Samani et al., 2016 - Google Patents
Intrusion detection system for DoS attack in cloudSamani et al., 2016
View PDF- Document ID
- 2798688951053822448
- Author
- Samani M
- Karamta M
- Bhatia J
- Potdar M
- Publication year
- Publication venue
- International Journal of Applied Information Systems
External Links
Snippet
Open and distributed nature of cloud, vulnerability of internet, different limitations of cloud service models are some of key features for the attraction of various attackers. One of the security concern for cloud is denial of service attack. Due to effect of this attack, legitimate …
- 238000001514 detection method 0 title abstract description 38
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1458—Denial of Service
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1416—Event detection, e.g. attack signature detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/145—Countermeasures against malicious traffic the attack involving the propagation of malware through the network, e.g. viruses, trojans or worms
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Azeez et al. | Intrusion detection and prevention systems: an updated review | |
Modi et al. | A survey of intrusion detection techniques in cloud | |
Mehmood et al. | Intrusion detection system in cloud computing: Challenges and opportunities | |
Kene et al. | A review on intrusion detection techniques for cloud computing and security challenges | |
Anwar et al. | Response option for attacks detected by intrusion detection system | |
Sayyed et al. | Intrusion Detection System | |
Samani et al. | Intrusion detection system for DoS attack in cloud | |
Nasrullayev et al. | Providing IoT security in Industry 4.0 using web application firewall | |
Rani et al. | Classification of security issues and cyber attacks in layered Internet of Things | |
Araújo et al. | EICIDS-elastic and internal cloud-based detection system | |
Thangavel et al. | Denial of service (DoS) attacks over cloud environment: A literature survey | |
Jaber et al. | The importance of ids and ips in cloud computing environment: Intensive review and future directions | |
Durairaj et al. | A study on securing cloud environment from DDoS attack to preserve data availability | |
Habibi Gharakheili et al. | Cyber‐Securing IoT Infrastructure by Modeling Network Traffic | |
Singh et al. | A review on intrusion detection system | |
Chellappan et al. | Layered defense approach: towards total network security | |
Poonia et al. | Performance evaluation of network based intrusion detection techniques with Raspberry Pi—a comparative analysis | |
De La Peña Montero et al. | Autonomic and integrated management for proactive cyber security (AIM-PSC) | |
Sarkunavathi et al. | A Detailed Study on Advanced Persistent Threats: A Sophisticated Threat | |
Pir | Intrusion detection techniques and open source intrusion detection (IDS) tools | |
Karamagi | Comptia Security+ Practice Exams | |
Lasya et al. | Data Exfiltration Detection | |
Omar et al. | Home-Based Intrusion Detection System | |
Shah et al. | Attack Monitoring and Protection in Cloud Computing Environment through IDS | |
Bhakthavatsalam et al. | Analysis of network infrastructure threats using SonicWall analyser |