2021
DOI: 10.1007/978-981-33-6835-4_37
|View full text |Cite
|
Sign up to set email alerts
|

A Detailed Analysis on Intrusion Identification Mechanism in Cloud Computing and Datasets

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
2
2

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(1 citation statement)
references
References 86 publications
0
1
0
Order By: Relevance
“…Moreover, at the transport layer, TCP (Transmission Control Protocol) and UDP (User Datagram Protocol) present security challenges related to session hijacking, packet sniffing, and denial-of-service (DoS) attacks. TCP-based attacks, such as SYN flooding, exploit the three-way handshake process to exhaust server resources and disrupt network services [39]- [44]. UDP-based attacks, on the other hand, leverage the connectionless nature of UDP to flood target systems with a high volume of malicious traffic, causing network congestion and service outages.…”
Section: Securitymentioning
confidence: 99%
“…Moreover, at the transport layer, TCP (Transmission Control Protocol) and UDP (User Datagram Protocol) present security challenges related to session hijacking, packet sniffing, and denial-of-service (DoS) attacks. TCP-based attacks, such as SYN flooding, exploit the three-way handshake process to exhaust server resources and disrupt network services [39]- [44]. UDP-based attacks, on the other hand, leverage the connectionless nature of UDP to flood target systems with a high volume of malicious traffic, causing network congestion and service outages.…”
Section: Securitymentioning
confidence: 99%