2014 International Conference on Recent Trends in Information Technology 2014
DOI: 10.1109/icrtit.2014.6996163
|View full text |Cite
|
Sign up to set email alerts
|

Intrusion detection system- An efficient way to thwart against Dos/DDos attack in the cloud environment

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
11
0

Year Published

2016
2016
2021
2021

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 15 publications
(11 citation statements)
references
References 6 publications
0
11
0
Order By: Relevance
“…It is helpful in proving that the defense system can identify and block attacks, thereby increasing the availability of network bandwidth and resources for service. Low drop rate values indicate good mitigation performance [115], [119] and [120]. A similar metric of success-analyzing is used by Chung et al [121] to assess the capacity of the system in managing the rate of received packets.…”
Section: ) Attack Mitigationmentioning
confidence: 99%
See 1 more Smart Citation
“…It is helpful in proving that the defense system can identify and block attacks, thereby increasing the availability of network bandwidth and resources for service. Low drop rate values indicate good mitigation performance [115], [119] and [120]. A similar metric of success-analyzing is used by Chung et al [121] to assess the capacity of the system in managing the rate of received packets.…”
Section: ) Attack Mitigationmentioning
confidence: 99%
“…• Processing time: Authors measure the processing time involved for the defense method to conduct computational cost and time analysis [100], [101], [103], [107], [123], [129] and [130] or the testing and data training time if data classification techniques are used. Usually, the average processing time (or detection time) is measured while increasing network congestion, client request rates [119], [126], or attack intensity [131]. It can also be measured for various attack durations [108].…”
Section: ) Deployment Costmentioning
confidence: 99%
“…The result shows that the overall performance of this algorithm in detection accuracy and time consumption is superior to existing models. Regarding DDoS attacks, various detection strategies such as detection [36][37][38][39][40][41][42][43][44][45], mitigation [46][47][48][49][50][51][52][53][54] and Defence techniques [55][56][57][58][59][60][61][62][63][64][65][66] proposed for the cloud, and the performance compared. The comparative analysis based on the above said categories are given in Table-5, Table-6, and Table-7.…”
Section: A Survey Of Ddos Attacksmentioning
confidence: 99%
“…In [21] the author uses the' strategy for SYN-based transmission control protocols. In this approach, the author provides two security layers.…”
Section: Review Of Literaturementioning
confidence: 99%