2016
DOI: 10.5120/ijais2016451628
|View full text |Cite
|
Sign up to set email alerts
|

An Overview of DDOS Attacks Detection and Prevention in the Cloud

Abstract: Security is an illusion unless you are hacked. Attacks in the Cloud have more catastrophic and destructive impact on the organizations than the user might expect. As attacks are constantly evolving and making it difficult to defend. Most of the organization will try to check their devices in the cloud to protect against viruses with traditional security measures like antiviruses, or firewall thinking it secures across different attacks, but with a wide range of change in attack pattern organizations have expos… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
3
0
1

Year Published

2020
2020
2023
2023

Publication Types

Select...
4
3
2

Relationship

0
9

Authors

Journals

citations
Cited by 9 publications
(4 citation statements)
references
References 26 publications
0
3
0
1
Order By: Relevance
“…Flooding saldırıları, bulut sistemlerinin kullanılabilirliğini, gizliliğini ve bütünlüğünü etkileyen yaygın saldırılar arasındadır (Modi ve diğerleri, 2013). Bu saldırılar, en önemli güvenlik tehditleri arasında yer alan erişebilirliğe dayalı saldırılardır (Fakeeh, 2016). DDoS saldırıları, COVID-19 döneminde ilk on siber güvenlik tehdidi arasındadır (Khan ve diğerleri, 2021).…”
Section: Ybs Si̇stemleri̇ne Yöneli̇k Olasi Si̇ber Saldiri Türü Ve Yön...unclassified
“…Flooding saldırıları, bulut sistemlerinin kullanılabilirliğini, gizliliğini ve bütünlüğünü etkileyen yaygın saldırılar arasındadır (Modi ve diğerleri, 2013). Bu saldırılar, en önemli güvenlik tehditleri arasında yer alan erişebilirliğe dayalı saldırılardır (Fakeeh, 2016). DDoS saldırıları, COVID-19 döneminde ilk on siber güvenlik tehdidi arasındadır (Khan ve diğerleri, 2021).…”
Section: Ybs Si̇stemleri̇ne Yöneli̇k Olasi Si̇ber Saldiri Türü Ve Yön...unclassified
“…The new system brings about a new method of detecting intruders by the combined use of IP/MAC address. [20] used Neural Networks and Data mining technique to detect DDOS attacks. This model needs less memory and claims that they have faster detection.…”
Section: Review Of Related Workmentioning
confidence: 99%
“…The new system brings about a new method of detecting intruders by the combined use of IP/MAC address. [23] used Neural Networks and Data mining technique to detect DDOS attacks. This model needs less memory and claims that they have faster detection.…”
Section: Port Hopping Techniquementioning
confidence: 99%