[go: up one dir, main page]

Leelavathy et al., 2021 - Google Patents

A Secure Methodology to Detect and Prevent Ddos and Sql Injection Attacks

Leelavathy et al., 2021

Document ID
11544975519800721310
Author
Leelavathy S
Jaichandran R
Shobana R
Bhaskaran S
et al.
Publication year
Publication venue
Turkish Journal of Computer and Mathematics Education

External Links

Snippet

As most of the applications host on cloud, Security is a major concern for the data owners. The cloud environment has to be secure and protect data owner data from cloud attacks. In this project work, we study about securing firewall against client side attacks namely Denial …
Continue reading at search.proquest.com (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1458Denial of Service
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
    • G06F21/562Static detection
    • G06F21/563Static detection by source code analysis
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/145Countermeasures against malicious traffic the attack involving the propagation of malware through the network, e.g. viruses, trojans or worms
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • H04L63/0209Architectural arrangements, e.g. perimeter networks or demilitarized zones
    • H04L63/0218Distributed architectures, e.g. distributed firewalls

Similar Documents

Publication Publication Date Title
Biju et al. Cyber attacks and its different types
US7539857B2 (en) Cooperative processing and escalation in a multi-node application-layer security system and method
Bhosale et al. The distributed denial of service attacks (DDoS) prevention mechanisms on application layer
Gillman et al. Protecting websites from attack with secure delivery networks
US20100199345A1 (en) Method and System for Providing Remote Protection of Web Servers
Mell et al. A denial-of-service resistant intrusion detection architecture
Latha et al. A survey on network attacks and Intrusion detection systems
Nasser et al. Provably curb man-in-the-middle attack-based ARP spoofing in a local network
Fakeeh An overview of DDoS attacks detection and prevention in the cloud
KR100973076B1 (en) System for depending against distributed denial of service attack and method therefor
Ahmed et al. A Linux-based IDPS using Snort
Nagesh et al. A survey on denial of service attacks and preclusions
Leelavathy et al. A Secure Methodology to Detect and Prevent Ddos and Sql Injection Attacks
JP2006501527A (en) Method, data carrier, computer system, and computer program for identifying and defending attacks against server systems of network service providers and operators
Sichkar et al. A short survey of the capabilities of Next Generation firewalls
Durairaj et al. A study on securing cloud environment from DDoS attack to preserve data availability
Veena et al. Implementing file and real time based intrusion detections in secure direct method using advanced honeypot
Das et al. Security considerations of SDN networks during DDoS attacks in load balancing
Pahal et al. Distributed Denial of Services attacks on cloud servers: Detection, Analysis, and Mitigation
Tuteja et al. Optimization of snort for extrusion and intrusion detection and prevention
EP3595257B1 (en) Detecting suspicious sources, e.g. for configuring a distributed denial of service mitigation device
Kfouri et al. Design of a Distributed HIDS for IoT Backbone Components.
Afzaal An overview of defense techniques against dos attacks
US12464004B1 (en) Method and system for identifying attack infrastructure
CN119892446B (en) Traffic analysis method, device, storage medium and program product