Durairaj et al., 2015 - Google Patents
A study on securing cloud environment from DDoS attack to preserve data availabilityDurairaj et al., 2015
- Document ID
- 3665672973186465725
- Author
- Durairaj M
- Manimaran A
- Publication year
- Publication venue
- the international journal of science and technoledge
External Links
Snippet
Security plays a distinctive role in the digital computing. All the operations are automatic and servers maintain large volumes of data. This paper discusses different techniques and extends with the issues such as challenges, security attacks, DDoS attacks and intrusion …
- 238000001514 detection method 0 abstract description 46
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1458—Denial of Service
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1416—Event detection, e.g. attack signature detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1483—Countermeasures against malicious traffic service impersonation, e.g. phishing, pharming or web spoofing
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/145—Countermeasures against malicious traffic the attack involving the propagation of malware through the network, e.g. viruses, trojans or worms
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1491—Countermeasures against malicious traffic using deception as countermeasure, e.g. honeypots, honeynets, decoys or entrapment
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Amara et al. | Cloud computing security threats and attacks with their mitigation techniques | |
Modi et al. | A survey of intrusion detection techniques in cloud | |
Radivilova et al. | Decrypting SSL/TLS traffic for hidden threats detection | |
EP2147390B1 (en) | Detection of adversaries through collection and correlation of assessments | |
Mehmood et al. | Intrusion detection system in cloud computing: Challenges and opportunities | |
EP2156361B1 (en) | Reduction of false positive reputations through collection of overrides from customer deployments | |
Latha et al. | A survey on network attacks and Intrusion detection systems | |
Mell et al. | A denial-of-service resistant intrusion detection architecture | |
CN111295640B (en) | Fine-grained firewall policy enforcement using session App ID and endpoint process ID correlation | |
Innab et al. | Hybrid system between anomaly based detection system and honeypot to detect zero day attack | |
Simkhada et al. | Security threats/attacks via botnets and botnet detection & prevention techniques in computer networks: a review | |
Bhimireddy et al. | Web security and web application security: Attacks and prevention | |
Pillai et al. | Smart wallets on blockchain—attacks and their costs | |
Nagesh et al. | A survey on denial of service attacks and preclusions | |
Durairaj et al. | A study on securing cloud environment from DDoS attack to preserve data availability | |
US20250240313A1 (en) | Large language model (llm) powered detection reasoning solution | |
Rani et al. | Classification of security issues and cyber attacks in layered internet of things | |
Samani et al. | Intrusion detection system for DoS attack in cloud | |
Kandan et al. | Network attacks and prevention techniques-a study | |
Bisht | Web Applications Security Re-engineering in Cloud with Machine Learning | |
Sarkunavathi et al. | A detailed study on advanced persistent threats: A sophisticated threat | |
Karamagi | Comptia Security+ Practice Exams | |
Pandey et al. | IDS CRITERIA FOR ENHANCED SECURITY OVER CLOUD. | |
Ranjith et al. | Design and implementation of a defense system from TCP injection attacks | |
Alsmadi | Threat Analysis |