Detection of DDoS attack in cloud computing and its prevention: a systematic review (Record no. 18093)
[ view plain ]
| 000 -LEADER | |
|---|---|
| fixed length control field | a |
| 003 - CONTROL NUMBER IDENTIFIER | |
| control field | OSt |
| 005 - DATE AND TIME OF LATEST TRANSACTION | |
| control field | 20230703114634.0 |
| 008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION | |
| fixed length control field | 221105b xxu||||| |||| 00| 0 eng d |
| 040 ## - CATALOGING SOURCE | |
| Original cataloging agency | AIKTC-KRRC |
| Transcribing agency | AIKTC-KRRC |
| 100 ## - MAIN ENTRY--PERSONAL NAME | |
| 9 (RLIN) | 18887 |
| Author | Ali Raza |
| 245 ## - TITLE STATEMENT | |
| Title | Detection of DDoS attack in cloud computing and its prevention: a systematic review |
| 250 ## - EDITION STATEMENT | |
| Volume, Issue number | Vol.9(1), Jan-Jun |
| 260 ## - PUBLICATION, DISTRIBUTION, ETC. | |
| Place of publication, distribution, etc. | Tamil Nadu |
| Name of publisher, distributor, etc. | i-manager's |
| Year | 2022 |
| 300 ## - PHYSICAL DESCRIPTION | |
| Pagination | 1-8p. |
| 520 ## - SUMMARY, ETC. | |
| Summary, etc. | Cloud computing is one of the latest and greatest environments for delivering Software as a Service (SaaS), Infrastructure as a Service (IaaS), and Platform as a Service (PaaS) in digital communications infrastructure. Cloud computing helps the user remotely access the required service as needed through the Internet. But this technological advancement, due to its remote availability in the cloud, leads to new attacks. One of the biggest threats to cloud infrastructure is Distributed Denial of Service (DDoS) flooding attacks. DDoS flooding attacks are clearly trying to exploit the availability of services for a legitimate user. An attacker gains access to a large number of computers (i.e., botnets) by exploiting the vulnerabilities, and then uses the botnets to initiate an organized attack with a large number of targets. This paper analyses the latest methods for detecting and preventing Distributed Denial of Service (DDoS) attacks. It also provided methods and technologies for preventing, detecting, and responding to DDoS flood attacks. |
| 650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
| 9 (RLIN) | 4622 |
| Topical term or geographic name entry element | Computer Engineering |
| 773 0# - HOST ITEM ENTRY | |
| Title | i-manager's journal on cloud computing (JCC) |
| Place, publisher, and date of publication | Nagercoil i-manager Publication |
| International Standard Serial Number | 2349-6835 |
| 856 ## - ELECTRONIC LOCATION AND ACCESS | |
| URL | https://www.scilit.net/articles/search?q=author_full%3A%28ali%20raza%29%20AND%20%28title%3A%28detection%20of%20ddos%29%20OR%20abstract%3A%28detection%20of%20ddos%29%29&highlight=1 |
| Link text | Click here |
| 942 ## - ADDED ENTRY ELEMENTS (KOHA) | |
| Source of classification or shelving scheme | Dewey Decimal Classification |
| Koha item type | Articles Abstract Database |
| Withdrawn status | Lost status | Source of classification or shelving scheme | Damaged status | Not for loan | Home library | Current library | Shelving location | Date acquired | Total Checkouts | Barcode | Date last seen | Price effective from | Koha item type |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| Dewey Decimal Classification | School of Engineering & Technology | School of Engineering & Technology | Archieval Section | 05/11/2022 | 2022-2004 | 05/11/2022 | 05/11/2022 | Articles Abstract Database |