RISS 학술연구정보서비스

검색
다국어 입력

http://chineseinput.net/에서 pinyin(병음)방식으로 중국어를 변환할 수 있습니다.

변환된 중국어를 복사하여 사용하시면 됩니다.

예시)
  • 中文 을 입력하시려면 zhongwen을 입력하시고 space를누르시면됩니다.
  • 北京 을 입력하시려면 beijing을 입력하시고 space를 누르시면 됩니다.
닫기
    인기검색어 순위 펼치기

    RISS 인기검색어

      검색결과 좁혀 보기

      선택해제

      오늘 본 자료

      • 오늘 본 자료가 없습니다.
      더보기
      • 무료
      • 기관 내 무료
      • 유료
      • Comprehensive Study of Various Techniques for Detecting DDoS Attacks in Cloud Environment

        Navdeep Singh,Abhinav Hans,Kapil Kumar,Mohit Pal Singh Birdi 보안공학연구지원센터 2015 International Journal of Grid and Distributed Comp Vol.8 No.3

        Cloud computing is the most dynamic field of IT industry. It is becoming very famous due to its less resource consuming and higher output. Though Cloud computing is very vast and useful technology but it is not remained untouched from attackers or hackers. The most common attack notified on the cloud environment is DDoS attack. DDoS attacks i.e. Distributed Denial of service attacks happens on a cloud environment in such a way that, two or more than two attackers sends the multiple SOAP requests at the same cloud server and consume all the legitimate resources. From the study it has been concluded that, none a system is developed so far to prevent the DDoS attacks completely because even the detection of DDoS attacks is a major issue and prevention is a very big thing to achieve after detection and mitigation. This paper is focused on underlying the introduction about DDoS attacks and the next part of the paper is followed by the comparative analysis of the different techniques and algorithms used in detecting the DDoS attacks in cloud environment.

      연관 검색어 추천

      이 검색어로 많이 본 자료

      활용도 높은 자료

      해외이동버튼