Nothing Special   »   [go: up one dir, main page]

Devi et al., 2019 - Google Patents

Cloud-based DDoS attack detection and defence system using statistical approach

Devi et al., 2019

Document ID
15755773741089252876
Author
Devi B
Subbulakshmi T
Publication year
Publication venue
International Journal of Information and Computer Security

External Links

Snippet

In the recent era, business and IT domain rely on the cloud as it has evolved as the potential service model and lots of people jumped on the bandwagon to seek profit out of the cloud computing environment. The cloud is highly vulnerable and its risk associated with …
Continue reading at www.inderscienceonline.com (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1458Denial of Service
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1425Traffic logging, e.g. anomaly detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1416Event detection, e.g. attack signature detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/145Countermeasures against malicious traffic the attack involving the propagation of malware through the network, e.g. viruses, trojans or worms
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/552Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1491Countermeasures against malicious traffic using deception as countermeasure, e.g. honeypots, honeynets, decoys or entrapment
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1483Countermeasures against malicious traffic service impersonation, e.g. phishing, pharming or web spoofing

Similar Documents

Publication Publication Date Title
Birkinshaw et al. Implementing an intrusion detection and prevention system using software-defined networking: Defending against port-scanning and denial-of-service attacks
US11924170B2 (en) Methods and systems for API deception environment and API traffic control and security
Gupta et al. Taxonomy of DoS and DDoS attacks and desirable defense mechanism in a cloud computing environment
Masdari et al. A survey and taxonomy of DoS attacks in cloud computing
Zargar et al. A survey of defense mechanisms against distributed denial of service (DDoS) flooding attacks
Thakur Analysis of denial of services (DOS) attacks and prevention techniques
Rajkumar A survey on latest DoS attacks: classification and defense mechanisms
Fakeeh An overview of DDoS attacks detection and prevention in the cloud
Aamir et al. Ddos attack and defense: Review of some traditional and current techniques
Nayak et al. Depth analysis on DoS & DDoS attacks
Amiri et al. Theoretical and experimental methods for defending against DDoS attacks
Febro et al. Edge security for sip-enabled iot devices with p4
Sattar et al. A delay-based countermeasure against the discovery of default rules in firewalls
Devi et al. Cloud-based DDoS attack detection and defence system using statistical approach
Khosravifar et al. An experience improving intrusion detection systems false alarm ratio by using honeypot
Khadke et al. Review on mitigation of distributed denial of service (DDoS) attacks in cloud computing
Sahu et al. DDoS attacks & mitigation techniques in cloud computing environments
Bawa et al. Critical review of economical denial of sustainability (EDoS) mitigation techniques
Ghorbani et al. Network attacks
Praptodiyono et al. Development of hybrid intrusion detection system based on Suricata with pfSense method for high reduction of DDoS attacks on IPv6 networks.
EP3595257B1 (en) Detecting suspicious sources, e.g. for configuring a distributed denial of service mitigation device
Singh et al. Performance analysis of emm an edos mitigation technique in cloud computing environment
Bojjagani et al. Early DDoS Detection and Prevention with Traced-Back Blocking in SDN Environment.
Pahal et al. Distributed Denial of Services attacks on cloud servers: Detection, Analysis, and Mitigation.
Rivas et al. Evaluation of CentOS performance under IoT based DDoS Security Attacks