Leelavathy et al., 2021 - Google Patents
A Secure Methodology to Detect and Prevent Ddos and Sql Injection AttacksLeelavathy et al., 2021
- Document ID
- 11544975519800721310
- Author
- Leelavathy S
- Jaichandran R
- Shobana R
- Bhaskaran S
- et al.
- Publication year
- Publication venue
- Turkish Journal of Computer and Mathematics Education
External Links
Snippet
As most of the applications host on cloud, Security is a major concern for the data owners. The cloud environment has to be secure and protect data owner data from cloud attacks. In this project work, we study about securing firewall against client side attacks namely Denial …
- 239000007924 injection 0 title abstract description 39
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1458—Denial of Service
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/56—Computer malware detection or handling, e.g. anti-virus arrangements
- G06F21/562—Static detection
- G06F21/563—Static detection by source code analysis
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/145—Countermeasures against malicious traffic the attack involving the propagation of malware through the network, e.g. viruses, trojans or worms
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
- H04L63/0209—Architectural arrangements, e.g. perimeter networks or demilitarized zones
- H04L63/0218—Distributed architectures, e.g. distributed firewalls
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Biju et al. | Cyber attacks and its different types | |
| US7539857B2 (en) | Cooperative processing and escalation in a multi-node application-layer security system and method | |
| Bhosale et al. | The distributed denial of service attacks (DDoS) prevention mechanisms on application layer | |
| Gillman et al. | Protecting websites from attack with secure delivery networks | |
| US20100199345A1 (en) | Method and System for Providing Remote Protection of Web Servers | |
| Mell et al. | A denial-of-service resistant intrusion detection architecture | |
| Latha et al. | A survey on network attacks and Intrusion detection systems | |
| Nasser et al. | Provably curb man-in-the-middle attack-based ARP spoofing in a local network | |
| Fakeeh | An overview of DDoS attacks detection and prevention in the cloud | |
| KR100973076B1 (en) | System for depending against distributed denial of service attack and method therefor | |
| Ahmed et al. | A Linux-based IDPS using Snort | |
| Nagesh et al. | A survey on denial of service attacks and preclusions | |
| Leelavathy et al. | A Secure Methodology to Detect and Prevent Ddos and Sql Injection Attacks | |
| JP2006501527A (en) | Method, data carrier, computer system, and computer program for identifying and defending attacks against server systems of network service providers and operators | |
| Sichkar et al. | A short survey of the capabilities of Next Generation firewalls | |
| Durairaj et al. | A study on securing cloud environment from DDoS attack to preserve data availability | |
| Veena et al. | Implementing file and real time based intrusion detections in secure direct method using advanced honeypot | |
| Das et al. | Security considerations of SDN networks during DDoS attacks in load balancing | |
| Pahal et al. | Distributed Denial of Services attacks on cloud servers: Detection, Analysis, and Mitigation | |
| Tuteja et al. | Optimization of snort for extrusion and intrusion detection and prevention | |
| EP3595257B1 (en) | Detecting suspicious sources, e.g. for configuring a distributed denial of service mitigation device | |
| Kfouri et al. | Design of a Distributed HIDS for IoT Backbone Components. | |
| Afzaal | An overview of defense techniques against dos attacks | |
| US12464004B1 (en) | Method and system for identifying attack infrastructure | |
| CN119892446B (en) | Traffic analysis method, device, storage medium and program product |