Detection techniques for DDoS attacks in cloud environment
Intelligent and Interactive Computing: Proceedings of IIC 2018, 2019•Springer
Cloud computing security remains the goal of both cloud service providers and customers.
With many of the security threats to the security of cloud computing, Distributed Denial of
Service (DDoS) attacks is one of the most worrisome. The danger posed by the DDoS
attacks are already known and continue to be the predominant security challenge in
reaching an impervious and guaranteed safe cloud computing resources and service
delivery. Many researchers have proposed many detection and defense techniques to …
With many of the security threats to the security of cloud computing, Distributed Denial of
Service (DDoS) attacks is one of the most worrisome. The danger posed by the DDoS
attacks are already known and continue to be the predominant security challenge in
reaching an impervious and guaranteed safe cloud computing resources and service
delivery. Many researchers have proposed many detection and defense techniques to …
Abstract
Cloud computing security remains the goal of both cloud service providers and customers. With many of the security threats to the security of cloud computing, Distributed Denial of Service (DDoS) attacks is one of the most worrisome. The danger posed by the DDoS attacks are already known and continue to be the predominant security challenge in reaching an impervious and guaranteed safe cloud computing resources and service delivery. Many researchers have proposed many detection and defense techniques to protect cloud computing against DDoS attacks. In this paper, we present a review of many detection techniques that are useful in spotting DDoS attacks that are cloud-based and make a comparative analysis between them to find a suitable technique for spotting these cloud computing based DDoS attacks.
Springer
以上显示的是最相近的搜索结果。 查看全部搜索结果