[go: up one dir, main page]

Durairaj et al., 2015 - Google Patents

A study on securing cloud environment from DDoS attack to preserve data availability

Durairaj et al., 2015

Document ID
3665672973186465725
Author
Durairaj M
Manimaran A
Publication year
Publication venue
the international journal of science and technoledge

External Links

Snippet

Security plays a distinctive role in the digital computing. All the operations are automatic and servers maintain large volumes of data. This paper discusses different techniques and extends with the issues such as challenges, security attacks, DDoS attacks and intrusion …
Continue reading at search.proquest.com (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1458Denial of Service
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1416Event detection, e.g. attack signature detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1483Countermeasures against malicious traffic service impersonation, e.g. phishing, pharming or web spoofing
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1425Traffic logging, e.g. anomaly detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/145Countermeasures against malicious traffic the attack involving the propagation of malware through the network, e.g. viruses, trojans or worms
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1491Countermeasures against malicious traffic using deception as countermeasure, e.g. honeypots, honeynets, decoys or entrapment

Similar Documents

Publication Publication Date Title
Amara et al. Cloud computing security threats and attacks with their mitigation techniques
Modi et al. A survey of intrusion detection techniques in cloud
Radivilova et al. Decrypting SSL/TLS traffic for hidden threats detection
EP2147390B1 (en) Detection of adversaries through collection and correlation of assessments
Mehmood et al. Intrusion detection system in cloud computing: Challenges and opportunities
EP2156361B1 (en) Reduction of false positive reputations through collection of overrides from customer deployments
Latha et al. A survey on network attacks and Intrusion detection systems
Mell et al. A denial-of-service resistant intrusion detection architecture
CN111295640B (en) Fine-grained firewall policy enforcement using session App ID and endpoint process ID correlation
Innab et al. Hybrid system between anomaly based detection system and honeypot to detect zero day attack
Simkhada et al. Security threats/attacks via botnets and botnet detection & prevention techniques in computer networks: a review
Bhimireddy et al. Web security and web application security: Attacks and prevention
Pillai et al. Smart wallets on blockchain—attacks and their costs
Nagesh et al. A survey on denial of service attacks and preclusions
Durairaj et al. A study on securing cloud environment from DDoS attack to preserve data availability
US20250240313A1 (en) Large language model (llm) powered detection reasoning solution
Rani et al. Classification of security issues and cyber attacks in layered internet of things
Samani et al. Intrusion detection system for DoS attack in cloud
Kandan et al. Network attacks and prevention techniques-a study
Bisht Web Applications Security Re-engineering in Cloud with Machine Learning
Sarkunavathi et al. A detailed study on advanced persistent threats: A sophisticated threat
Karamagi Comptia Security+ Practice Exams
Pandey et al. IDS CRITERIA FOR ENHANCED SECURITY OVER CLOUD.
Ranjith et al. Design and implementation of a defense system from TCP injection attacks
Alsmadi Threat Analysis