Nothing Special   »   [go: up one dir, main page]

Samani et al., 2016 - Google Patents

Intrusion detection system for DoS attack in cloud

Samani et al., 2016

View PDF
Document ID
2798688951053822448
Author
Samani M
Karamta M
Bhatia J
Potdar M
Publication year
Publication venue
International Journal of Applied Information Systems

External Links

Snippet

Open and distributed nature of cloud, vulnerability of internet, different limitations of cloud service models are some of key features for the attraction of various attackers. One of the security concern for cloud is denial of service attack. Due to effect of this attack, legitimate …
Continue reading at www.ijais.org (PDF) (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1458Denial of Service
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1416Event detection, e.g. attack signature detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1425Traffic logging, e.g. anomaly detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/145Countermeasures against malicious traffic the attack involving the propagation of malware through the network, e.g. viruses, trojans or worms

Similar Documents

Publication Publication Date Title
Azeez et al. Intrusion detection and prevention systems: an updated review
Modi et al. A survey of intrusion detection techniques in cloud
Mehmood et al. Intrusion detection system in cloud computing: Challenges and opportunities
Kene et al. A review on intrusion detection techniques for cloud computing and security challenges
Anwar et al. Response option for attacks detected by intrusion detection system
Sayyed et al. Intrusion Detection System
Samani et al. Intrusion detection system for DoS attack in cloud
Nasrullayev et al. Providing IoT security in Industry 4.0 using web application firewall
Rani et al. Classification of security issues and cyber attacks in layered Internet of Things
Araújo et al. EICIDS-elastic and internal cloud-based detection system
Thangavel et al. Denial of service (DoS) attacks over cloud environment: A literature survey
Jaber et al. The importance of ids and ips in cloud computing environment: Intensive review and future directions
Durairaj et al. A study on securing cloud environment from DDoS attack to preserve data availability
Habibi Gharakheili et al. Cyber‐Securing IoT Infrastructure by Modeling Network Traffic
Singh et al. A review on intrusion detection system
Chellappan et al. Layered defense approach: towards total network security
Poonia et al. Performance evaluation of network based intrusion detection techniques with Raspberry Pi—a comparative analysis
De La Peña Montero et al. Autonomic and integrated management for proactive cyber security (AIM-PSC)
Sarkunavathi et al. A Detailed Study on Advanced Persistent Threats: A Sophisticated Threat
Pir Intrusion detection techniques and open source intrusion detection (IDS) tools
Karamagi Comptia Security+ Practice Exams
Lasya et al. Data Exfiltration Detection
Omar et al. Home-Based Intrusion Detection System
Shah et al. Attack Monitoring and Protection in Cloud Computing Environment through IDS
Bhakthavatsalam et al. Analysis of network infrastructure threats using SonicWall analyser