"46","author":"H Wang","year":"2014","unstructured":"Wang, H., Jia, Q., Fleck, D., Powell, W., Li, F., & Stavrou, A. (2014). A moving target DDoS defense mechanism. Computer Communications, 46, 10\u201321.","journal-title":"Computer Communications"},{"key":"7630_CR32","doi-asserted-by":"crossref","unstructured":"Alqahtani, S., and Gamble, R. F. (2015). DDoS attacks in service clouds. In 48th Hawaii international conference on system sciences (HICSS). (pp. 5331-5340). IEEE.","DOI":"10.1109\/HICSS.2015.627"},{"issue":"5\u20136","key":"7630_CR33","doi-asserted-by":"crossref","first-page":"237","DOI":"10.1007\/s12243-016-0552-5","volume":"72","author":"G Somani","year":"2017","unstructured":"Somani, G., Gaur, M. S., Sanghi, D., Conti, M., & Buyya, R. (2017). Service resizing for quick DDoS mitigation in cloud computing environment. Annals of Telecommunications, 72(5\u20136), 237\u2013252.","journal-title":"Annals of Telecommunications"},{"key":"7630_CR34","doi-asserted-by":"crossref","first-page":"165","DOI":"10.1016\/j.compeleceng.2016.12.004","volume":"59","author":"G Somani","year":"2017","unstructured":"Somani, G., Gaur, M. S., Sanghi, D., Conti, M., & Rajarajan, M. (2017). DDoS victim service containment to minimize the internal collateral damages in cloud computing. Computers & Electrical Engineering, 59, 165\u2013179.","journal-title":"Computers & Electrical Engineering"},{"issue":"6","key":"7630_CR35","doi-asserted-by":"crossref","first-page":"959","DOI":"10.1109\/TDSC.2017.2763160","volume":"15","author":"G Somani","year":"2018","unstructured":"Somani, G., Gaur, M. S., Sanghi, D., Conti, M., & Rajarajan, M. (2018). Scale inside-out: Rapid mitigation of cloud ddos attacks. IEEE Transactions on Dependable and Secure Computing, 15(6), 959\u2013973.","journal-title":"IEEE Transactions on Dependable and Secure Computing"},{"key":"7630_CR36","unstructured":"http:\/\/www.systeen.com\/2016\/05\/07\/bash-script-monitor-cpu-memory-disk-usage-linux\/."},{"key":"7630_CR37","unstructured":"http:\/\/collectl.sourceforge.net\/."},{"key":"7630_CR38","unstructured":"Lindley D.V. (1990). Regression and correlation analysis. In Eatwell J., Milgate M., Newman P. (eds.), The New Palgrave. London: Palgrave Macmillan.https:\/\/doi.org\/10.1007\/978-1-349-20865-4-30."},{"key":"7630_CR39","doi-asserted-by":"crossref","DOI":"10.1017\/CBO9780511815867","volume-title":"Statistical models: theory and practice","author":"DA Freedman","year":"2009","unstructured":"Freedman, D. A. (2009). Statistical models: theory and practice. Cambridge: Cambridge University Press."},{"key":"7630_CR40","unstructured":"Lewicki, P., & Hill, T. (2006). Statistics: methods and applications. Tulsa, OK: Statsoft."},{"key":"7630_CR41","doi-asserted-by":"crossref","unstructured":"Foster, D. P., & George, E. I. (1994). The risk inflation criterion for multiple regression. The Annals of Statistics, 1947\u20131975.","DOI":"10.1214\/aos\/1176325766"},{"issue":"1","key":"7630_CR42","doi-asserted-by":"crossref","first-page":"281","DOI":"10.1007\/s11277-017-4505-8","volume":"97","author":"KM Prasad","year":"2017","unstructured":"Prasad, K. M., Reddy, A. R. M., & Rao, K. V. (2017). BIFAD: Bio-inspired anomaly based HTTP-flood attack detection. Wireless Personal Communications, 97(1), 281\u2013308.","journal-title":"Wireless Personal Communications"},{"key":"7630_CR43","unstructured":"Yang, X. S., & Deb, S. (2010). Engineering optimisation by cuckoo search. arXiv preprint arXiv:1005.2908."},{"key":"7630_CR44","doi-asserted-by":"crossref","first-page":"1041","DOI":"10.1016\/j.asoc.2017.02.034","volume":"61","author":"M Shehab","year":"2017","unstructured":"Shehab, M., Khader, A. T., & Al-Betar, M. A. (2017). A survey on applications and variants of the cuckoo search algorithm. Applied Soft Computing, 61, 1041\u20131059.","journal-title":"Applied Soft Computing"},{"issue":"5","key":"7630_CR45","doi-asserted-by":"crossref","first-page":"755","DOI":"10.1016\/j.future.2011.04.017","volume":"28","author":"A Beloglazov","year":"2012","unstructured":"Beloglazov, A., Abawajy, J., & Buyya, R. (2012). Energy-aware resource allocation heuristics for efficient management of data centers for cloud computing. Future Generation Computer Systems, 28(5), 755\u2013768.","journal-title":"Future Generation Computer Systems"},{"issue":"13","key":"7630_CR46","doi-asserted-by":"crossref","first-page":"1397","DOI":"10.1002\/cpe.1867","volume":"24","author":"A Beloglazov","year":"2012","unstructured":"Beloglazov, A., & Buyya, R. (2012). Optimal online deterministic algorithms and adaptive heuristics for energy and performance efficient dynamic consolidation of virtual machines in cloud data centers. Concurrency and Computation: Practice and Experience, 24(13), 1397\u20131420.","journal-title":"Concurrency and Computation: Practice and Experience"},{"key":"7630_CR47","unstructured":"Beloglazov, A. (2013). Energy-efficient management of virtual machines in data centers for cloud computing."}],"container-title":["Wireless Personal Communications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-020-07630-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11277-020-07630-6\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-020-07630-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,3,26]],"date-time":"2021-03-26T12:12:17Z","timestamp":1616760737000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11277-020-07630-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,7,22]]},"references-count":47,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2020,11]]}},"alternative-id":["7630"],"URL":"https:\/\/doi.org\/10.1007\/s11277-020-07630-6","relation":{},"ISSN":["0929-6212","1572-834X"],"issn-type":[{"value":"0929-6212","type":"print"},{"value":"1572-834X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,7,22]]},"assertion":[{"value":"22 July 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}