000 a
999 _c18093
_d18093
003 OSt
005 20230703114634.0
008 221105b xxu||||| |||| 00| 0 eng d
040 _aAIKTC-KRRC
_cAIKTC-KRRC
100 _918887
_aAli Raza
245 _aDetection of DDoS attack in cloud computing and its prevention: a systematic review
250 _aVol.9(1), Jan-Jun
260 _aTamil Nadu
_bi-manager's
_c2022
300 _a1-8p.
520 _a Cloud computing is one of the latest and greatest environments for delivering Software as a Service (SaaS), Infrastructure as a Service (IaaS), and Platform as a Service (PaaS) in digital communications infrastructure. Cloud computing helps the user remotely access the required service as needed through the Internet. But this technological advancement, due to its remote availability in the cloud, leads to new attacks. One of the biggest threats to cloud infrastructure is Distributed Denial of Service (DDoS) flooding attacks. DDoS flooding attacks are clearly trying to exploit the availability of services for a legitimate user. An attacker gains access to a large number of computers (i.e., botnets) by exploiting the vulnerabilities, and then uses the botnets to initiate an organized attack with a large number of targets. This paper analyses the latest methods for detecting and preventing Distributed Denial of Service (DDoS) attacks. It also provided methods and technologies for preventing, detecting, and responding to DDoS flood attacks.
650 0 _94622
_aComputer Engineering
773 0 _ti-manager's journal on cloud computing (JCC)
_dNagercoil i-manager Publication
_x 2349-6835
856 _uhttps://www.scilit.net/articles/search?q=author_full%3A%28ali%20raza%29%20AND%20%28title%3A%28detection%20of%20ddos%29%20OR%20abstract%3A%28detection%20of%20ddos%29%29&highlight=1
_yClick here
942 _2ddc
_cAR