Iyengar, 2016 - Google Patents
Novel Defensive Mechanisms to Secure Cloud Computing Environment against Distributed Denial of Service AttacksIyengar, 2016
View PDF- Document ID
- 1750734643905952485
- Author
- Iyengar N
- Publication year
External Links
Snippet
With the advancement in Internet technologies, a new computing paradigm called Cloud Computing which is fully Internet based has come to play a crucial role in the Information Technology industry. Unique key characteristics such as resource sharing, scalability, multi …
- 238000005516 engineering process 0 abstract description 9
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Alharbi | Deployment of blockchain technology in software defined networks: A survey | |
| Meng et al. | Enhancing the security of blockchain-based software defined networking through trust-based traffic fusion and filtration | |
| Gupta et al. | Taxonomy of DoS and DDoS attacks and desirable defense mechanism in a cloud computing environment | |
| Manavi | Defense mechanisms against distributed denial of service attacks: A survey | |
| Modi et al. | A survey of intrusion detection techniques in cloud | |
| US9787642B2 (en) | Platforms for implementing an analytics framework for DNS security | |
| Saxena et al. | DDoS attack prevention using collaborative approach for cloud computing | |
| US9531749B2 (en) | Prevention of query overloading in a server application | |
| Dalmazo et al. | A systematic review on distributed denial of service attack defense mechanisms in programmable networks | |
| Damghani et al. | Classification of attacks on IoT | |
| Iyengar et al. | A multilevel thrust filtration defending mechanism against DDoS attacks in cloud computing environment | |
| Nisa et al. | TPAAD: Two‐phase authentication system for denial of service attack detection and mitigation using machine learning in software‐defined network | |
| Isong et al. | Trust establishment in SDN: controller and applications | |
| Pon et al. | Blockchain based cloud service security architecture with distributed machine learning for smart device traffic record transaction | |
| Sefati et al. | A comprehensive survey of cybersecurity techniques based on quality of service (QoS) on the Internet of Things (IoT) | |
| Hayawi et al. | A false positive resilient distributed trust management framework for collaborative intrusion detection systems | |
| Nair et al. | Security attacks in internet of things | |
| CN119155055B (en) | A method and system for ensuring trustworthiness and security in cyberspace | |
| Iyengar et al. | Trilateral trust based defense mechanism against DDoS attacks in cloud computing environment | |
| Ahamed et al. | A review on distributed denial of service (ddos) mitigation techniques in cloud computing environment | |
| Sangui et al. | Cloud security using honeypot network and blockchain: a review | |
| Jena et al. | A pragmatic analysis of security concerns in Cloud, Fog, and Edge Environment | |
| Abdulqadder et al. | Validating user flows to protect software defined network environments | |
| Iyengar et al. | An effective layered load balance defensive mechanism against DDoS attacks in cloud computing environment | |
| Metongnon et al. | Distributed middlebox architecture for IoT protection |