A multi-vocal review of security orchestration

C Islam, MA Babar, S Nepal - ACM Computing Surveys (CSUR), 2019 - dl.acm.org
Organizations use diverse types of security solutions to prevent cyber-attacks. Multiple
vendors provide security solutions developed using heterogeneous technologies and …

Detection of distributed denial of service attacks using snort rules in cloud computing & remote control systems

Z Hassan, R Odarchenko, S Gnatyuk… - 2018 IEEE 5th …, 2018 - ieeexplore.ieee.org
Cloud computing has the capability of sharing and retrieving data, remote controlling from
different locations, that is why many companies and organizations implement their …

[PDF][PDF] Distributed denial of service attacks: a review

SS Sahu, M Pandey - … Journal of Modern Education and Computer …, 2014 - mecs-press.net
A wireless sensor network (WSN) is a wireless network consisting of spatially distributed
autonomous devices using sensors to monitor physical or environmental conditions. WSN is …

Distributed persistent identifiers system design

P Golodoniuc, NJ Car, J Klump - Data Science …, 2017 - account.datascience.codata.org
The need to identify both digital and physical objects is ubiquitous in our society. Past and
present persistent identifier (PID) systems, of which there is a great variety in terms of …

Study of intrusion detection system for DDoS attacks in cloud computing

N Kumar, S Sharma - 2013 Tenth International Conference on …, 2013 - ieeexplore.ieee.org
The cloud computing has grown as a promising business concept as well as one of the
fastest growing segment of IT industry in the last few years. However the popularity of Cloud …

Cyberattacks detection through behavior analysis of internet traffic

O Berjawi, A El Attar, F Chbib, R Khatoun… - Procedia Computer …, 2023 - Elsevier
Network intrusion detection systems (NIDS) are actually used to detect suspicious activities
such as viruses, shellcode, XSS, CSRF, worms, etc. There are two types of the NIDS …

[PDF][PDF] A prevention of DDoS attacks in Cloud using NEIF techniques

J Rameshbabu, BS Balaji, RW Daniel… - international journal of …, 2014 - Citeseer
In recent years, most of the organizations in the world have increasingly realized the
importance of cloud platforms. The cloud computing is one of the developing segmenting of …

[PDF][PDF] A DoS/DDoS attack detection system using chi-square statistic approach

FY Leu, IL Lin - J. Syst. Cybern. Inform, 2010 - iiisci.org
Nowadays, users can easily access and download network attack tools, which often provide
friendly interfaces and easily operated features, from the Internet. Therefore, even a naive …

Preventing the flood: Incentive-based collaborative mitigation for drdos attacks

A Bremler-Barr, M Sabag - 2022 IFIP Networking Conference …, 2022 - ieeexplore.ieee.org
Distributed denial of service (DDoS) attacks, especially distributed reflection denial of
service attacks (DRDoS), have increased dramatically in frequency and volume in recent …

Curbing distributed denial of service attack by traffic filtering in wireless sensor network

SS Sahu, P Priyadarshini… - … Conference on Computing …, 2014 - ieeexplore.ieee.org
Wireless Sensor Networks (WSNs) are vastly used networks that have caught attention of
numerous researchers because of their various applications. They are resource constrained …