Devi et al., 2019 - Google Patents
Cloud-based DDoS attack detection and defence system using statistical approachDevi et al., 2019
- Document ID
- 15755773741089252876
- Author
- Devi B
- Subbulakshmi T
- Publication year
- Publication venue
- International Journal of Information and Computer Security
External Links
Snippet
In the recent era, business and IT domain rely on the cloud as it has evolved as the potential service model and lots of people jumped on the bandwagon to seek profit out of the cloud computing environment. The cloud is highly vulnerable and its risk associated with …
- 238000001514 detection method 0 title description 45
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1458—Denial of Service
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1416—Event detection, e.g. attack signature detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/145—Countermeasures against malicious traffic the attack involving the propagation of malware through the network, e.g. viruses, trojans or worms
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/552—Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1491—Countermeasures against malicious traffic using deception as countermeasure, e.g. honeypots, honeynets, decoys or entrapment
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1483—Countermeasures against malicious traffic service impersonation, e.g. phishing, pharming or web spoofing
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Birkinshaw et al. | Implementing an intrusion detection and prevention system using software-defined networking: Defending against port-scanning and denial-of-service attacks | |
US11924170B2 (en) | Methods and systems for API deception environment and API traffic control and security | |
Gupta et al. | Taxonomy of DoS and DDoS attacks and desirable defense mechanism in a cloud computing environment | |
Masdari et al. | A survey and taxonomy of DoS attacks in cloud computing | |
Zargar et al. | A survey of defense mechanisms against distributed denial of service (DDoS) flooding attacks | |
Thakur | Analysis of denial of services (DOS) attacks and prevention techniques | |
Rajkumar | A survey on latest DoS attacks: classification and defense mechanisms | |
Fakeeh | An overview of DDoS attacks detection and prevention in the cloud | |
Aamir et al. | Ddos attack and defense: Review of some traditional and current techniques | |
Nayak et al. | Depth analysis on DoS & DDoS attacks | |
Amiri et al. | Theoretical and experimental methods for defending against DDoS attacks | |
Febro et al. | Edge security for sip-enabled iot devices with p4 | |
Sattar et al. | A delay-based countermeasure against the discovery of default rules in firewalls | |
Devi et al. | Cloud-based DDoS attack detection and defence system using statistical approach | |
Khosravifar et al. | An experience improving intrusion detection systems false alarm ratio by using honeypot | |
Khadke et al. | Review on mitigation of distributed denial of service (DDoS) attacks in cloud computing | |
Sahu et al. | DDoS attacks & mitigation techniques in cloud computing environments | |
Bawa et al. | Critical review of economical denial of sustainability (EDoS) mitigation techniques | |
Ghorbani et al. | Network attacks | |
Praptodiyono et al. | Development of hybrid intrusion detection system based on Suricata with pfSense method for high reduction of DDoS attacks on IPv6 networks. | |
EP3595257B1 (en) | Detecting suspicious sources, e.g. for configuring a distributed denial of service mitigation device | |
Singh et al. | Performance analysis of emm an edos mitigation technique in cloud computing environment | |
Bojjagani et al. | Early DDoS Detection and Prevention with Traced-Back Blocking in SDN Environment. | |
Pahal et al. | Distributed Denial of Services attacks on cloud servers: Detection, Analysis, and Mitigation. | |
Rivas et al. | Evaluation of CentOS performance under IoT based DDoS Security Attacks |